Computer Science Topics

ANN architecture

An Artificial Neural Network (ANN) is an information processing paradigm that is inspired by the brain. ANNs, like people, learn by examples. An ANN is configured for a specific application, such as pattern recognition or data classification, through a learning process. Learning largely involves adjustments to the synaptic connections that exist between the neurons.  Artificial Neural Networks …

ANN architecture Read More »

HTTP Secure

HTTP is ‘Hypertext transfer protocol’ is a protocol responsible for communicating on the Internet. It is the fundamental block of the World Wide Web. HTTP is a stateless protocol since the server forgets the client once the transaction is over. HTTPS, on the other hand, is HTTP running on top of SSL (Secure Sockets Layer) …

HTTP Secure Read More »

Digital signatures

Having seen how encryption is implemented in Whatsapp, let us see the next practical application of cryptography – Digital signatures. Digital signatures are signatures applied digitally. They enforce the concepts of authentication, non-repudiation, and confidentiality. Wikipedia defines digital signatures the following way: “A digital signature is a mathematical scheme for demonstrating the authenticity of a digital message …

Digital signatures Read More »

Practical implementation of cryptography and security

The practical implementation of cryptography and security involves applying cryptographic techniques and security measures to protect sensitive information, secure communication channels, and mitigate security threats. Here are some key aspects of practical implementation: Encryption: Implement encryption algorithms and protocols to protect sensitive data at rest and in transit. Use symmetric encryption for bulk data encryption …

Practical implementation of cryptography and security Read More »

Trusted systems

Trusted systems, also known as trusted computing systems, are computer systems that have implemented a set of security measures to ensure the integrity, confidentiality, and availability of data and operations. These systems are designed to provide a high level of trustworthiness and protection against various security threats. Here are some key aspects and components of …

Trusted systems Read More »

Firewalls design principles

When designing a firewall, several principles and best practices should be considered to ensure its effectiveness in protecting networks and systems. Here are some important design principles for firewalls: Default Deny: The default policy of a firewall should be to deny all incoming and outgoing network traffic unless explicitly allowed. This principle ensures that only …

Firewalls design principles Read More »

Virus and related threats

Viruses and related threats are malicious software programs or code designed to infect and compromise computer systems, networks, and devices. They are a major concern in computer security and can cause various types of damage, including data loss, system crashes, unauthorized access, and financial losses. Here are some common types of virus-related threats: Computer Viruses: …

Virus and related threats Read More »

Intrusion detection system

An Intrusion Detection System (IDS) is a monitoring system that detects suspicious activities and generates alerts when they are detected. Based upon these alerts, a security operations center (SOC) analyst or incident responder can investigate the issue and take the appropriate actions to remediate the threat. Classification of Intrusion Detection Systems Intrusion detection systems are …

Intrusion detection system Read More »

Intruder

In the context of computer security, an intruder refers to an unauthorized individual or entity that attempts to gain unauthorized access to a computer system, network, or data. Intruders can be individuals with malicious intent, such as hackers, or they can be insiders with privileged access who abuse their privileges. The term “intruder” is often …

Intruder Read More »

SET for E-Commerce Transactions

SET, which stands for Secure Electronic Transaction, was an early security protocol developed specifically for secure e-commerce transactions. SET was jointly developed by Visa and Mastercard in the mid-1990s to address the security concerns associated with online payments. Although SET is not widely used today, it played a significant role in shaping the foundation for …

SET for E-Commerce Transactions Read More »

This website is hosted Green - checked by thegreenwebfoundation.org