Safe & Security Articles

Page 30 of 88

What is the role of Data Analytics in Effective Database Security?

Pranav Bhardwaj
Pranav Bhardwaj
Updated on 30-May-2022 247 Views

Businesses are constantly told to keep their information safe from hackers while also being cautioned not to disseminate it widely. For example, analytics software can swiftly analyze large amounts of data, extract data using improvised queries, and show it in a readily understandable style. However, if certain precautions aren't in places, such as regulations or monetary investment, these business intelligence application software are exposed to security issues.Although business intelligence techniques have had a significant impact on cost, efficiency, and decision-making, the impact of business intelligence on data security is still unclear. Our new paradigm requires us to concentrate on early ...

Read More

How are Proxy Servers effective against Cybercrimes?

Pranav Bhardwaj
Pranav Bhardwaj
Updated on 30-May-2022 578 Views

What is a Proxy Server?Incoming client requests are verified and forwarded to other servers for further communication. A proxy server, such as a Web browser and a Web server, is positioned between a client and a server and functions as a middleman between the two. The most crucial function of a proxy server is to provide security.Network intelligence has progressed with the introduction of improved tools and network services like the proxy server.A client connects to a proxy server before sending a request, such as accessing a file or opening a Web page. Each IP address and a request are ...

Read More

What are the 42 mobile apps China is allegedly using to spy on the Indian forces?

Dev Kumar
Dev Kumar
Updated on 19-May-2022 183 Views

The IB (Intelligence Bureau) which is the premier intelligence services department of the Government of India has identified a number of mobile apps including many that are developed by Chinese companies. Here's a list of 28 apps that the Digital IT Cell of the Government of India has identified as spyware and malware - Weibo, Wechat, Shareit, Truecaller, UC News, UC Browser, Beautiplus, Newsdog, Viva Video - Qu Video Inc, Parallel Space, Apus Browser, Perfect Corp, Virus Cleaner - Hi Security Lab, CM Browser, MI Community, DU Recorder, Vault Hide - NQ Mobile Security, Youcam Makeup, MI Store, Cachecleaner DU ...

Read More

Why did Facebook recently buy passwords off Black market?

karthikeya Boyini
karthikeya Boyini
Updated on 11-May-2022 280 Views

Facebook, a very popular social networking site, that helps you connect with people. Some of you are well acquainted with and some you don’t, still you get a chance to make new friends and we learn a lot of things, updates on latest movies’ gossip and the list goes on. So, our Facebook account is a pass key to know everything going around the world starting from our street, city, to country and world.Just like bank accounts we prefer to keep our Facebook account private, just to ourselves, like you can share your account number with someone but not your ...

Read More

How can women be responsible for their own safety?

Rashmi Iyer
Rashmi Iyer
Updated on 10-May-2022 395 Views

God helps those who help themselves. While, it is a moral duty of each and every individual to lend a helping hand to others, there are many instances where we have to help our own selves and these are mostly concerned with our safety and protection. Women today are becoming more and more vulnerable to security issues, which is actually a serious problem in our country.It’s time again that women free themselves from the clutches of bondage and become the harbinger of power (Shakti) who has worshiped a Durga in this country yet women live under constant fear and threat. ...

Read More

How to Avoid online Scams on Facebook?

karthikeya Boyini
karthikeya Boyini
Updated on 05-May-2022 257 Views

With seven hundred million plus users all over the globe, Facebook is a perfect podium for scam artists. For a scammer, it requires little research on your interest, one simple friend request and once you add them in your friend list, the further process of phishing and scamming runs smoothly.This mega program runs through ‘Social Engineering’, which means understanding common user habit along with behavior and make best use of those to design eye-catching headlines. A simple click on them can redirect you safely to unsafe scam page. There you might be asked to input your login details and personal ...

Read More

What is CIA Triad in Information Security?

Ayushi Bhargava
Ayushi Bhargava
Updated on 04-May-2022 5K+ Views

The CIA Triad is a concept in information security. It guides an organization's data security operations. The 3 letters in CIA stand for confidentiality, integrity, and availability. They are the three pillars of a security architecture. In fact, applying these concepts to any security program is optimal.When working as a triad, the three notions are in conflict with one another. Extensive authentication, for example, helps preserve secrecy and lowers availability since certain persons who have the right to the data may not be able to access it.The three terms are explained below.ConfidentialityConfidentiality refers to the steps made by an organization ...

Read More

Why You Should Use an Anonymous Proxy Server?

Ayushi Bhargava
Ayushi Bhargava
Updated on 04-May-2022 765 Views

It's difficult to talk about internet security without mentioning a proxy server or a virtual private network (VPN). These two programs give you anonymity while you do your daily internet activity. Both technologies work in the same way to keep you anonymous on the Internet. Proxies and VPNs disguise your internet protocol (IP) from the web host and your target website by rerouting your internet traffic through their servers. The web host only sees the IP address of the proxy or VPN server as you browse the website, while yours remains concealed.Although proxy and VPN anonymity solutions have certain similarities, ...

Read More

What is an IP Flood?

Ayushi Bhargava
Ayushi Bhargava
Updated on 04-May-2022 2K+ Views

IP FloodAn IP Flood is a type of malicious assault that can affect a single device or a whole network. This is a Denial of Service (DoS) attack that seeks to prevent a device from performing its usual functions, such as delivering requests or processing data. In an IP flood attack, the system is flooded with data, using all available bandwidth and denying access to genuine users.Fortunately, IP flooding is a well-known form of assault and it is well-documented and hence it can be readily avoided. IP Flooding is a sort of attack in which the victim or system is ...

Read More

What is Information System Resilience?

Ayushi Bhargava
Ayushi Bhargava
Updated on 04-May-2022 748 Views

The resilience of an Information System is its capacity to function in adverse conditions or under stress, while preserving critical operational capabilities. In general, a system is resilient if it continues to fulfil its objective despite hardship (i.e. if it provides required capabilities despite excessive stress that can cause disruptions).Being resilient is vital because, no matter how well-engineered a system is, reality will conspire to disrupt it sooner or later. Residual software or hardware faults will ultimately cause the system to fail to execute a necessary function or to fail to achieve one or more of its quality standards (e.g., ...

Read More
Showing 291–300 of 875 articles
« Prev 1 28 29 30 31 32 88 Next »
Advertisements