Pranavnath has Published 448 Articles

Trusted Systems in Network Security

Pranavnath

Pranavnath

Updated on 28-Mar-2023 17:24:16

3K+ Views

The term “Trusted system” means that it provides the user with an assurance that no malicious or harmful software affects the computer system. Network Security plays a vital role in many organizations, to keep the data safe and secure from being attacked by cyberattacks or malware. Now Companies are using ... Read More

Transmission mode

Pranavnath

Pranavnath

Updated on 28-Mar-2023 17:22:31

2K+ Views

Communication is defined as the transfer or sharing of data between any two individuals through a medium and the medium can be wired or wireless. In a computer network, the OSI (Open System Interconnection) model has seven layers for the communication networks. The First layer of OSI is the Physical ... Read More

Types of Network Topology

Pranavnath

Pranavnath

Updated on 28-Mar-2023 17:19:36

611 Views

The topology means that the elements are arranged in a particular order. They are divided into two type’s namely physical and logical topology. The nodes in the network are connected physically and the information flows through the network logically. In a computer network, the node is a point that connects ... Read More

Types of Viruses

Pranavnath

Pranavnath

Updated on 28-Mar-2023 17:17:24

5K+ Views

The Virus is a type of code that enters the system along with any file or programs and carries out malfunctions in the system. The virus-affected program will be a replica of the existing program. They enter the system through any file and when the file runs, parallelly the virus ... Read More

Types of Internet Connection

Pranavnath

Pranavnath

Updated on 28-Mar-2023 17:15:06

3K+ Views

In this article, we will discuss the various types of internet connections. The Internet provides customers to access and transfer data between users worldwide. Internet connections vary according to the area, availability, and usage. The benefits of having Internet connections help people to access any people easily and quickly. Some ... Read More

Trojan horse and Trap Door

Pranavnath

Pranavnath

Updated on 28-Mar-2023 17:12:31

2K+ Views

A threat is designed by hijackers to change the behavior of the process. The threat can reach the system through any path to our system or any organization sever. When the attack happens, it leads to the corruption of data, the stealing of personal information, and the loss of data. ... Read More

Types of Cyber Attacks

Pranavnath

Pranavnath

Updated on 28-Mar-2023 17:10:05

800 Views

In the digital world, everybody is accessible to applications, digital systems, and software. We get the details of the things we want easily on the internet today, so it is a positive change in our lives. But compared to the positive one, we should deal with the negative thing also. ... Read More

Top 10 Common Security Log Sources

Pranavnath

Pranavnath

Updated on 28-Mar-2023 17:07:24

697 Views

In this article, we will see the top 10 common security log sources that are being developed and used by companies. Log Sources are a type of data source that creates an event log in an organization. The log is nothing but the records with data. An event log is ... Read More

Advertisements