Skip to content

Threats to the Internet

Introduction to Search Engines

Introduction to Search Engines

Search Engines send Robots or Spiders to crawl the Fresh web content, which sends back links based on keywords to the search engines. Search Engines analyze these links and display results based on PageRank.

Honeypot in cyber security

Honeypot

A honeypot is used in the area of computer and Internet security . It is a security resource, whose value lies in being probed, attacked or compromised. They are special decoy servers to catch the‚ Blackhats (people with evil and illegal intents). Honeypots attract the hackers to attack a vulnerable computer system, which is under observation, by a security team. All the information about the attackers is logged, and monitored.

Security Requirements in Wireless Sensor Networks

Security requirements in Wireless Sensor Networks

The confidentiality objective is required in sensors environment to protect information traveling between the sensor nodes of the network or between the sensors and the base station from disclosure, since an adversary having the appropriate equipment may eavesdrop on the communication.

Mobile Ad hoc networks are a new paradigm of wireless network, offering unrestricted mobility without any underlying infrastructure.

Security Aspects in Mobile Ad Hoc Networks

Mobile Ad hoc networks are a new paradigm of wireless network, offering unrestricted mobility without any underlying infrastructure such as base station or mobile switching centers. Basically ad hoc network is a collection of nodes communicating with each other by forming a multi-hop network.

Semantic web layered architecture

Semantic Web

The web today enables people to access documents and services on the Internet but today’s methods require human intelligence. The semantic web augments the current web with formalized… Read More »Semantic Web