“I don’t need a hard disk in my computer, if I can get to the server faster;
carrying around these non connected computers is excessively complex by comparison.” –Steve Jobs
No, the Cloud is just a metaphor for Internet. The term Cloud used in science is used to describe collection of objects that visually appear from a distance as a cloud.
Remote machines owned by another company run everything from e-mail to word processing to complex data analysis programs over a network, where a these applications may run on many connected computers at the same time. You need to access your data or your programs over the Internet using Cloud Computing.
The services offered by the Cloud Computing providers are based on different fundamental models, like:
“Every kid coming out of Harvard, every kid coming out of school now thinks he can be the next Mark Zuckerberg, and with these new technologies like cloud computing, he actually has a shot.” –Marc Andreessen, Board Member of Facebook
For more Information about Cloud Computing please attend the Cloud Computing workshops
Cyber security, also referred to as Information Technology security or Computer Technology, focuses on protecting computers, networks, programs and data from unintended or unauthorized access, change or destruction.
The term Cyber security is used to refer to the security offered through on-line services to protect your online information.Cyber security protects confidential information by responding, detecting and preventing attacks.
Cyber security is very important because governments, military, corporations, financial institutions, hospitals and other businesses collect, process and store a great deal of confidential information on computers and transmit that data across networks to other computers. With the growing volume and sophistication of cyber attacks, ongoing attention is required to protect sensitive business and personal information, as well as safeguard national security. As the number of mobile users, digital applications and data networks increase, so do the opportunities for exploitation.
To understand the techniques for securing a computer system, it is important to think from the perspective of an attacker and the various ways an attacker can use to infiltrate the security of our systems. There are numerous ways any security can be breached but in case of Cyber security it can be categorized into 7 types such as:
The most vulnerable areas where Cyber security has great importance are Cloud Computing and Aviation Industry.
Cyber security can be implemented by improving the System Designs & Architecture, executing Security Measures, reducing the vulnerabilities , Hardware protection mechanisms, use of secure operating system and coding.
In today’s world cyber attacks are considered more dangerous than terrorist attacks. The most secure computers are those not connected to the Internet and shielded from any interference. But there’s no life without Internet.
Don’t worry Cyber security is to the rescue!!
For more Information about Cyber security please attend the Ethical Hacking workshop
Cryptography is the science of using mathematics to encrypt and decrypt data. Cryptography enables you to store sensitive information or transmit it across insecure networks (like the internet) so that it cannot be read by anyone except the intended recipient.
In Cryptography, we change our normal text into somewhat complex text using some techniques. A normal person who is not aware of these cryptography techniques is able to read it but he/she cannot find the meaning behind it. The person who knows these cryptography techniques can change the text to the original one and can use it.
In Cryptography, Normal text is called Plain text.
In Cryptography, Converted text is called Cipher text.
In Cryptography, Changing normal text to some complex form is called as Encryption.
In Cryptography, Changing encrypted text into the plain text again is called Decryption.
The techniques which we use for encryption and decryption are called as Alogorithems.
Here the girl converts the plain text into cipher text using a key which is “C”. The boy must have this key which he can use to convert the cipher text into the plain text.
The point here is that if you want to read the message then you must possess the key that is used for encryption.
For more Information about Cryptography please attend the Ethical Hacking workshop