-
Steganography
A plaintext message may be hidden in one of two ways. The methods of steganography conceal the existence of the message, whereas the methods of cryptography render the message unintelligible to outsiders by various transformations of the text. Steganography was an obsolete word that was revived by David Kahn and given the meaning it has…
-
Difference Between Dedicated Servers & Cloud Servers
Features Dedicated Servers Cloud Servers Cost Factor For dedicated server, we have to pay for a specific range. Here we require expert knowledge and high level resources to manage our server, which is very expensive, and the small firms can not afford to have a dedicated server. If we use a dedicated server for that…
-
Computer Security
The NIST Computer Security Handbook [NIST95] defines the term computer security as follows: The protection afforded to an automated information system in order to attain the applicable objectives of preserving the integrity, availability, and confidentiality of information system resources (includes hardware, software, firmware, information/data, and telecommunications). This definition introduces three key objectives that are at…
-
What it takes to be a Security Tester ?
The Key Factors to became a successful security tester are as follows. Knowledge of Network and Computer Technology. Ability to communicate with management and IT personnel. Understanding of the laws. Ability to use necessary tools.