- Data Structure
- Networking
- RDBMS
- Operating System
- Java
- MS Excel
- iOS
- HTML
- CSS
- Android
- Python
- C Programming
- C++
- C#
- MongoDB
- MySQL
- Javascript
- PHP
- Physics
- Chemistry
- Biology
- Mathematics
- English
- Economics
- Psychology
- Social Studies
- Fashion Studies
- Legal Studies
- Selected Reading
- UPSC IAS Exams Notes
- Developer's Best Practices
- Questions and Answers
- Effective Resume Writing
- HR Interview Questions
- Computer Glossary
- Who is Who
Found 168 Articles for System Security
145 Views
Who is an Ethical Hacker?An Ethical Hacker is scrutinized as a security executive who perform security assessment to protect client’s computer or application from potential security risks and vulnerabilities. Organizations employs ethical hackers to protect their computers and other systems in the network from cyberattacks, and any external and internal risks in the IT infrastructure.A hacker usually tries to gain unauthorized access to a computer system or application; whereas an ethical hacker imparts hack-preventing tactics, installing several technologies to protect the system before falling victim to the hacker.Through this outlook, an ethical hacker can set up a defense team to ... Read More
637 Views
Let us understand the concepts of Spyware and Trojan Horse before learning the differences between them.SpywareIt is a software program which can be installed on some user's personal computer or organization without their knowledge to gather personal information or view their browsing activities.We can defend Spyware by doing proper internet browsing, not clicking unwanted suspicious links, not clicking any download or accept buttons, and not agreeing to unwanted information.We can remove Spyware by using proper antivirus scan. After disconnecting from the internet remove any unwanted or added programs in the control panel and reboot system and do proper antivirus scan ... Read More
203 Views
Let us understand the concepts of Malware and Ransomeware before learning the differences between them.MalwareMalware is called as malicious software which refers to a program that can infect a legitimate user's computer and harm on it in different ways. It can infect computers and devices in several ways and comes in a number of forms, just a few of which can include viruses, worms, Trojan horses and more.Computer viruses are probably the most familiar type of malware — so named because they spread by making copies of themselves. Worms also have a similar property. Spyware transmits personal information such as ... Read More
7K+ Views
Let us understand the concepts of twisted pair cable, optical fiber cable and coaxial cable before learning the differences between them.Twisted Pair CableTwisted pair cable is made up of two insulated conductor wires twisted together.AdvantagesThe advantages of Twisted Pair cable are as follows −Inexpensive and readily available.FlexibleLight WeightEasy to setup and InstallIt supports Analog and digital transmission.DisadvantagesThe disadvantages of Twisted Pair cable are as follows −Low bandwidthNoise proneTransmission Limits.Fiber Optic CableFiber Optic Cable is made up of glass and the data signal travels in the form of light.AdvantagesThe advantages of Optical Fiber cable are as follows −Extremely high bandwidth.Easy to ... Read More
576 Views
Let us understand the concepts of data security and data privacy.Data SecurityIt uses physical and logical strategies to protect information from cyber attacks, and accidental or intentional data loss.It is a technology and technique which is use to prevent the following −Unauthorized accessIntentional loss of sensitive dataAccidental loss or corruption of sensitive dataSo, data security is a technologically sophisticated, holistic approach which secures every network, application, device and data repository in an enterprise IT infrastructure.Data security includes the followingPhysical access controls to serversMulti-factor Authentication (MFA) requirementsLeast-privilege access controlsPassword complexity requirementsData encryptionIdentification and remediation of stale dataData PrivacyData privacy is defined ... Read More
299 Views
To begin with, let us learn the concepts of data protection and data privacy.Data ProtectionData protection is inclusive of the strategies that we can use to secure the privacy, availability, and integrity of our data. It is also called data security or information privacy.Data protection is important for any organization which collects, handles, or stores sensitive data. This strategy can help prevent data loss, theft, or corruption and can help minimize damage caused by disaster.Data PrivacyData privacy is defined as only the authorised person can access the data. It is typically applied to personal health information (PHI), personally identifiable information ... Read More
5K+ Views
The three types of Carrier Sense Multiple Access (CSMA) Protocols are as follows −1-persistent CSMANon- Persistent CSMAp-persistent CSMA1-persistent CSMAIn this method, to transmit data the station wants to continuously sense the channel to check whether the channel is busy or idle.Suppose, if the channel is busy, then the station will wait until it becomes idle. Whenever the station detects an idle-channel, then it transmits the frame with probability. Therefore this persistence is called 1-persistent CSMA.The 1-persistent CSMA has the highest chance of collision because two or more stations identify a channel to be idle at the same time and transmit ... Read More
4K+ Views
The three types of Carrier Sense Multiple Access (CSMA) Protocols are as follows −1-persistent CSMANon- Persistent CSMAp-persistent CSMA1-persistent CSMAIn this method, to transmit data the station wants to continuously sense the channel to check whether the channel is busy or idle.Suppose, if the channel is busy, then the station will wait until it becomes idle. Whenever the station detects an idle-channel, then it transmits the frame with probability. Therefore this persistence is called 1-persistent CSMA.The 1-persistent CSMA has the highest chance of collision because two or more stations identify a channel to be idle at the same time and transmit ... Read More
286 Views
The Name Binding Protocol (NBP) allows you to bind a name to the internal storage address of the entity and register that mapping so that other entities can follow.An NBP name was displayed by the applications to the users and used addresses internally to locate entities. When we register the entity's name and address, NBP validates its uniqueness.Generally, an entity name consists of three fields, which are as follows −The object − Object field is used to identify the user of the system. Because of the applications this value is set to the owner name, where the user specifies with ... Read More
769 Views
A proxy server is a computer that offers a service to allow clients to make indirect network connections to the other network services. A client connects to the proxy server, and then requests a connection, file, or other resource available on a different server.Then the proxy provides the required resource either by connecting to the specified server or by obtaining through its cache.AdvantagesThe advantages of a proxy server are as follows −It helps the clients to protect their important information from getting hacked by hackers.The proxy server is also used to enhance the security and privacy level of the client's ... Read More
To Continue Learning Please Login
Login with Google