authentication
Posted in Computer Security

Authentication – different techniques to authenticate your apps

Authentication: Authentication can be defined as checking the validity of something if it’s genuine or fake. It is an access policy which is used to…

Continue Reading...
cyber security in cloud computing
Posted in Computer Security

Cyber Security in Cloud Computing – Attackers & Threats

Cyberworld is our own cyber place which seems to be restricted to a corner in a room where you have placed your computer. But if…

Continue Reading...
Posted in Computer Security

Vulnerability Threat Control Paradigm and CIA Triads – Computer Security

Vulnerability Threat Control Paradigm Vulnerability Threat Control Paradigm is a framework to protect your computer so that you can protect the system from threats. The…

Continue Reading...
Computer-Security-threats-vulnerabilities
Posted in Computer Security

Computer Security, Threats & Vulnerabilities – Hardware & Software

Computer Security: Any item you value needs to be protected and secured. Similar is the case with your computer hardware and software. The protection is…

Continue Reading...