Caesar cipher is substitution technique cipher In Caesar cipher we replace each alphabet with the alphabet that is actually...
Tag Archive for: network security notes
feel free to contact us info@mybscit.com
Difference between symmetric-key cryptography and asymmetric-key cryptography.
Web Master, , Network Security, asymmetric key cryptgraphy, Difference between symmetric-key cryptography and asymmetric-key cryptography, network security notes, symmetric key cryptography, 0Keys distribution in each technique Symmetric-key: It only needs one key to encrypt and decrypt the message. Both user...
Availability in network security
Kaushik Kini, , Network Security, atul kahate notes network security, Availability, Availability in network security, network security notes, tybscit network security Availability, 0The principle of availability states that information should be available to authorized user at all the time. Example :-...
Non-repudiation
Kaushik Kini, , Network Security, atul kahate notes network security, network security notes, Non-repudiation, Non-repudiation in network security, tybscit network security Non-repudiation, 0There are situation where a user sends a message, and later on refuses that he had sent that message...
What are the typical phases of operation of a virus?
Kaushik Kini, , Network Security, atul kahate notes network security, network security notes, phases of a virus, phases of a virus in network security, tybscit network security phases of a virus, 0The first stage is called Pre-trigger stage or the dormant stage. In this stage viruses lie dormant, and does...
Give the classification of Viruses
Kaushik Kini, , Network Security, atul kahate notes network security, different types of viruses, network security notes, notes for tybscit, viruses in network security, 0Parasitic Virus:- his is the most common form of virus. Such a virus attaches itself to executable files and...
What are the different types of criminal attacks?
Kaushik Kini, , Network Security, atul kahate notes network security, network security notes, tybscit network security types of criminal attacks, types of criminal attacks in network security, 0Fraud:- Modern fraud attacks concentrate on manipulating some aspects of electronic currency, credit cards, electronic stock certificates, checks, letters...
Integrity in network security
Kaushik Kini, , Network Security, atul kahate notes network security, Integrity in network security, network security notes, tybscit network security Integrity, 0When content of message change after sending the message by sender but before receiver receive it then we can...
Authentication in Network Security
Kaushik Kini, , Network Security, atul kahate notes network security, Authentication in network security, network security notes, tybscit network security Authentication, 0Authentication mechanism helps to establish proof of identity. This process ensures that origin of an electronic document or message...
Confidentiality in Network Security
Kaushik Kini, , Network Security, atul kahate notes network security, confidentiality in network security, network security notes, tybscit network security confideniality, 0The principle of confidentiality specifies that only the sender and intended recipient should be able to access the...
Green Computing Book
C++ Interview Questions
Categories
- Advance Java (15)
- Advance Sql (8)
- ASP.NET with C# (16)
- Computer Graphics (3)
- Cyber Law (22)
- Digital Electronics 16-17 (2)
- Fybscit Semester 1 (1)
- FYBSCIT Semester 1 Question Bank (2)
- Fybscit Semester 2 (1)
- Imperative Programming (6)
- Linux Administration (3)
- Unit 1 (3)
- Network Security (33)
- News (40)
- Posts (1)
- Professional Communication Skills (2)
- Project (1)
- Project Management (1)
- Software Testing (1)
- Tybscit Question Papers (11)
- Semester V (7)
- Semester VI (4)
Recent Posts
- TYBSCIT Semester 5 Question Paper and Solution November 2017 (C75:25)
- TYBSCIT Semester 5 Exam Dates of October 2017 CBSGS 75:25 Postponed
- Tybscit Semester 5 Question Paper & Solutions November 2016 (75:25)
- FYBSCIT Semester 1 Question Paper & Solutions – October 2016 (75:25)
- FYBSCIT Semester 2 Question Paper & Solutions – March 2017
Recent Comments