Security

Topics include firewalls, phishing, proxy servers, hacking and malware, data encryption, and more.

Pharming & Pharming Attacks

What is a Pharming Attack? Over the years, human technology has steadily progressed from one level to the next.  As well as being true in general, this is unfortunately also true in the world of cybercrime.  As the techniques cyber criminals use to execute their deceitful acts are exposed and regulated, they advance to new …

Read morePharming & Pharming Attacks

Computer Security

Computer Security is, basically speaking, the preservation of computing systems and the information that they save and / or retrieve. Computer Security is important as it enables people to perform their work and study.  It helps in the execution of essential business processes, and Safeguards confidential and sensitive information. Computer Security is important enough that …

Read moreComputer Security

Secure Sockets Layer (SSL)

Secure Sockets Layer (SSL) is a computer networking procedure for safeguarding connections between network application clients and servers over a vulnerable network, like the internet.  Because of several procedure and execution defects and weaknesses, SSL was disapproved for use on the internet by the Internet Engineering Task Force (IETF) in 2015, and has since been replaced by the Transport Layer …

Read moreSecure Sockets Layer (SSL)

DOS (denial-of-service) Attack

A DOS (denial-of-service) attack transpires when an attacker does something that prevents valid users from making use of computer systems, devices, or other network resources. DOS attacks naturally deluge servers, systems, or networks with traffic in order to overpower the victim resources and make it tough (or even impossible) for valid users to use them.  Often …

Read moreDOS (denial-of-service) Attack

Asymmetric Encryption

Encryption is the process of taking a message and scrambling its contents so that only certain people can look at what’s inside. Two Types of Encryption Symmetric encryption Asymmetric encryption Asymmetric encryption was created to solve the problem brought about by Symmetric encryption.  Let’s look at this illustration.  User 1 has a sensitive document that …

Read moreAsymmetric Encryption

Biometrics

Biometrics comes from the words bio and metric.  Bio means life while metric means to measure. The biometric system links an event to one individual, while other ID forms, like the personal identification number (PIN), may be used by anyone. Types of Biometrics Physiological identifiers – associated with the structure of the user is confirmed …

Read moreBiometrics

Symmetric Encryption

Symmetric encryption is a form of encryption whereby the same key is used to encrypt and decrypt the message.  This is different from asymmetric or public-key encryption, which uses one key to encrypt a message and another key to decrypt the message. Symmetric encryption is a kind of computerised cryptography, which uses a particular encryption key to conceal the contents …

Read moreSymmetric Encryption

Firewalls

A firewall is a security system developed to block a connection to or from a private network.  Firewalls can be enforced as either hardware or software, or a combination of both hardware and software. Network firewalls are utilised to prohibit unauthorised internet users from accessing private networks or intranets connected to the internet.  All messages passing through the intranet, whether …

Read moreFirewalls