Vaguely Related to ETC

Cyber Security

Cybercrime may emerge from local, remote, domestic or foreign sources. Security Breach A security breach is defined as leakage of information, digital data that’s supposed to be private to a person. Whenever this data is compromised, due to malicious or accidental attack the integrity of the data is compromised. Privacy Key Dimensions Informational privacy Personal …

Continue Reading
Vaguely Related to ETC

Data Security : Master Post

Information hidden from unauthorised access – Confidentiality Information protected from unauthorised change – Integrity Information entity from unauthorised bandwitdth hijacking – Availability Threat to Confidentiality Snooping – Someone wants to look through your data Traffic Analysis Threat to Intrgrity Modification Masquerading Replaying Repudiation Threat to Availability Denial of Service DoS Ceasar Cipher is one of …

Continue Reading
Vaguely Related to ETC

Verilog: Master Post

Data Types Register variables store the last value that was procedurallyassigned to them wire variables represent physical connections between structural entities such as gates – does not store anything, only a label on a wire Verilog Constructs and Modeling Styles You can write module at four levels of abstractions Behavioural (Algorithmic like C) Dataflow (How …

Continue Reading
Vaguely Related to ETC

Programmable Logical Device

Programmable Logical Device : A programmable logic device (PLD) is an electronic component used to build reconfigurabledigital circuits. Unlike integrated circuits (IC) which consist of logic gates and have a fixed function, a PLD has an undefined function at the time of manufacture.[1] Before the PLD can be used in a circuit it must be programmed (reconfigured) by using a specialized program CPLDs can replace thousands, …

Continue Reading