What is FireWall?

FireWall

Firewalls are hardware and/or software designed to prevent unauthorized access to or from a private network. Firewalls examine all messages entering or leaving the Intranet and blocks those that do not meet the specified security criteria. They are placed at junction or gateway between the two networks, which is usually a private network and a public network such as the internet. Firewalls may be concerned with the type of traffic or with the source or destination addresses and ports. How Firewall Protect From Following Risk Access by untrusted entities Firewalls…

Read More

Cloud Computing

Cloud Computing

Cloud Computing technology is the most popular now a day because of it flexibility and mobility support. Cloud Computing allows the access to personal and shared resources with minimal management. It often Relies on the internet. There is also third-party cloud solution available which saves expanding resources and maintenance. Most appropriate example of cloud computing is Amazon Elastic Cloud Compute (EC2), highly capable, low cost, and flexible. Cloud computing is an on-demand delivery of IT capabilities where IT infrastructure and applications are provided to subscribers as a metered service over…

Read More

Cryptography

Cryptography

Cryptography is the conversion of data into a scrambled code that is decrypted and sent across a private or public network. Cryptography is used to protect confidential data such as email messages, chat sessions, web transactions, personal data, corporate data, e-commerce applications, etc. Objectives Confidentiality Authentication Integrity Non-repudiation Types Of Cryptography Symmetric Encryption Symmetric encryption (secret-key, shared-key, public-key) uses the same key for encryption as it does for decryption. Asymmetric Encryption Asymmetric encryption (public-key) uses different encryption keys for encryption and decryption. These keys are known as public and private…

Read More

Penetration Testing

Penetration Testing

Penetration testing is a method of evaluating the security of an information system or network by simulating an attack to find out vulnerability that an attacker could exploit. Security Measures are actively analyzed for design weaknesses, technical flaws and vulnerabilities. A penetration test will not only point out vulnerabilities, but will also document how the weaknesses can be exploited. The results are delivered comprehensively in a report, to executive management and technical audiences. Why Penetration Testing Identify the threats facing an organization’s information assets. Reduce an organization’s expenditure on IT…

Read More

What is Ethical Hacking?

What is Ethical Hacking?

Ethical Hacking involves the use of hacking tools, tricks, and techniques to identify vulnerability so as to ensure system security. It Focuses on simulating techniques used by attackers to verify the existence of exploitable vulnerabilities in the system security. Ethical Hackers performs security assessment of thier organization with the permission of concerned authorities. Why Ethical Hacking Is Necessary? To Beat a Hacker, You need to think like one! Ethical Hacking is necessary as it allows to counter attacks from malicious hackers by anticipating methods used by them to break into…

Read More

What Is Hacking?

What Is Hacking?

Hacking refers to exploiting system vulnerabilities and compromising security controls to gain unauthorized or inappropriate access to the system resources It involves modifying system or application features to achieve a goal outside of the creator’s original purpose. Hacking can be used to steal, pilfer, and redistribute intellectual property leading to business loss Who is a Hacker? Intelligent individuals with excellent computer skills, with the ability to create and explore into the computer’s software and hardware. For some hackers, hacking is a hobby to see how many computers of networks they…

Read More