Data Structure
Networking
RDBMS
Operating System
Java
MS Excel
iOS
HTML
CSS
Android
Python
C Programming
C++
C#
MongoDB
MySQL
Javascript
PHP
- Selected Reading
- UPSC IAS Exams Notes
- Developer's Best Practices
- Questions and Answers
- Effective Resume Writing
- HR Interview Questions
- Computer Glossary
- Who is Who
Ginni has Published 1519 Articles
Ginni
629 Views
ISO 27001 is the international standard that supports a framework for Information Security Management Systems (ISMS) to support continued confidentiality, integrity and availability of information and legal compliance.ISO 27001 certification is essential for protecting the most vital assets like employee and client data, brand image and other private data. The ... Read More
Ginni
2K+ Views
A methodology is a targeted build that represents specific practices, processes, and rules for accomplishment or execution of a specific task or function. There are several methodologies for information system security which are as follows −INFOSEC Assessment Methodology (IAM) − Its objective is to provide a method that can be ... Read More
Ginni
726 Views
In software development, a framework is a defined preserved mechanism in which another software project can be managed and developed. This definition seems to be promising as it hints that a framework provides more analyse and construction than a model.While a model is abstract and intangible, a framework is linked ... Read More
Ginni
391 Views
Information security is a set of practices designed to maintain personal data secure from unauthorized access and alteration during saving or sending from one place to another.Information security is designed and implemented to secure the print, electronic and other private, sensitive and personal information from unauthorized persons. It can be ... Read More
Ginni
8K+ Views
A security model is a computer model which can be used to identify and impose security policies. It does not need some prior formation it can be founded on the access right model or analysing computing model or computation model.A security model is a structure in which a security policy ... Read More
Ginni
614 Views
There are some elements of database security policy which are as follows −Acceptable Use − Anyone who has logged in to a corporate web over the last 10-15 years has likely been accepted with an acceptable use policy pop-up. The acceptable use policy represent proper and improper behavior when users ... Read More
Ginni
2K+ Views
Database security defines the collective measures used to protect and secure a database or database management software from unauthorized use and malicious cyber threats and attacks. Database security is a layer of information security. It is generally concerned with physical protection of data, encryption of data in storage and data ... Read More
Ginni
722 Views
Enterprise security is a multi-faceted concern that involves both the internal or proprietary business secrets of a company and the employee and user data associated to privacy laws. Enterprise security is targeted on data center, networking, and network server operations in practice, but technically start with human resources.Social engineering is ... Read More
Ginni
229 Views
There are various security approaches for mobile database environment which are as follows −Transparencies − There are basic security challenges tightening up because of mobility. It contained in these challenges is the dispute of transparencies, the transparency in the database sense against the transparency in the privacy sense. The first ... Read More
Ginni
392 Views
There are some security issues in mobile database environment which are as follows −Data Security in mobile data transfer − Disconnections appear of ten in wireless communication. They can be forced by the user because of storing communication costs or be persuaded by faults. This situation can expose the data ... Read More