Skip to content

Threats to the Internet

Honeypot in cyber security

Honeypot

A honeypot is used in the area of computer and Internet security . It is a security resource, whose value lies in being probed, attacked or compromised. They are special decoy servers to catch the‚ Blackhats (people with evil and illegal intents). Honeypots attract the hackers to attack a vulnerable computer system, which is under observation, by a security team. All the information about the attackers is logged, and monitored.

Security Requirements in Wireless Sensor Networks

Security requirements in Wireless Sensor Networks

The confidentiality objective is required in sensors environment to protect information traveling between the sensor nodes of the network or between the sensors and the base station from disclosure, since an adversary having the appropriate equipment may eavesdrop on the communication.

Mobile Ad hoc networks are a new paradigm of wireless network, offering unrestricted mobility without any underlying infrastructure.

Security Aspects in Mobile Ad Hoc Networks

Mobile Ad hoc networks are a new paradigm of wireless network, offering unrestricted mobility without any underlying infrastructure such as base station or mobile switching centers. Basically ad hoc network is a collection of nodes communicating with each other by forming a multi-hop network.

Semantic web layered architecture

Semantic Web

The web today enables people to access documents and services on the Internet but today’s methods require human intelligence. The semantic web augments the current web with formalized… Read More »Semantic Web

Password paradigm

Password Paradigm

A password in the virtual world is something like a lock in the world of reality. A password is an information associated with an entity that confirms the entity’s identity. Let us understand what is password paradigm?