Information Security Basics

Much of our personal and business information is now held on computers, so keeping information secure is an extremely important concept. Information needs to be available to people who should have access to it, but protected from those who should not.

Read More

Cloud Computing Security Risks

The recent trend in cloud computing brings additional security risks. Cloud computing involves the use of internet-based data storage and computing resources.

Read More

Types of Computer Networks

There are many types of computer networks from personal area networks and metropolitan area networks through to virtual private networks. This simple guide gives an overview of what these types of networks are and some of the technologies behind them.

Read More

Types of Programming Languages

A programming language is a set of commands, instructions, and other syntax use to create a software program. Languages that programmers use to write code are called “high-level languages.” This code can be compiled into a “low-level language,” which is recognized directly by the computer hardware.

Read More

Types of Network Attacks

It is important to understand the different types of network attacks used by hackers. To mitigate these attacks, it is useful to first categorize the various types of attacks. The most common categories of network attacks are reconnaissance attacks, access attacks, and denial of service (DoS)/distributed denial of service (DDoS) attacks.

Read More

Computer Network Based Threats

Many security threats access the targeted computer system via the networks they are connected to. Many of these threats use features of the internet protocol (IP). These computer network-based threats can be passive or active.

Read More

Types of Cybersecurity Threats

Threats to IT systems can come from a variety of sources. A company's employees, either deliberately or unintentionally, can be a source of security risk, while a range of threats also exist outside the company.The threats themselves come in a number of different forms: internal, external, physical or social engineering and software driven threats.

Read More

History of Computing

In the beginning, there were no computers. To add or subtract , man used his fingers and toes. An abacus is known to be the first mechanical calculating device. The main purpose of the abacus was that additions and subtraction could be performed quickly.

Read More