Cyber Security Terms And Basic Concepts In Tamil
Cyber Security Terms And Basic Concepts In Tamil |
Cyber Security terms and basic concepts in tamil . Hello, and welcome to this blog post on Cyber Security terms and concepts. Use Google translater to translate this page to tamil language .
Follow My Blogs On : https://www.bloggingtamilzhanda.blogspot.com
Cyber Security Terms and Basic Concepts,
Cyber Security Terms And Basic Concepts In Tamil |
Antivirus software :
It is a software the detects and removes viruses. Viruses are software that restrict harm, or make the system resources useless. Antivirus software needs the latest engine and virus definitions to provide a current level of protection to the system.
Anti-spyware software :
The software searches and removes spyware. Spyware is software that collects information from a system and sends it to its own server. Spyware typically works silently without harming the system resources. (cyber security terms and conditions and basic concepts in tamil) Anti-spyware software needs the latest engine and anti-spyware definitions to provide contemporary protection to the system.
Firewall :
It is a software or hardware device that is configurable to allow genuine network traffic to go and stop the malicious traffic. For instance, a firewall software may intercept all network packets sent to the user's browser. If these packets originate from a known malicious source, the firewall drops these packets to stop any harm to the user's system.
Software Updates :
These include new versions of programs, new engine versions, new definitions newer program databases etc. Updates are pushed by software vendors often for software like operating systems, antivirus software, anti-spyware software and other applications. We should keep all our software updated for security purpose.
Login name and User name :
Login name is the string with which a system identifies the user internally. Login name may or may not be the same as User name. The User name]is a strength which the system displays to the user and communicates to other users.
For example,
john1202 may be a Login name and John Doe the corresponding User name. Now, the user would use john1202 to log into the system. However, the system would display John Doe in his inbox and in his messages.
Threat :
It is a risk to someone's or some organization's information. Threat can be intentional. For example, an external attacker or the Threat can be accidental.(cyber security terms and conditions and basic concepts in tamil ) For example, an earthquake or a flood.
Vulnerability :
It is a deficiency in an individual's or an organization's systems.
For example,
if the hardware is located in an insecure place, it is a hardware vulnerability. Because the hardware may get stolen. If security testing is not done on software, it may have software vulnerabilities. If the systems are located in a disaster-prone place, the systems have physical site vulnerability.
Penetration test :
It checks a network security while pretending to be an external attacker. It is also called a pen test. It's objective is to get access and some control on a device within the network. A pen test discovers the network's vulnerabilities .
Authentication :
This means finding if an entity or some data is genuine or not.
For example,
when a user logs into a website, the website confirms if the user is genuine or not. The website can do this by checking the login name, password, previous activity, security token, any identification number or
Biometrics :
Authorization: this means the grant of certain permissions. For instance, the system will allow a user to route transactions and modify his or her profile. However, if it is an inactive user, he or she may only activate their account, but cannot view their profile. (cyber security terms and conditions and basic concepts in tamil )Next is Identity. This means an individual's unique data. For instance, an employee's identity within an organization has Employee number, date of joining and their full name. The employee uses their identity while working in the organization.
Environmental Security :
This means an optimum working environment for a system. A secure working environment includes correct ambient temperature, stable work platform and dust free and dehumidified air.
Physical Security :
This means the physical protection of an organization's information. For example, gated access, security guards and access card required to enter the site.
Allowed IP address list :
It is a list of specific IP addresses that are allowed to use a system. Other IP addresses cannot use that system. This can be more secure than only allowing users from specific geographical locations.
Internet Security Suite :
This means the set of security products from a single software vendor. The security products may include antivirus,anti-spyware, anti-malware, spam protector, firewalls and so on.
Site Advisor :
This software works inside the browser to help the user visit only safe web sites. It warns the user if the user tries to navigate to a malicious web site.
Exploit :
This can mean many things and exploit can be a set of commands or some data that an attacker may use against an information system to do some undesirable actions.
Cryptography :
This means techniques for secure communications. These include using encryption algorithms or digital signatures. For instance, a website sends encrypted data to the browser. (cyber security terms and conditions and basic concepts in tamil) This data is first decrypted in the browser and only then displayed to the user.
we learned about several important security terms and concepts. That's all in this blog post
9 Comments
Hi dear,
ReplyDeleteThank you for this wonderful post. It is very informative and useful. I would like to share something here too.Η Netking ξεκίνησε να αναπτύσσει ιστότοπους το 2004 και έχει εξελιχθεί σε αξιόπιστο συνεργάτη κατασκευής ιστοσελίδων για εταιρείες και επιχειρήσεις. Γνωρίζουμε ευρείες λύσεις που τροφοδοτούνται από τις τελευταίες τεχνολογίες και τάσεις. Βοηθώντας τους συνεργάτες μας να επιτύχουν τους στόχους τους βοηθάμε και εμάς να γινόμαστε ολοένα και καλύτεροι.Συνεργαζόμαστε για έναν κοινό στόχο και έχουμε κοινά συμφέροντα. Δουλεύουμε μαζί. Αναπτυσσόμαστε μαζί. Πιστεύουμε στην τελική ικανοποίηση του πελάτη και δεν αποφεύγουμε την επαναλειτουργία αν αυτό προσθέτει αξία στο έργο και είναι απολύτως απαραίτητο.
κατασκευή ηλεκτρονικού καταστήματος
This post is so usefull and informative.Keep updating with more information...
ReplyDeleteCyber Security Institute In Mumbai
Cyber Security Course Fees In Ahmedabad
Cyber Security Course Fees In Kochi
Cyber Security Course Fees In Trivandrum
Cyber Security Training In Kolkata
Great Blog!!! Thanks for sharing this wonderful blog with us.
ReplyDeleteHow Digital Marketing Works
what is digital marketing?
Hi dear,
ReplyDeleteThank you for this wonderful post. It is very informative and useful. I would like to share something here too. NeTechy.com is Internet Based Blog And Informative Website. NeTechy provides technology and digital marketing blogs and articles. Our goal is to help individuals and businesses in to tech industry with knowledge to be more efficient and tech savvy.
What Are The Best Traffic Sources For Affiliate Marketing In 2021?
This is a very nice post and it's helping us a lot. Hope you'll also visit our website to know about What is an SSL Certificate
ReplyDeleteDuring this website, you will see this shape, i highly recommend you learn this review.
ReplyDeleteNetwork Security Test
ReplyDeleteThankyou for your experienced information, Keep Sharing.
Cyber Security Training in Chennai
Best Cyber Security Courses Online
Cyber Security Training In Bangalore
Cyber Security Course in Delhi
ReplyDeleteslot siteleri
ReplyDeletekralbet
betpark
tipobet
betmatik
kibris bahis siteleri
poker siteleri
bonus veren siteler
mobil ödeme bahis
HH8