Uday Mitra has Published 86 Articles

Importance of Formal Information Security Education

Uday Mitra

Uday Mitra

Updated on 26-Dec-2022 15:15:29

103 Views

Having the right people learn the right things and having metrics in place to ensure knowledge transfer has occurred are both crucial reasons why formal information security education (here understood to mean attending classes in person, participating in online training courses either live or via recordings, or self-learning via printed ... Read More

How to Detect and Manage Common DevSevOps Application Security Threats?

Uday Mitra

Uday Mitra

Updated on 26-Dec-2022 15:12:38

77 Views

It's terrifying that applications can have security flaws. The likelihood of a highly publicized data breach can be reduced if mistakes are avoided during the application's development, testing, and release phases. Security in applications should never be an afterthought or a negotiating point while developing new features or improving performance. ... Read More

Difference between Ethical Hacker and Forensic Investigator

Uday Mitra

Uday Mitra

Updated on 26-Dec-2022 15:09:36

449 Views

The protection of sensitive customer data is of the utmost significance in the context of today's information-driven economy. Everyone who works for a company shares some degree of responsibility for guarding the company's sensitive information against unauthorized access by outside parties such as hackers. As the practice of social engineering ... Read More

Steps to become a successful paid Ethical Hacker

Uday Mitra

Uday Mitra

Updated on 26-Dec-2022 15:04:06

109 Views

In the history of the internet, network security has always been a problem. The field of ethical hacking has gained significant traction over the last few decades. While malevolent hackers want to gain access to systems for their gain, ethical hackers seek to keep those systems secure from harm. Ethical ... Read More

Everything about Ransomware – Definition, Types, and Prevention

Uday Mitra

Uday Mitra

Updated on 26-Dec-2022 14:53:59

141 Views

While the term "ethical hacker" may sound contradictory, there is a high need for skilled computer users who can assist businesses in identifying security holes, fortifying their networks, and preventing ransomware assaults. When ransomware attacks a computer, it encrypts the user's files so that the user can no longer access ... Read More

Ethical Hacking - A boon to career growth

Uday Mitra

Uday Mitra

Updated on 26-Dec-2022 14:36:08

158 Views

The topic of cyber security is rapidly developing, making it an exciting time to be a computer scientist. The Internet of Things (IoT) and smartphones have become information supercomputers in the digital world. The Cisco research predicts that by 2030, there will be 500 billion internet-connected devices. Furthermore, Cisco's Annual ... Read More

Opportunities for Certified Ethical Hackers (CEH)

Uday Mitra

Uday Mitra

Updated on 26-Dec-2022 14:24:49

132 Views

A recent study conducted by KPMG found that even though 94% of businesses in all industries consider cybercrime to be their primary security concern, 72% of those same businesses have been the target of a cyberattack in the previous year, and 78% of those still don't have a cyber-incident response ... Read More

Ethical Hacking Roadmap - 5 Phases to Success

Uday Mitra

Uday Mitra

Updated on 26-Dec-2022 14:19:51

735 Views

Security breaks do occur. It's a problem that every company has to solve today. Price Waterhouse Coopers' latest "The Global State of Information Security Survey 2018" reveals that security threats posed by emerging technologies like automated or robotic systems have the attention of corporate leaders. For instance, over 32% of ... Read More

DES (Data Encryption Standard) - DES Algorithm and Operation

Uday Mitra

Uday Mitra

Updated on 13-Dec-2022 13:52:50

2K+ Views

Data Encryption Standard, or DES, is a type of encryption cipher that shields and disguises sensitive information, so it can't be seen or retrieved by cyberattacks.DES can be described as a block cipher, encryption/ symmetric -key algorithm. A symmetric key means the same algorithm/key is used for encryption and decryption. ... Read More

What is COBIT? Understanding the COBIT Framework

Uday Mitra

Uday Mitra

Updated on 12-Dec-2022 11:55:12

299 Views

Have you been hearing all about COBIT but need to be more knowledgeable about what all this tech talk means? This article breaks down COBIT and its importance in today's IT-centred world. What is COBIT? COBIT acronym represents "Control Objectives for Information and Related Technology." It is a support structure ... Read More

Previous 1 ... 3 4 5 6 7 ... 9 Next
Advertisements