Ayushi Bhargava has Published 143 Articles

Emotet Malware: How Does It Spread, How to Protect Yourself

Ayushi Bhargava

Ayushi Bhargava

Updated on 05-Aug-2022 11:45:41

296 Views

Emotet is a type of computer virus that was initially created as a banking Trojan. Accessing overseas devices and spying on private information were the objectives. Basic antivirus programs have been reported to be tricked by Emotet, which then hides from them. Once activated, the malware spreads like a computer ... Read More

Doxing: Techniques Used, How to Know Your Risk of Being Doxed

Ayushi Bhargava

Ayushi Bhargava

Updated on 05-Aug-2022 11:42:42

610 Views

Doxxing, often known as "doxing, " is the act of disclosing personal information about another person online, including their proper name, address, phone number, and financial and other details. Without the victim's consent, the public is then given access to that information. Recently, doxing has been used as a weapon ... Read More

Can Mobile Devices Get Malware?

Ayushi Bhargava

Ayushi Bhargava

Updated on 05-Aug-2022 11:29:09

596 Views

Can Viruses Infect Phones? The quick response is − not really. There are no viruses known to exist for iOS or Android as of yet. There aren't any known traditional viruses for mobile devices yet. A virus is typically defined as malicious computer software that copies itself as it executes. ... Read More

What is CIA Triad in Information Security?

Ayushi Bhargava

Ayushi Bhargava

Updated on 04-May-2022 14:19:29

5K+ Views

The CIA Triad is a concept in information security. It guides an organization's data security operations. The 3 letters in CIA stand for confidentiality, integrity, and availability. They are the three pillars of a security architecture. In fact, applying these concepts to any security program is optimal.When working as a ... Read More

Why You Should Use an Anonymous Proxy Server?

Ayushi Bhargava

Ayushi Bhargava

Updated on 04-May-2022 14:17:46

674 Views

It's difficult to talk about internet security without mentioning a proxy server or a virtual private network (VPN). These two programs give you anonymity while you do your daily internet activity. Both technologies work in the same way to keep you anonymous on the Internet. Proxies and VPNs disguise your ... Read More

What is an IP Flood?

Ayushi Bhargava

Ayushi Bhargava

Updated on 04-May-2022 14:15:10

2K+ Views

IP FloodAn IP Flood is a type of malicious assault that can affect a single device or a whole network. This is a Denial of Service (DoS) attack that seeks to prevent a device from performing its usual functions, such as delivering requests or processing data. In an IP flood ... Read More

What is Information System Resilience?

Ayushi Bhargava

Ayushi Bhargava

Updated on 04-May-2022 14:13:22

651 Views

The resilience of an Information System is its capacity to function in adverse conditions or under stress, while preserving critical operational capabilities. In general, a system is resilient if it continues to fulfil its objective despite hardship (i.e. if it provides required capabilities despite excessive stress that can cause disruptions).Being ... Read More

Intellectual Property: Definition, Types, How to Protect

Ayushi Bhargava

Ayushi Bhargava

Updated on 04-May-2022 14:09:49

4K+ Views

What is Intellectual Property?Intellectual property refers to a company's or an individual's collection of intangible assets that are legally protected against unauthorized use or use. An intangible asset is a non-physical asset possessed by a company or individual. Intellectual property refers to the concept of protecting some products of human ... Read More

What is Intrusion Detection in Cyber Security?

Ayushi Bhargava

Ayushi Bhargava

Updated on 04-May-2022 14:06:39

5K+ Views

What is Intrusion in Cyber Security?Any illicit behavior on a digital network is known as a network intrusion. Network incursions frequently include the theft of important network resources, which virtually always compromise the network and/or data security. This can take the shape of more dangerous and pervasive threats like ransomware ... Read More

What is IP Spoofing? (Process and How to Prevent)

Ayushi Bhargava

Ayushi Bhargava

Updated on 04-May-2022 14:03:57

2K+ Views

What is IP Spoofing?IP spoofing, also known as "IP address spoofing", is the process of sending Internet Protocol (IP) packets with a fake source IP address in order to mimic another computer system. Cybercriminals can use IP spoofing to carry out harmful acts without being detected. It's possible that someone ... Read More

Previous 1 ... 3 4 5 6 7 ... 15 Next
Advertisements