Tag: cybersecurity

Cybersecurity
Masquerade Attacks

Masquerade Attacks

This is a type of attack where intruders presents themselves as an authorized entity...

Cybersecurity
Ethical Challenges of Information Technology

Ethical Challenges of Information Technology

With tools like the internet access, hackers have found it easy to hack into any...

Cybersecurity
Types of computer viruses

Types of computer viruses

Computer virus refers to a malicious software that reproduces itself and replicates...

Cybersecurity
Type of hackers and common tools they use

Type of hackers and common tools they use

Hacking is process of unauthorised intrusion to the computer system or a network,...

Cybersecurity
Security mechanisms in a  computer system

Security mechanisms in a computer system

Security mechanisms are strategies set by organisation to address issue of computer...

Cybersecurity
Top Types of cyber attacks

Top Types of cyber attacks

Types of cyber attacks  1.Phishing. This is the act by which fraudulent information...

Cybersecurity
Advantages of cyber security

Advantages of cyber security

Advantages of cyber security . 1.Protects developed systems from hacking. 2. Provides...

Cybersecurity
What you need to Know about Cyber security

What you need to Know about Cyber security

This is the process of protecting and defending computer systems, servers, mobile...

Cybersecurity
Types of encryption which are most secure

Types of encryption which are most secure

Encryption is process of translating data into another form so that people with...

Cybersecurity
Hackers Steals Hundreds Of Millions Of iPhones Data Which Apple Can't Stop.

Hackers Steals Hundreds Of Millions Of iPhones Data Which...

“Apple cannot fix it because bootrom cannot be patched after a device leaves the...

This website uses cookies. By using this website you consent to our use of these cookies.

Schedule time with me