Found 168 Articles for System Security

How to Become an Ethical Hacker?

Revathy Nair
Updated on 20-Apr-2022 07:41:03

145 Views

Who is an Ethical Hacker?An Ethical Hacker is scrutinized as a security executive who perform security assessment to protect client’s computer or application from potential security risks and vulnerabilities. Organizations employs ethical hackers to protect their computers and other systems in the network from cyberattacks, and any external and internal risks in the IT infrastructure.A hacker usually tries to gain unauthorized access to a computer system or application; whereas an ethical hacker imparts hack-preventing tactics, installing several technologies to protect the system before falling victim to the hacker.Through this outlook, an ethical hacker can set up a defense team to ... Read More

What are the differences between Spyware and Trojan Horse?

Bhanu Priya
Updated on 25-Mar-2022 06:47:56

637 Views

Let us understand the concepts of Spyware and Trojan Horse before learning the differences between them.SpywareIt is a software program which can be installed on some user's personal computer or organization without their knowledge to gather personal information or view their browsing activities.We can defend Spyware by doing proper internet browsing, not clicking unwanted suspicious links, not clicking any download or accept buttons, and not agreeing to unwanted information.We can remove Spyware by using proper antivirus scan. After disconnecting from the internet remove any unwanted or added programs in the control panel and reboot system and do proper antivirus scan ... Read More

What are the differences between Malware and Ransomware?

Bhanu Priya
Updated on 24-Mar-2022 13:26:27

203 Views

Let us understand the concepts of Malware and Ransomeware before learning the differences between them.MalwareMalware is called as malicious software which refers to a program that can infect a legitimate user's computer and harm on it in different ways. It can infect computers and devices in several ways and comes in a number of forms, just a few of which can include viruses, worms, Trojan horses and more.Computer viruses are probably the most familiar type of malware — so named because they spread by making copies of themselves. Worms also have a similar property. Spyware transmits personal information such as ... Read More

What are the differences between twisted pair cable, Optical fiber cable, and Coaxial cable?

Bhanu Priya
Updated on 22-Mar-2022 05:57:49

7K+ Views

Let us understand the concepts of twisted pair cable, optical fiber cable and coaxial cable before learning the differences between them.Twisted Pair CableTwisted pair cable is made up of two insulated conductor wires twisted together.AdvantagesThe advantages of Twisted Pair cable are as follows −Inexpensive and readily available.FlexibleLight WeightEasy to setup and InstallIt supports Analog and digital transmission.DisadvantagesThe disadvantages of Twisted Pair cable are as follows −Low bandwidthNoise proneTransmission Limits.Fiber Optic CableFiber Optic Cable is made up of glass and the data signal travels in the form of light.AdvantagesThe advantages of Optical Fiber cable are as follows −Extremely high bandwidth.Easy to ... Read More

Differentiate between Data Privacy and Data Security.

Bhanu Priya
Updated on 21-Mar-2022 13:21:09

576 Views

Let us understand the concepts of data security and data privacy.Data SecurityIt uses physical and logical strategies to protect information from cyber attacks, and accidental or intentional data loss.It is a technology and technique which is use to prevent the following −Unauthorized accessIntentional loss of sensitive dataAccidental loss or corruption of sensitive dataSo, data security is a technologically sophisticated, holistic approach which secures every network, application, device and data repository in an enterprise IT infrastructure.Data security includes the followingPhysical access controls to serversMulti-factor Authentication (MFA) requirementsLeast-privilege access controlsPassword complexity requirementsData encryptionIdentification and remediation of stale dataData PrivacyData privacy is defined ... Read More

Distinguish between Data Privacy and Data Protection.

Bhanu Priya
Updated on 21-Mar-2022 13:18:42

299 Views

To begin with, let us learn the concepts of data protection and data privacy.Data ProtectionData protection is inclusive of the strategies that we can use to secure the privacy, availability, and integrity of our data. It is also called data security or information privacy.Data protection is important for any organization which collects, handles, or stores sensitive data. This strategy can help prevent data loss, theft, or corruption and can help minimize damage caused by disaster.Data PrivacyData privacy is defined as only the authorised person can access the data. It is typically applied to personal health information (PHI), personally identifiable information ... Read More

What are the differences between 1-Persistent and Non-Persistent CSMA?

Bhanu Priya
Updated on 21-Mar-2022 12:50:07

5K+ Views

The three types of Carrier Sense Multiple Access (CSMA) Protocols are as follows −1-persistent CSMANon- Persistent CSMAp-persistent CSMA1-persistent CSMAIn this method, to transmit data the station wants to continuously sense the channel to check whether the channel is busy or idle.Suppose, if the channel is busy, then the station will wait until it becomes idle. Whenever the station detects an idle-channel, then it transmits the frame with probability. Therefore this persistence is called 1-persistent CSMA.The 1-persistent CSMA has the highest chance of collision because two or more stations identify a channel to be idle at the same time and transmit ... Read More

Differentiate between 1-Persistent and p-Persistent CSMA

Bhanu Priya
Updated on 21-Mar-2022 12:47:19

4K+ Views

The three types of Carrier Sense Multiple Access (CSMA) Protocols are as follows −1-persistent CSMANon- Persistent CSMAp-persistent CSMA1-persistent CSMAIn this method, to transmit data the station wants to continuously sense the channel to check whether the channel is busy or idle.Suppose, if the channel is busy, then the station will wait until it becomes idle. Whenever the station detects an idle-channel, then it transmits the frame with probability. Therefore this persistence is called 1-persistent CSMA.The 1-persistent CSMA has the highest chance of collision because two or more stations identify a channel to be idle at the same time and transmit ... Read More

What is NBP?

Bhanu Priya
Updated on 21-Mar-2022 12:38:48

286 Views

The Name Binding Protocol (NBP) allows you to bind a name to the internal storage address of the entity and register that mapping so that other entities can follow.An NBP name was displayed by the applications to the users and used addresses internally to locate entities. When we register the entity's name and address, NBP validates its uniqueness.Generally, an entity name consists of three fields, which are as follows −The object − Object field is used to identify the user of the system. Because of the applications this value is set to the owner name, where the user specifies with ... Read More

What is a Proxy Server?

Bhanu Priya
Updated on 21-Mar-2022 11:37:12

769 Views

A proxy server is a computer that offers a service to allow clients to make indirect network connections to the other network services. A client connects to the proxy server, and then requests a connection, file, or other resource available on a different server.Then the proxy provides the required resource either by connecting to the specified server or by obtaining through its cache.AdvantagesThe advantages of a proxy server are as follows −It helps the clients to protect their important information from getting hacked by hackers.The proxy server is also used to enhance the security and privacy level of the client's ... Read More

Advertisements