Computer Security – Securing OS
In this section we will treat how to secure or harden (harden is another word used for securing OS) a workstation from the practical point of view and what are…
In this section we will treat how to secure or harden (harden is another word used for securing OS) a workstation from the practical point of view and what are…
In Computer Security, layers is a well-known practice which was taken from military techniques. The aim of this is to exhaust the attacker when he succeeds to penetrate the first…
In this chapter, we will discuss about the different terminology used in Computer Security. Unauthorized access − An unauthorized access is when someone gains access to a server, website, or other…
The general state in Computer Security has the ability to detect and prevent attacks and to be able to recover. If these attacks are successful as such then it has…
Computer Security is the process of detecting and preventing any unauthorized use of your laptop/computer. It involves the process of safeguarding against trespassers from using your personal or office based…