Latest Articles and Travel info herewith.

Saturday, March 27, 2010

Important and Useful Links

Hi All visitors,

Please find herein below the useful links which might help you in your relevant search and answer.

How to claim Insurance amount
Scuba Diving
Natural beauty of Chilika
Khadi and Village Industries
Aguada Fort in Goa
International Branded Perfumes
Career Development
Important visiting places in India
Beware on mobile viruses
Travel facilities in Goa

Hope this links will help you and all the best for your search.

Thanks.
Share:

Thursday, March 25, 2010

Data storage and Security challenges

Information security within an organization is the major requirement in today’s competitive world. No network is 100% secure and that given the time and incentive it can be hacked into. Thus security of information is valuable to an organization.

Network security: It refers to protection of data and messages that are communicated through the network. Here information passes through a number of nodes and links between the nodes until it arrives at the destination. An attack can take place at any communication link if attacker has physical control over the link. Attack can be of two types, one is active attack and another one is passive attack.

Active attack: It involves some modification of the data stream or creation of a false stream.

Passive attack: It involves overhear something or eavesdropping on transmissions or monitoring transmission to obtain information.

Security threats are in the form of interruption of services or interruption of information. One of the key areas where security is really a must is protection of computer memory. In Wide Area Network communication, it is impossible because many locations of network are not under physical control of end user. Whereas in Local Area Network communication, it is really possible but there are always the threats of the dissatisfied employees.

Risk Assessment:- It is a process of analyzing all risks with respect to level of security.

Types of attacks:

Denial of service: It prevents the normal use or management of communication facilities, this attack may have a specific target.

Change of DNS (Domain Name Server): Attack changes the name of DNS, which prevents the users to access own information. For e.g www: if confidential information is on the same host as that of server, attacking becomes easier.

Conclusion: Protection of information is the major issue in network society. Auditing and interruption detection will cope up with ever-changing network environment, another one is data storage and lasting for a long period with secure. Thus security is not a destination, it is an ongoing journey.
Share:

Wednesday, March 24, 2010

Electronics and Communication

In modern society, electronics through communications has brought about the creation of the global village, fully uniting all aspects of human society. Therefore find that there is a definite need for acquiring the knowledge that brings about this through the electronics and communication branch of engineering department only.

Great men of wisdom throughout the ages have stressed on the need of hard work and the overcoming of laziness to ensure material and spiritual success in the world. Here always endeavored, as is everyone’s motto to impart quality education on electronic field to their children who pass out and eligible for joining college for further study, ensuring fully equipped to children on brave this competitive world with confidence and fortitude related to subject.

In some of the colleges, the students are also engage and encourage giving seminars on various topic of relevance in today’s technology. Seminars on current trends in industry and emerging technology by distinguished and eminent professors from industry and academic fields are organized to encourage the student to develop knowledge on electronic topic.

Generally, the department of library has an excellent collection of rare books, journals, CDs and Internet sites for electronics, which cater to the need of staff and students alike whenever there is a need to refer to advanced textbooks and other material for the regular curriculum or for their projects.
Share:

Search This Blog

Protected by DMCA.com

Contact Us

For Blog, Press and Event, Email at stylus007@rediffmail.com

Cosmolle wear

Cosmolle wear
Cosmolle

ClearTrip Winner

Tata Zonal War contest award

Buy best products

Budget phone

Chennai Floods

Stat Count

Blog Adda

Powered by Blogger.

Analytics

Page Ad

BM

Dresslink

Recent posts

Big List - Search Marketing Blogs

Keep Blogging

IndiWallet

Visitors Nation : )

Feedjit Live

Labels

Blog Archive

Ring The Bell

Blogroll

Labels