
Data Structure
Networking
RDBMS
Operating System
Java
MS Excel
iOS
HTML
CSS
Android
Python
C Programming
C++
C#
MongoDB
MySQL
Javascript
PHP
- Selected Reading
- UPSC IAS Exams Notes
- Developer's Best Practices
- Questions and Answers
- Effective Resume Writing
- HR Interview Questions
- Computer Glossary
- Who is Who
Found 987 Articles for Safe & Security

5K+ Views
What is Intrusion in Cyber Security?Any illicit behavior on a digital network is known as a network intrusion. Network incursions frequently include the theft of important network resources, which virtually always compromise the network and/or data security. This can take the shape of more dangerous and pervasive threats like ransomware or unintended data leaks by workers or others on your network.An illegal entrance into your network or an address in your assigned domain is referred to as a network intrusion. An intrusion can be passive (in which access is achieved quietly and undetected) or aggressive (in which access is gained ... Read More

2K+ Views
What is IP Spoofing?IP spoofing, also known as "IP address spoofing", is the process of sending Internet Protocol (IP) packets with a fake source IP address in order to mimic another computer system. Cybercriminals can use IP spoofing to carry out harmful acts without being detected. It's possible that someone will steal your data, infect your device with malware, or crash your server.IP spoofing is a hostile attack in which the threat actor conceals the real source of IP packets to make it harder to determine where they originated. To mimic a different computer system, hide the sender's identity, or ... Read More

549 Views
Kovter MalwareKovter is a sort of malware that isn't visible and doesn't leave any files on your computer. It's designed to attack Windows computers. It avoids detection by storing its configuration data mostly in the computer's registry, thereby bypassing standard endpoint file inspection. Kovter has also remained robust by morphing from trojan-based ransomware that fooled victims into thinking they were being fined by the authorities for "illegal" internet behavior to a click fraud virus, and finally to fileless ransomware. Because of these characteristics, Kovter has been a constant on the Center for Internet Security's list of the most widespread malware ... Read More

8K+ Views
Sniffing is the technique used to monitor and record all data packets continuously that go through a network. Network/system administrators employ sniffers to monitor and troubleshoot network traffic. Attackers use sniffers to capture data packets carrying sensitive passwords and account information. Sniffers are implemented as hardware or software in the system. A hostile intruder can gather and analyse all network traffic by using a packet sniffer in promiscuous mode on a network.A packet sniffer is another term for a network sniffer. Because every packet of data is sniffed through the network to avoid network-related issues, it's called a packet sniffer. ... Read More

598 Views
National Institute of Standards and Technology (NIST)The National Institute of Standards and Technology's cybersecurity framework is a valuable tool for organizing and improving your cybersecurity program. It's a set of standards and best practices aimed at assisting businesses in establishing and improving their cybersecurity posture. The framework includes a series of suggestions and standards that help companies better prepare for cyber-attacks by identifying and detecting them, as well as for instructions for responding to, preventing, and recovering from them.This framework, developed by the National Institute of Standards and Technology (NIST), tackles the lack of cybersecurity standards by providing a unified ... Read More

6K+ Views
The certainty that someone cannot dispute the legitimacy of anything is known as non-repudiation. Non-repudiation is a regulatory notion commonly used in cybersecurity and refers to the service that confirms the origin and integrity of data. It assures that no party can deny sending or receiving a communication using encryption and digital signatures. It cannot also contest the legitimacy of its digital signature on a document.Non-repudiation provides evidence of data's origin, authenticity, and integrity. It verifies the sender that the information is sent and the recipient's identity to the receiver. Neither side can dispute that communication happened or was processed ... Read More

2K+ Views
Offline attacks are executed from a location other than the actual PC where passwords reside or were used. Offline attacks frequently need total access to the PC and duplicate the framework's secret key document onto external media. The programmer then transfers the record to another PC to accomplish the split.Even though it takes a lot more work, an offline assault is typically easier to execute than an online strike and has a greater chance of going unnoticed. An attacker attempting to extract clear text credentials from a password hash dump is known as an offline attack. Attackers conduct offline and ... Read More

3K+ Views
A passive network assault is one in which a system is monitored for open ports and vulnerabilities. A passive attack attempts to obtain or use information from the system while inflicting no harm to the system's resources. Passive attacks are characterized by eavesdropping or monitoring transmission. The opponent's goal is to intercept the data being transmitted.Active and passive reconnaissance are examples of passive assaults. Reconnaissance is a military phrase that refers to the process of exploring hostile territory to obtain intelligence. Reconnaissance is the act of examining a system or network to acquire information before launching a complete attack in ... Read More

474 Views
What is Patch Management?Patch management involves analyzing computers, mobile devices, or other network equipment for missing software updates, known as "fixes, " and resolving the issue by delivering such patches as soon as they become available. Patches are pieces of code placed (or patched) into an existing software program's code. It is usually used as a stop-gap solution until a new complete release of the program is ready.How Does Patch Management Work?Patches are provided by software firms when they become aware of an existing vulnerability to prevent external agents from exploiting that vulnerability to access your corporate network. Patch management ... Read More

319 Views
A penetration test, also known as a pen test, is a process to analyze the security of an IT infrastructure by exploiting vulnerabilities in a controlled manner. These defects could be found in operating systems, services, and applications, as well as incorrect setups and unsafe end-user behavior. These tests can also be used to verify the effectiveness of defensive strategies and end-user compliance with security regulations.Penetration testing is a technique for determining your security before an adversary does. Penetration testing software simulates real-world attack scenarios in order to find and exploit security flaws that could result in data theft, compromised ... Read More