What is Vulnerability Assessment?
The Information System is an integrated set of the component for collecting, storing, processing and communicating information. There are various phases involved in making an information system. One of such phases includes a review of the system security. All systems are prone to attacks like Cross-site scripting(XSS) and SQL injection. Thus, it is important that the organization reviews the system for possible threats beforehand. This helps in identifying the vulnerabilities and weaknesses of the system. This kind of systematic review of a system is called vulnerability assessment....
read more
Types of Phishing Attacks and How to Identify them
Phishing is a kind of cyberattack that is used to steal users’ information including login details and credit card numbers. Most of the data breaches involve scams seeking to steal people’s sensitive information or login credentials, which is a type of phishing attack. A phishing attack can be carried out with the help of fake emails and cloning legitimate websites and tricking the user into revealing sensitive information....
read more
How to calculate Maximum Segment Size in TCP?
Maximum Segment Size refers to size of the largest segment that local host accepts within a single packet. It denotes largest amount of data that host can accept in single TCP segment....
read more
Infrared light for Transmission
Infrared light for Transmission :Infrared is the frequency of light that is not visible to the eyes .The frequency of the waves lies between three hundred gigacycles to four hundred THz. In this, the radiation is in the region of the electromagnetic spectrum . Infrared could be a communication medium whose properties are considerably totally different from those of radio frequencies. The necessary property of the infrared is that it cannot penetrate through walls. Which suggests that it is often simply contained inside a space. Because of this property, the infrared is often used in a way that reduces interference and the chance of reprocessing of a similar band in numerous rooms....
read more
OpenVAS : Security Assessment
OpenVAS is an open-source vulnerability scanning and management tool that helps to identify security issues like misconfigurations, outdated software, and weak passwords that could be exploited by attackers. OpenVAS is widely used by security professionals to assess and improve the security posture of their networks and is known for its effectiveness and flexibility. This article explores how OpenVAS works, its features, and how it can be used to enhance cybersecurity....
read more
How Security System Should Evolve to Handle Cyber Security Threats and Vulnerabilities?
Stories of organizations paralyzed by cybersecurity threats and vulnerabilities are at their peak. According to a report published by Symantec Corp, India is one of the top five countries that have become the victim of cyber crime.  Nowadays, modern technologies such as cloud computing, IoT, cognitive computing, etc. are categorized as the critical assets of any organization. With the increase in the use of advanced technology and interconnected applications, there is a rapid spike not only in businesses but also in threats and vulnerabilities as well....
read more
Future of Cloud Computing
Almost everything in digital world is connected to cloud in some way or other unless it’s specifically kept in local storage for security reasons. Let’s take look at advantages of Cloud Computing before discussing the future of cloud....
read more
Difference between HDMI and VGA
1. HDMI : HDMI stands for High-Definition Multimedia Interface. Through this, audio and video are simultaneously transmitted by cable. It combines audio and video into a single digital interface in DTV player, DVD player, HDTVs, set-top box and other audiovisual devices. It is the core technology of High bandwidth digital content core protection and digital visual interface. It is the core technology of High bandwidth digital content core protection and digital visual interface....
read more
Difference between PCI and PCI-X
1. Peripheral Component Interconnect (PCI) : Peripheral Component Interconnect or PCI in abbreviated form is a computer bus to connect the hardware devices in a computer system. Conventional PCI is the other name for PCI. PCI is designed as a parallel bus and has a single bus clock which allocates the time quantum. PCI was introduced in the year 1992 by Intel. The standard width of a PCI bus is either 32 or 64 bits. Hotplugging is a feature that is optional in a PCI....
read more
What is UTP(Unshielded Twisted Pair)?
As areas of human enterprise throw open new doors of possibilities, one must stop to examine how exactly that comes to be before one overzealously steps over the bounds of human ingenuity that demarcate and define these new arenas. The Unshielded Twisted Pair has made a lot of modern technology functional and is hence an integral part of the same. Since an Unshielded Twisted Pair is a very basic component, it is widely used by people today and because of its advantages, it is also preferred by some as compared to the other alternatives out there....
read more
Difference between GPS and Satellite Navigation System
Global Positioning System (GPS): Global Positioning System provides time and location-based information to a GPS receiver, located anywhere on or near the earth surface. GPS works in all weather conditions, provided there is an unobstructed line of sight communication with 4 or more GPS satellites. GPS uses a constellation of at least 24 satellites in orbit around the Earth. These satellites transmit signals that are received by GPS receivers on the ground. By comparing the timing of the signals from different satellites, the GPS receiver can determine the distance to each satellite and calculate its own position on the Earth’s surface....
read more
Sinkhole Attack in Wireless Sensor Networks
Sinkhole attacks are carried out by either hacking a node in the network or introducing a fabricated node in the network.The malicious node promotes itself as the shortest path to the base station and tries to guide the traffic from other nodes towards itself. This not only lures all the nodes near the sinkhole but also each and every node closer to the base station than the sinkhole.The intruder node or the sinkhole can then easily alter the data compromising the security of the network. Sinkhole attack can be initiated from within the network as well as from outside. In the first scenario the attacker may use a bugged node to begin the intrusion and in the second case the invader may form a direct path to the base station through it tempting other nodes to send their traffic through it....
read more