Cyber Security

Cybercrime may emerge from local, remote, domestic or foreign sources. Security Breach A security breach is defined as leakage of information, digital data that’s supposed to be private to a person. Whenever this data is compromised, due to malicious or accidental attack the integrity of the data is compromised. Privacy Key Dimensions Informational privacy Personal […]

Memorising Stuff In Computer Networks

OSI Layers All People Some Time Need Data Processing MAC Frame Paula Shouted Directly Saying Let’s Dance Cargo? Blutooth Layers Bluetooth Frame format Classful Addressing IPv4 Header Virginia Helen Decides Today In France Flying to Portugal Had Significant Debts Opened TCP Header mnemonics : Should Dean Scold All Hundred Righteous Folks, We Could Urgently Take […]

Data Security : Master Post

Information hidden from unauthorised access – Confidentiality Information protected from unauthorised change – Integrity Information entity from unauthorised bandwitdth hijacking – Availability Threat to Confidentiality Snooping – Someone wants to look through your data Traffic Analysis Threat to Intrgrity Modification Masquerading Replaying Repudiation Threat to Availability Denial of Service DoS Ceasar Cipher is one of […]