Hacking, Virus, Worm, Trojanhorse, Malware
Hacking Hacking is identifying weakness in computer systems or networks to exploit its weaknesses to gain access. Example of Hacking: Using password cracking algorithm to …
Read MBA, BBA, B.COM Notes
Hacking Hacking is identifying weakness in computer systems or networks to exploit its weaknesses to gain access. Example of Hacking: Using password cracking algorithm to …
Internet homicide refers to killing in which victim and perpetrator met online, in some cases having known each other previously only through the Internet. Also …
Malware If you’ve ever seen an antivirus alert pop up on your screen, or if you’ve mistakenly clicked a malicious email attachment, then you’ve had …
(a) False data input: The falsification of the data input is a major threat to IT infrastructure. This threat may arise from: (i) Unreasonable or …
The field of computer forensics is relatively young. In the early days of computing, courts considered evidence from computers to be no different from any …
Penetration testing or pen-testing as it is sometimes called features two distinctly different methods of execution, internal and external. Understanding the differences between internal and …
The main aim of the act is to legalize the digital language so that people can easily and without fear use the electronic devices for …
Information security, sometimes shortened to infosec, is the practice of protecting information by mitigating information risks. It is part of information risk management. It typically …
Information warfare is the tactical and strategic use of information to gain an advantage. It includes multiple types of operations and has been pursued in …
HTTP means HyperText Transfer Protocol. HTTP is the underlying protocol used by the World Wide Web and this protocol defines how messages are formatted and …