Security

Topics include firewalls, phishing, proxy servers, hacking and malware, data encryption, and more.

Biometrics

Biometrics comes from the words bio and metric.  Bio means life while metric means to measure. The biometric system links an event to one individual, while other ID forms, like the personal identification number (PIN), may be used by anyone. Types of Biometrics Physiological identifiers – associated with the structure of the user is confirmed …

Read moreBiometrics

DOS (denial-of-service) Attack

A DOS (denial-of-service) attack transpires when an attacker does something that averts valid users from retrieving computer systems, devices or other network resources. DOS attacks naturally deluge servers, systems or networks with traffic in order to overpower the victim resources and make it tough or impossible for valid users to use them.  Often an attack can …

Read moreDOS (denial-of-service) Attack

Pharming & Pharming Attacks

What is a Pharming Attack? Over the years, humanity has technologically progressed from one level to the next.  This is also true in the world of cybercrime.  As the techniques cyber criminals use to execute their deceitful acts are exposed, they advance to new techniques.  Pharming attacks are a typical example.  Pharming is a more …

Read morePharming & Pharming Attacks

Computer Security

Computer Security is the preservation of computing systems and the information that they save or retrieve. Computer Security is important as it enables people to perform their work and study.  It helps in the execution of essential business processes.  It safeguards confidential and sensitive information. Computer Security should be learned by everyone.  Only 10% of …

Read moreComputer Security

Asymmetric Encryption

Asymmetrical encryption, also known as public key cryptography, is a relatively new technique, compared to symmetric encryption.  Asymmetric encryption utilises two keys to encrypt a plain text.  Private keys are exchanged over the internet or a large network.  It guarantees that malicious persons do not misuse the keys.  It is significant to note that anyone …

Read moreAsymmetric Encryption

Symmetric Encryption

Symmetric encryption is a form of encryption where the same key is used to encrypt and decrypt the message.  This contrasts from asymmetric or public-key encryption, which uses one key to encrypt a message and another key to decrypt the message. Symmetric encryption is a kind of computerized cryptography using a particular encryption key to conceal an electronic message.  Its …

Read moreSymmetric Encryption

Secure Sockets Layer (SSL)

Secure Sockets Layer (SSL) is a computer networking procedure for safeguarding connections between network application clients and servers over a vulnerable network like the internet.  Because of several procedure and execution defects and weaknesses, SSL was disapproved for use on the internet by the Internet Engineering Task Force (IETF) in 2015 and has been replaced by the Transport Layer Security …

Read moreSecure Sockets Layer (SSL)

Firewalls

A firewall is a security system developed to block a connection to or from a private network.  Firewalls can be enforced as either hardware or software, or a combination of both hardware and software. Network firewalls are utilised to prohibit unauthorised internet users from accessing private networks or intranets connected to the internet.  All messages passing through the intranet, whether …

Read moreFirewalls