Rating
Information Security Program
Information Security Program
Introduction
The paper will discuss the Information Security Program in the Department of Veteran Affairs. Department of Veterans Affairs U.S. is the executive department of the United States government. It is the second largest after the Federal Ministry of the Ministry of Defense, employing about 280,000 ...
Rating
Disseminating Organizational IT Security and Troubleshooting Best Practices
Abstract
This paper describes that how we can improve the security of a company's IT infrastructure after a series of network security breaches. This paper also analyzes the importance of internal communication and medium of communication that can be used to improve the ...
Rating
\
Relational Model of Database Management
Executive Summary
The primary problem faced by our business enterprise is the organization and handling of the large amount of data. This problem is causing the decrement in the pace of our organizational practices as the process of the handling and organization of the data determines the ...
Rating
How Buffer Overflows Are Used To Exploit Computers?
How Buffer Overflows Are Used To Exploit Computers?
Buffer Overflow
Buffer overflow attacks represent the vast majority of all attacks against information systems as buffer overflow vulnerabilities are common and relatively easy to exploit. Buffer overflow vulnerabilities are the main cause of intrusions in ...
Rating
Cisco 4300 Video Surveillance camera
Cisco 4300 Video Surveillance camera
Protection alternatives structured within an organization
In a lot of organizations and remarkable occasions surveillance camera system is required. This assists the protection group connected with the occasion or organization to control protection related issues more easily. Cisco is one of ...
Rating
Java Servlet Concept
Java Servlet Concept
Java Servlet
A Servlet is a class of java programming language that is used to broaden the server's capabilities. Even though servlets might respond to any king of request, these servlets are mainly used to broaden the applications that are hosted with the help of ...
Rating
ARTIFICIAL INTELLIGENCE
Artificial Intelligence
Artificial Intelligence
Introduction
The term and concept of Artificial intelligence (AI) was first defined by John McCarthy, an American computer scientist, in 1956 as the “science and engineering of creating intelligent machines.” While there are some tasks that computers are able to perform, they cannot do all, and, most importantly, ...
Rating
TCP/IP
Benefits of Utilizing TCP/IP in a server-based setting
Benefits of Utilizing TCP/IP in a server-based setting
Introduction
Transmission protocols and application level services are comprehensively supported by the TCP/IP networking suite. It also provides support for the clients such as SNMP, Telnet, HTTP, and many others. For large networks, Transmission Control Protocol/Internet Protocol ...
Rating
Parallel Fiber in Communication Computer Field
Parallel Fiber in Communication Computer Field
Introduction
Technology and communication are now interlinked with each other up to a huge extent. In fact, it will be fair to say that various scientists, researchers and research institutes have dedicated their time in order to propose, plan ...
Rating
Modern Attacks on VPN and Firewalls
Table of Contents
Introduction3
Discussion4
Challenges to VPN and Firewalls5
Increased Network Complexity5
Increased Application and Attack Sophistication6
Viruses and Worms7
Spoofing of IP Address7
Fundamental Flaw in Firewall Middle-box Design8
VPN Cracking by Exploiting Microsoft Technologies9
“Smart” Threats to Firewall and VPN10
Conclusion10
References12
Modern Attacks on VPN and Firewalls
Introduction
The advancement in the different uses of the ...