Cyber Security

Cybercrime may emerge from local, remote, domestic or foreign sources. Security Breach A security breach is defined as leakage of information, digital data that’s supposed to be private to a person. Whenever this data is compromised, due to malicious or accidental attack the integrity of the data is compromised. Privacy Key Dimensions Informational privacy Personal […]

Memorising Stuff In Computer Networks

OSI Layers All People Some Time Need Data Processing MAC Frame Paula Shouted Directly Saying Let’s Dance Cargo? Blutooth Layers Bluetooth Frame format Classful Addressing IPv4 Header Virginia Helen Decides Today In France Flying to Portugal Had Significant Debts Opened TCP Header mnemonics : Should Dean Scold All Hundred Righteous Folks, We Could Urgently Take […]

Data Security : Master Post

Information hidden from unauthorised access – Confidentiality Information protected from unauthorised change – Integrity Information entity from unauthorised bandwitdth hijacking – Availability Threat to Confidentiality Snooping – Someone wants to look through your data Traffic Analysis Threat to Intrgrity Modification Masquerading Replaying Repudiation Threat to Availability Denial of Service DoS Ceasar Cipher is one of […]

Programmable Logical Device

Programmable Logical Device : A programmable logic device (PLD) is an electronic component used to build reconfigurabledigital circuits. Unlike integrated circuits (IC) which consist of logic gates and have a fixed function, a PLD has an undefined function at the time of manufacture.[1] Before the PLD can be used in a circuit it must be programmed (reconfigured) by using a specialized program CPLDs can replace thousands, […]