Vulnerability
Vulnerability & Vulnerability Mitigation Vulnerability is a flaw or weakness in a system Could be exploited by a threat Vulnerabilities can allow attackers to gain
Vulnerability & Vulnerability Mitigation Vulnerability is a flaw or weakness in a system Could be exploited by a threat Vulnerabilities can allow attackers to gain
A firewall is software or firmware that prevents unauthorized access to a network. It inspects incoming and outgoing traffic using a set of rules to
ICANN – Internet Corporation for Assigned Names and Numbers – was formed in 1998. It is a not-for-profit partnership of people from all over the
Internet Assigned Numbers Authority is the organization that oversees the allocation of IP addresses to internet service providers (ISPs) → Protocol management : maintains over
IPv6 is 128 Bit Addressing internet enabled devices An IPv6 address is represented as 8 groups of four hexadecimal digits, each group representing 16 bits
A private IP address is a non-internet facing IP address used in an internal network. Private IP addresses are provided by network devices, such as routers,
IPv4 Classes : uses – subnet mask – Possible No of Hosts IP Class Range Use Subnet Subnet indication Usable IP’s Class A 0-126 Large
IP : Internet Protocol : used for addressing internet enabled devices, Types : ipv4 ,ipv6 IPv4 : – 32 bit unique addressing of computer network.
1) Simplex – One way Comm. (Radio, TV):Only Sender can Send Signals / Data to users, user not allowed to send to feedback/response Example :
Wi-Fi is a wireless networking technology that allows devices such as computers , Mobile Devices and other equipment interface with the Internet, when they have