Skip to main content

Posts

Network Security Threats

Network Security Threats Introduction: Security plays a very critical role in safeguarding networks that are connecting more and more people every day. Information that is being exchanged between networked computers is very vulnerable to attacks. This increases the security challenges for network security  professionals to protect the information and  identity of users connected globally. Network  security is needed in almost every field  and includes small and large organizations,  governmental  entities, homes, and  even countries at large.  Over the last few years, it has been observed that there is a massive increase in hacking and other malicious activities. Moreover, many threats are being created for the sole purpose of acquiring the personal information of users. Therefore, it is important to use a security program that can provide complete proactive protection, i.e., it can safeguard you before you get infected. In this chapter, we look at the categories of network security th
Recent posts

Exploring Electronic Mail

Introduction   Email is the most commonly used mode of communication today. Information is communicated over email in different forms such as text, images, audio, and video. It is the main resource for business communication. As it has become an undetachable medium of communication, it attracts criminals or persons having malicious intent. Cybercriminals use email for sending spam, threats, phishing emails, propagating malicious software like viruses and worms, distributing illegitimate material like child pornography, and hoaxes, and using it for other criminal activities. Therefore, it is necessary to secure our email system and to identify criminals, collect evidence against them and bring them to justice in a court of law. Emails suffer from multiple threats and there are several tools available in the market for fighting such threats. To secure emails, we need a multi-pronged approach. Multiple safety measures need to be implemented to have a safe online experience. In this chapte

What is Cybersecurity....?

what is Cybersecurity..?   In simple term, cybersecurity is the protection of your cyber (or digital) assets or information system from attacks or unauthorised access that are aimed for exploitation. In other word, it means keeping everything  you to do online safe, so no one steals your financial and personal to use for their own gain. The panama Papers, yahoo hack and Ashley Madison data breaches are to name a few of the recent high profile cyber attacks which have caused a great deal of damage to organization and common people  The term 'cybersecurity' was coined in 1988 as a result of one of the first ever registered online virus: The Morris worm.  The worm caused many computers connected to the Internet at the time to slow down to the point that they wear unusable. more recently, cybersecurity has come to signify a form of protection      from attacks designed to paralyse websites, financial network and other computer systems; by flooding them with data from outside compu

Introduction of First Internet Network

 Iam deva borde and Iam a hacker certified by star certifiction   The Internet was not originally built to be what it is today. It was developed when computers  were hugs  and so expensive to own that only university, big business and a few governments had them. Originally, the the internet was designed to facilitate these massive computers to  communication each other by sending information (mainly text) back and forth. with the internet, the network began to take shape. It was only in 1969, the advanced Research Project Agency  Network (ARPANET)-------the first computer network was built.                                                             The Internet gradually grew, until the emergency og personal computer in the 1980s, and then it became widespread.  ABOUT ARPANET : The  ARPANET  (an Advanced Research Projects Agency for  Advanced Research Projects Agency Network ) was the first wide-area packet-swithing network with distributed control and one of the first networks to imp