Category Archive Information Security

ByJayanthi

Wireshark

For those who would like to look deep into their networks and not just on the outside, “Wireshark – the network protocol analyzer,” is the way to go!  We will understand what is meant by “sniffing”, why it is used and how the Wireshark network protocol analyzer works in this post.

What are sniffers?

While social media rages on one side giving rise to new professions, there is another equally quiet but stealthy profession too – monitoring other people’s networks and activities by means of “sniffing”. Since a firewall cannot detect all malicious traffic we use “sniffers” to monitor the traffic across the network.  As with everything else in security, “sniffers” can be used in a positive and negative way either by employers monitoring their employees or by scrupulous individuals trying to hack systems.

Read More

Jayanthi Manikandan has an undergraduate degree in Computer Science from India and a Master’s degree in Information systems with a specialization in Information security from Detroit, MI, USA. She has written blogs for Simplilearn, Whizlabs software, InfoSec institute and Jigsaw academy. She has created e-learning videos for Whizlabs software and Twenty19.

She has been passionate about Information security and has several years of experience writing on various technical topics. Additionally, she loves to pen a few personal thoughts here as well! 🙂

ByJayanthi

Are you a ‘helicopter’ parent? :)

I am sure most of us are guilty of this in today’s world. And rightly so…I know, I  definitely am!! 🙂 Even as there different parenting styles and unique children, there are some parenting feelings that come by intuition. One of that may be “helicopter parenting”!! 🙂 

What is ‘helicopter parenting’?

We see so many atrocities committed all around us and more heinous crimes against children. This automatically makes us more protective of our children. We shield them more and more and we “hover” over every move of theirs which leads us to the term “helicopter parenting”. So, “helicopter” parenting is hovering over the kids too much and monitoring their activities and lives most of the time. This over protection is so much that sometimes they are not able to take many decisions on their own.

The problem partly arises, because they may grow but in our eyes, they are still the same “small child”! 🙂 and we worry wherever they go.  We may never have been brought up that way but in today’s world, “worry” comes with parenting. We cannot allow them to freely walk outside, cannot allow them to cross the road on their own(even if they are 15 years old!! :)), cannot allow them to travel by city buses, cannot allow them to do any house work and on and on. We smother them and shield and it sometimes continues all through their lives!! Parents remain as parents – “the all knowing ones!! :))” and children remain “children” – the “all unknowing ones”!! 🙂 (This continues even if you are 30 year old child and 60 year old parent!! ;))

Is it wrong?

I am sure there is no perfect right or prefect wrong in parenting. What might work for one might not work for another. However, I don’t think there is anything wrong with “helicopter parenting” at a young age when the child does not know right from wrong. But after they grow, too much of hovering might impede a child’s ability to be independent(all said and done, after a while they will be independent – just the path will be harder)

How do we solve this?

As I ponder “unhelicoptering” I have started to let them take decisions on their own and encouraging them to be free outside(at least one of my kids is eligible for that) It is a fine line to teach them to be independent as well not neglect them entirely either. I am still learning the ropes of dealing with “unhelicoptering”… Wish me luck!!  🙂

 

Jayanthi Manikandan has an undergraduate degree in Computer Science from India and a Master’s degree in Information systems with a specialization in Information security from Detroit, MI, USA. She has written blogs for Simplilearn, Whizlabs software, InfoSec institute and Jigsaw academy. She has created e-learning videos for Whizlabs software and Twenty19.

She has been passionate about Information security and has several years of experience writing on various technical topics. Additionally, she loves to pen a few personal thoughts here as well! 🙂

ByJayanthi

Blockchain lingo!

 Blockchain, AI and machine learning are the latest buzzwords in the IT industry. Building a blockchain is also becoming a need for various businesses. Recall, that a “Blockchain” is the distributed shared ledger for recording and storing transactions. Each of the participant in the business network has a copy of the ledger which is updated regularly.

Before building a blockchain, there are a few keywords that have to be mastered and we will discuss them today.

Read More

Jayanthi Manikandan has an undergraduate degree in Computer Science from India and a Master’s degree in Information systems with a specialization in Information security from Detroit, MI, USA. She has written blogs for Simplilearn, Whizlabs software, InfoSec institute and Jigsaw academy. She has created e-learning videos for Whizlabs software and Twenty19.

She has been passionate about Information security and has several years of experience writing on various technical topics. Additionally, she loves to pen a few personal thoughts here as well! 🙂

ByJayanthi

Cryptography

After having done numerous posts on Information security, here is another basic and elementary concept in Information security – ‘Cryptography’. The concept of Cryptography also encloses encryption and decryption. 

Like any other subject, the field of Cryptography is another massive ocean of information. It is the technique of hiding information to bolster secure communication. Cryptographic techniques are an absolute necessity in this digital age where any information can be snooped on. These are a few basic concepts related to Cryptography:

Read More

Jayanthi Manikandan has an undergraduate degree in Computer Science from India and a Master’s degree in Information systems with a specialization in Information security from Detroit, MI, USA. She has written blogs for Simplilearn, Whizlabs software, InfoSec institute and Jigsaw academy. She has created e-learning videos for Whizlabs software and Twenty19.

She has been passionate about Information security and has several years of experience writing on various technical topics. Additionally, she loves to pen a few personal thoughts here as well! 🙂

ByJayanthi

What are Zombie systems?

In the Information security realm, there are different types of attacks occurring all over the world. There are virus attacks, phishing, worm attacks, DOS  and DDoS attacks and others. In order to understand “Zombie systems”, we have to talk about DDoS(Distributed Denial of Service) attacks. Read More

Jayanthi Manikandan has an undergraduate degree in Computer Science from India and a Master’s degree in Information systems with a specialization in Information security from Detroit, MI, USA. She has written blogs for Simplilearn, Whizlabs software, InfoSec institute and Jigsaw academy. She has created e-learning videos for Whizlabs software and Twenty19.

She has been passionate about Information security and has several years of experience writing on various technical topics. Additionally, she loves to pen a few personal thoughts here as well! 🙂

ByJayanthi

XOR operator in Java

In the Java programming language, a ‘variable’ is used to store a value. Different kinds of operations can be performed on the variables by means of ‘operators’.  The Java programming language has a number of operators and these are listed below:

Read More

Jayanthi Manikandan has an undergraduate degree in Computer Science from India and a Master’s degree in Information systems with a specialization in Information security from Detroit, MI, USA. She has written blogs for Simplilearn, Whizlabs software, InfoSec institute and Jigsaw academy. She has created e-learning videos for Whizlabs software and Twenty19.

She has been passionate about Information security and has several years of experience writing on various technical topics. Additionally, she loves to pen a few personal thoughts here as well! 🙂

ByJayanthi

VPN(Virtual private network)

VPN or ‘Virtual Private network’ is exactly what it states – it is a private and virtual connection to your corporate network. While it is easy and comfortable to make use of free and open Wi-Fi in open spaces to access corporate resources, it is highly susceptible to different types of attacks(stealing your password might be the simplest one) VPNs enable professionals to access corporate resources in a safe and secure manner.

Read More

Jayanthi Manikandan has an undergraduate degree in Computer Science from India and a Master’s degree in Information systems with a specialization in Information security from Detroit, MI, USA. She has written blogs for Simplilearn, Whizlabs software, InfoSec institute and Jigsaw academy. She has created e-learning videos for Whizlabs software and Twenty19.

She has been passionate about Information security and has several years of experience writing on various technical topics. Additionally, she loves to pen a few personal thoughts here as well! 🙂

ByJayanthi

Usage of Information security

‘Information security’ in the broadest sense is the protection of information and assets from malicious elements. Individuals and organizations are both subjected to virus, ransomware, data breach attacks and hence this concept of ‘information security’ applies to all. Let us see a few of the ‘Information security’ concepts being applied to organizations as well as individuals.

Read More

Jayanthi Manikandan has an undergraduate degree in Computer Science from India and a Master’s degree in Information systems with a specialization in Information security from Detroit, MI, USA. She has written blogs for Simplilearn, Whizlabs software, InfoSec institute and Jigsaw academy. She has created e-learning videos for Whizlabs software and Twenty19.

She has been passionate about Information security and has several years of experience writing on various technical topics. Additionally, she loves to pen a few personal thoughts here as well! 🙂

ByJayanthi

Security

Social media and privacy concerns go hand in hand. On the one hand, we love the reach of sharing our day to day moments, our happiness, our sadness with the whole world with the click of a mouse – on the other hand, we are(and we should be) worried about the invisible eyes that are seeing the very same posts too! How do we strike a balance and ensure the security of our information will form the basis of this post. Some of the initial points are general pointers related to overall security.

Read More

Jayanthi Manikandan has an undergraduate degree in Computer Science from India and a Master’s degree in Information systems with a specialization in Information security from Detroit, MI, USA. She has written blogs for Simplilearn, Whizlabs software, InfoSec institute and Jigsaw academy. She has created e-learning videos for Whizlabs software and Twenty19.

She has been passionate about Information security and has several years of experience writing on various technical topics. Additionally, she loves to pen a few personal thoughts here as well! 🙂

ByJayanthi

Object oriented programming

‘Object oriented programming’ is a type of programming which involves object oriented principles like encapsulation, polymorphism and inheritance. These principles are implemented by means of classes, methods, variables and other constructs in Java. We saw a sneak peek into object oriented programming in the Java 101 post. 

Read More

Jayanthi Manikandan has an undergraduate degree in Computer Science from India and a Master’s degree in Information systems with a specialization in Information security from Detroit, MI, USA. She has written blogs for Simplilearn, Whizlabs software, InfoSec institute and Jigsaw academy. She has created e-learning videos for Whizlabs software and Twenty19.

She has been passionate about Information security and has several years of experience writing on various technical topics. Additionally, she loves to pen a few personal thoughts here as well! 🙂