Browsing category

COMPUTER SECURITY

Major Elements Of Computer Security

  In my previous article, there are several things that I have said about computer security. In this article, I really want to clear some doubts.   I will be talking about some of the elements of computer security so that users can understand what computer security is all about. Follow me as we are going […]

Fundamental Concepts Of Computer Security

  One thing is very sure in life, you cannot be doing things the same way and be expecting a different result.   The same thing also applies to the security of gadgets and devices. One is expected to follow the rules and protocols when you actually want to achieve the desired results. Besides in […]

5 Layers Of Computer Security: Analysing The Levels

  Analysing Five Layers Of Computer Security In my previous article, I have discussed at length some of the facts that you need to know about computer security. In this article, I want to look at the five layers of computer security. Follow me as we will be analysing this together in this article. #1 Physical […]

How Blogs Can Complement Websites: A Practical Guide.

  How Blogs Can Complement Websites: A Practical Guide.     As you will find out later on, blogging brings many benefits to a business. One of the main reasons for blogging as a business is to provide more information to your potential customers. The company website provides information to all of the visitors, but […]

Threat Sharing and Building Cybersecurity Awareness: How Its Done

Governments are now actively promoting cybersecurity. For instance, the US Cybersecurity Infrastructure and Security Agency (CISA) is leading efforts to automate the sharing of cybersecurity information with public and private organizations at no cost. CISA uses a system called Automated Indicator Sharing (AIS). AIS enables the sharing of attack indicators between the US government and […]

5 Means Of Securing Online Transactions

     There are many online consumers that have been told that it is not secure to enter your card online. Because of this vital information, many of us are looking for means of making online purchases without entering our card information or using our card details. In this article, I want to show you […]

Local Area Networks: What You Never Knew (+Examples)

A Local Area Network is a network infrastructure that spans a small geographical area. LANs have specific characteristics: LANs interconnect end devices in a limited area such as a home, school, office building, or campus. A LAN is usually administered by a single organization or individual. Administrative control is enforced at the network level and […]

The Three-Layer Network Design Model: An Analysis (+Examples)

  The campus wired LAN uses a hierarchical design model to separate the network topology into modular groups or layers. Separating the design into layers allows each layer to implement specific functions, which simplifies the network design. This also simplifies the deployment and management of the network. The campus wired LAN enables communications between devices […]

MTA 98-360: Configuring Desktop Settings On Windows 8.1

MTA 98-360: Configuring Desktop Settings         Windows 8, along with its new Start screen, also provides new ways to change display settings. In addition, those with tablets or touchscreens can take advantage of swiping features from the corners and edges of a tablet or laptop screen. In this project, you will look […]