SAFE BROWSING

Internet security is a matter of great concern for internet users. It is important to know if a website is secure or not while surfing the internet 19 . A secure website creates a safe connection between the website and the web browser so that entered data, such as personal information, credit card details, banking … Read more

EMAIL SECURITY TIPS

1. Don’t open email attachments that you are not expecting, or which have come from someone you do not know. When you open such an email, make sure that your anti-virus software is up-to-date and pay close attention to any warnings from your browser or email program. 2. You can use anonymity software which can … Read more

MAJOR ISSUES WITH WLAN

Having said that, WLAN are also as prone to various attacks as their counterpart wired LNAs are. Actually WLANs are easier to hack as compared to wired LANs, if not properly configured, due to its easy accessibility around the installation. No need to be in contact of physical wires to hack can be done from … Read more

WHAT IS WIRELESS LAN?

The Wireless LAN or WLAN is becoming a popular way to connect devices such as computers these days. In offices and homes, WLAN has become an alternative way of communication compared to wired LAN. The convenience to connect different devices is both cost effective and easily maintainable. The Wikipedia says: “Wireless LANs have become popular … Read more

SOME CYBER CRIME INCIDENTS

In the current section, we will discuss some of the common cyber crimes and fruads incidents over internet so that you could appriciate how these little ignorance could lead to a big digaster. 1. Paypal, an international online money transfer service, which allows you to safely transfer money through an Internet using various encryption techniques … Read more

KINDS OF CYBER CRIME

Cyber Stalking It is an act of stalking, harassing or threatening someone using Internet/computer as a medium. This is often done to defame a person and use email, social network, instant messenger, web-posting, etc. as a using Internet as a medium as it offers anonymity. The behaviour includes false accusations, threats, sexual exploitation to minors, … Read more

FIREWALL (CYBER SECURITY TECHNIQUE)

It is a hardware/software which acts as a shield between an organization‟s network and the internet and protects it from the threats like virus, malware, hackers, etc. It can be used to limit the persons who can have access to your network and send information to you. Figure : Firewall There are two type of … Read more

ANTIVIRUS(CYBER SECURITY TECHNIQUE)

There are verities of malicious programs like virus, worms, trojan horse, etc that are spread over internet to compromise the security of a computer either to destroy data stored into the computer or gain financial benefits by sniffing passwords etc. To prevent these malicious codes to enter to your system, a special program called an … Read more

DIGITAL SIGNATURES(CYBER SECURITY TECHNIQUE)

It is a technique for validation of data. Validation is a process of certifying the content of a document. The digital signatures not only validate the data but also used for authentication. The digital signature is created by encrypting the data with the private key of the sender. The encrypted data is attached along with … Read more

INTRODUCTION TO CYBER SPACE

Internet is among the most important inventions of the 21stcentury which have affected our life. Today internet have crosses every barrier and have changed the way we use to talk, play games, work, shop, make friends, listen music, see movies, order food, pay bill, greet your friend on his birthday/ anniversary, etc. You name it, … Read more