Security

Topics include firewalls, phishing, proxy servers, hacking and malware, data encryption, and more.

Firewall

For specific organizations, Internet access is no longer a choice. Although internet connectivity allows an entity with advantages, it helps the exterior community to enter and communicate with local network infrastructure. This establishes the organization’s hazard. While any device and server may be fitted with robust, secure functionalities like intrusion prevention on the premises network, …

Read more

Proxy Servers – Forward & Reverse Proxy Servers

Proxy Servers Proxy servers are similar to a web browser.  Whenever you look at a web page, your web browser stores that web page into a cache, so that at a later time, if you are to look at the web page again, your browser retrieves it much faster. This increased speed comes as a …

Read more

Pharming and Pharming Attacks

What is a Pharming Attack? Over the years, human technology has steadily progressed from one level to the next.  As well as being true in general, this is unfortunately also true in the world of cybercrime.  As the techniques cybercriminals use to execute their deceitful acts are exposed and regulated, they advance to new techniques.  …

Read more

Computer Security

Computer Security is, basically speaking, the preservation of computing systems and the information that they save and / or retrieve. Computer Security is important as it enables people to perform their work and study.  It helps in the execution of essential business processes, and Safeguards confidential and sensitive information. Computer Security is important enough that …

Read more

Secure Sockets Layer (SSL)

Secure Sockets Layer (SSL) Secure Sockets Layer (SSL) is a computer networking procedure for safeguarding connections between network application clients and servers over a vulnerable network, like the internet.  Because of several procedures and execution defects and weaknesses, SSL was disapproved for use on the internet by the Internet Engineering Task Force (IETF) in 2015 and has since been replaced …

Read more

DOS (denial-of-service) Attack

A DOS attack (denial-of-service) transpires when an attacker does something that prevents valid users from making use of computer systems, devices, or other network resources. DOS attacks naturally deluge servers, systems, or networks with traffic in order to overpower the victim resources and make it tough (or even impossible) for valid users to use them.  Often …

Read more

Asymmetric Encryption

Encryption is the process of taking a message and scrambling its contents so that only certain people can look at what’s inside. In this article, we’re going to focus on asymmetric encryption. Two Types of Encryption Symmetric encryption Asymmetric encryption Asymmetric encryption was created to solve the problem brought about by Symmetric encryption.  Let’s look …

Read more

Biometrics

Biometrics comes from the words bio and metric.  Bio means life while metric means to measure. The biometric system links an event to one individual, while other ID forms, like the personal identification number (PIN), may be used by anyone. Types of Biometrics Physiological identifiers – associated with the structure of the user is confirmed …

Read more

Symmetric Encryption

Symmetric encryption is a form of encryption whereby the same key is used to encrypt and decrypt the message.  This is different from asymmetric or public-key encryption, which uses one key to encrypt a message and another key to decrypt the message. Symmetric encryption is a kind of computerised cryptography, which uses a particular encryption key to conceal the contents …

Read more

Firewalls

A firewall is a security system developed to block a connection to or from a private network.  Firewalls can be enforced as either hardware or software or a combination of both hardware and software. Network firewalls are utilised to prohibit unauthorised internet users from accessing private networks or intranets connected to the internet.  All messages passing through the intranet, whether …

Read more