Cyber Security
Cyber Security(Home)
(The Cyber Security(Home) Page contains a list of all the topics of Cyber Security.)
![]()
(The Cyber Security(Home) Page contains a list of all the topics of Cyber Security.)
![]()
Introduction of VPN VPN stands for ‘Virtual Private Network’. The concept of a Virtual Private Network (VPN) has its roots in the 1990s when businesses began to realize the need for secure remote access to their internal networks. In 1996, Microsoft developed the PPTP (Point-to-Point Tunneling Protocol) protocol, which was Read more…
![]()
Introduction of Cryptography Cryptography has been used for centuries, from ancient civilizations that used secret codes and ciphers to protect their messages, to modern-day applications that rely on advanced mathematical algorithms and techniques. With the increasing reliance on digital communication and the rapid growth of the internet, cryptography has become more Read more…
![]()
Insider Threat A security risk that comes from within an organization, where employees or trusted individuals intentionally or unintentionally cause harm.
![]()
Introduction of Intellectual Property In most countries, Intellectual property (IP) is protected by laws and regulations, and violating these laws can lead to legal action and penalties. The proper management and protection of IP are crucial for individuals and companies to safeguard their ideas and maintain their competitive advantage. Definition Read more…
![]()
History 8086 Microprocessor was designed by Intel in 1976. Introduction 8086 Microprocessor is an enhanced version of 8085. 8086 is available in 3 stable versions based on the frequency of operation(processing speed) − 5MHz 8MHz 10 MHz Features It is a 16-bit Microprocessor having 20-bit address lines and 16-bit data Read more…
![]()
History The term “Microprocessor” was first used when the Viatron system 21 small Computer System was announced in 1968. Since the 1970s, the use of microprocessors has consequently increased, cutting across several use cases. Microprocessors were initially called “Microcomputer on a chip” until 1972. The microprocessor was invented by a Read more…
![]()
Definition Pseudo-code is a compact and informal high-level description of a computer programming algorithm that uses the structural conventions of some programming language. Pseudocode is a kind of structured English for describing algorithms in an easily readable and modular form. This helps in describing how the system will solve the given problem. Read more…
![]()
(A) Asymptotic Notations (n→∞): Asymptotic notations are used to express the running time of an algorithm in terms of function, whose domain is the set of natural numbers N={1,2,3,…..}. Such notations are convenient for describing the worst case running time function T(n). Asymptotic notation gives the rate of growth, i.e. Read more…
![]()