4n6Hub
Share This
Scroll Down
//Blog

REAL WORLD PROTOCOLS

Objective: This blog describes the popular protocols and services, discusses their intended uses and applications, and describes their security properties and characteristics 1. INTRODUCTION TO IPSec IPSec is a suite of protocols used to protect information, authenticate communications, control access, and provide non-repudiation. There are two protocols that are the driving elements Authentication Header (AH) Encapsulating Security Payload (ESP)   AUTHENTICA..

Read more
  • 0 Comment

COMMON AUTHENTICATION PROTOCOLS

COMMON AUTHENTICATION PROTOCOLS Objective: This Blog describes the popular protocols and services, discusses their intended uses and applications, and describes their security properties and characteristics.   1. AUTHENTICATION PROTOCOLS CONCEPTS An authentication protocol is a type of computer communications protocol or cryptographic protocol. It is designed for the authenticity of the data transfer between two entities. It is the most important layer of protection whi..

Read more
  • 0 Comment

OPERATING SYSTEM AND SECURITY

OPERATING SYSTEM AND SECURITY Objective: To understand the basic to advanced concepts related to Operating System OVERVIEW OF OPERATING SYSTEM An Operating System (OS) is an interface between computer user and computer hardware. An operating system is a software which performs all the basic tasks like file management, memory management, process management, handling input and output, and controlling peripheral devices such as disk drives and printers Memory Manageme..

Read more
  • 0 Comment

DIGITAL RIGHTS MANAGEMENT

DIGITAL RIGHTS MANAGEMENT To understand the concepts of digital rights management scheme and Techniques, the need of DRM, prevention of illegal file sharing on the internet, Content Scrambling and Protection methods, unsuccessful DRM Schemes, DRM asset classification and its protection methodology MEANING OF DIGITAL RIGHTS MANAGEMENT Digital rights management (DRM) is a systematic approach to copyright protection for digital media. The purpose of DRM is to preven..

Read more
  • 0 Comment

Practices in Cyber Jurisprudence

Practices in Cyber Jurisprudence Introduction Cyberspace is a tern that began in science fiction literature in the 1980s, was quickly and widely adopted by computer professionals as well as hobbyists and became a household term in 1990s. During this period, the uses of internet, networking and digital communication were all growing dramatically and the term ‘Cyberspace ‘was able to represent many new ideas and phenomena that were emerging.Cyber power is the condition an..

Read more
  • 0 Comment

LEGAL ISSUES AND COURTROOM SKILLS

INTRODUCTION Cybercrimes are being committed by many people who do not even receive a court notice or they are getting the advantage of not being investigated by the cyber crime police. The reasons for being in this situation are not only because of the lethargic attitude of the police officer but mainly because of the legal system which is not coping up with the challenges faced in cyber crime investigation. Both the amendments in the law and change in the perspectives withi..

Read more
  • 0 Comment

CYBER CRIMES

Brief Introductions The growth of cyberlaw has become prominent in the recent years after the advent of the internet which has influenced our lives in many ways. Crimes in cyberspace is a violation of criminal law that involves a knowledge of computer technology for their preparation, investigation or prosecution of the rapid changes in the technology, a new generation of crimes has dropped by the advent of the internet. The comprehensive classification of computer crime..

Read more
  • 0 Comment

E-Governance And E-Commerce

Brief Introduction  The growth of cyberlaw has become prominent in the recent years after the advent of the internet which has influenced our lives in many ways. The advantages of cyberlaw have seen the digital development of two major aspects of commerce and governance. The concept of E-Governance And E-Commerce was legally recognized in the Information Technology Act, 2000. Adequate provisions of the Information Technology Act, 2000 has been mainly concentrating on the re..

Read more
  • 0 Comment

FUNDAMENTALS OF CYBER LAW

Brief Introduction The growth of cyberlaw has become prominent in the recent years after the advent of the internet which has influenced our lives in many ways. The concept of cyberspace itself has touched and influenced almost every aspect of our lives. The need for cyber law started to grow after people deciding that computers and the internet are necessary even though a lot of disadvantages are present in the system. The main and primary objective of the cyber law is to m..

Read more
  • 0 Comment
Get In Touch
Close
error: Content is protected !!