+91 9116117170

Category: Cyber Security Terminology

What is IPS?

By Chandan Singh 0 Comment December 18, 2018

Intrusion Prevention System is a software or hardware system for network and computer security that detects intrusions or security breaches and automatically protects against them can be seen as an extension of Intrusion Detection Systems (IDS) since the task of tracking attacks remains the same. However, they differ in that with. n. in. should track real-time activity and quickly […]

What is IDS?

By Chandan Singh 0 Comment December 18, 2018

Intrusion detection system – a system that uses a wide range of malware detection methods, including intelligent and heuristic algorithms for analyzing malicious traffic, scanning, behavior analysis, integrity monitoring, etc. Explanation Normal firewalls analyze traffic only by protocol type,outgoing address and destination address. For example, they can allow only traffic generated by browsers and mail programs (HTTP, POP, SMTPprotocols). However, malware […]

What is Firewall?

By Chandan Singh 0 Comment December 18, 2018

A firewall is a filter that protects your computer from unauthorized intrusions and ensures the security of using the Internet. Firewall is a software product or software and hardware complex that controls network packets or installed programs. Needed to protect the system from computer attacks. A firewall can also be called a, firewall, or firewall. On computers […]

What is DHCP?

By Chandan Singh 0 Comment December 18, 2018

DHCP is a dynamic host configuration protocol. As the name implies, DHCP isdesigned to configure a host through a remote server. DCHP is supported bydefault by most modern operating systems, and this protocol acts as anexcellent alternative to the routine manual configuration of network parametersfor a server or a connected device. This protocol works on the […]

What is Virus?

By Chandan Singh 0 Comment December 18, 2018

A virus is an independent program that is installed against the will of the user on computer. The virus installs itself into the software or into the operating system, damages the software, and then continues to spread throughoutthe system. The same makes the human biological virus that causes thedisease, hence the name. The word “virus“is often used […]

error: Content is protected by Cyberops !!