Nothing found!
It looks like nothing was found here!
Top Categories
11 Posts
Latest Blogs
12
Feb
What do you mean by a botnet ?
By
webmaster
A botnet is a collection of internet-connected devices, such as servers, PCs,...
1 Min Read
12
Feb
What are the benefits of Cyber Security ?
By
webmaster
The following are some of the advantages of putting cybersecurity in place and...
1 Min Read
12
Feb
What is a Firewall ?
By
webmaster
A firewall serves as a barrier between a LAN and the Internet. It allows...
1 Min Read
12
Feb
Differentiate between threat, vulnerability and risk.
By
webmaster
Threat: A threat is any form of hazard that has the potential to destroy or...
1 Min Read
12
Feb
Explain CIA triad
By
webmaster
CIA stands for Confidentiality, Integrity, and Availability. CIA is a model...
1 Min Read
12
Feb
What is the difference between IDS and IPS ?
By
webmaster
IDS is Intrusion Detection System and it only detects intrusions and the...
1 Min Read
12
Feb
What is the difference between Symmetric and Asymmetric encryption ?
By
webmaster
Difference between Symmetric and Asymmetric encryption Basis of Comparison...
1 Min Read
29
Jan
How to secure database passwords in PHP ?
By
webmaster
When a PHP application makes a database connection it of course generally needs...
1 Min Read