Industry is a part of Economy that manufactures and produces similar set of goods or services. Categories of Industries Industries are categorized into three categories which is known as three sector model. Primary Industry is the industry that extracts and collect raw materials from natural resources like agriculture, textile, mining. Secondary Industry is the industry…
Economy
An Economy is system within a geographical area that produces, distributes and consumes good or services. A market is where the trading of the goods or services happen between the sellers and buyers. An economy is usually a country and it’s government manages and monitors the economy. An Economy is measured by Gross Domestic Product (GDP) which…
Internet Of Things (IoT)
Internet of Things (IoT) is network of physical objects or things that are embedded with sensors that connect and communicate with other devices over Internet without human intervention. Things can be any physical object like car, fridge, pen, thermostat, HVAC. These physical objects have software and hardware and capable of processing data. These physical objects…
Bluetooth Attacks
Bluetooth is a short range wireless technology based on IEEE 802.15.1 that uses radio waves for data and voice communication. Bluetooth is used for Personal Area Network (PAN) for connecting personal devices on wireless. As bluetooth is communicated in an open space it’s susceptible for attacks. The following are various bluetooth attacks: Bluejacking – Unsolicited messages…
WI-FI Wireless Attacks
WI-FI Wireless uses radio waves for communication between wireless devices that are connected to the WI-FI network. As the wireless devices uses the open space for communication, it’s an open target for attacks. Attackers use WI-FI wireless attack methodologies before performing the actual attack. The following are the attacks performed on WI-FI wireless networks: DoS…
Wi-Fi Wireless Hacking Methodology
Wi-Fi uses wireless for communication in an open space which makes it easy target for attackers. Wi-Fi Network is available almost everywhere at streets, organizations, public infrastructure. An attacker just needs a computing device like a laptop or mobile to hack a Wi-Fi network. The following is the Wi-Fi wireless hacking methodology: Discover the Wi-Fi…
Wireless Security
Wireless Security is the security mechanism implemented in Wi-Fi Wireless network to protect it from un-authorized access performed by attackers. IEEE 802.11i is the security standard amendment for IEEE 802.11 wireless standard. Wired Equivalent Privacy (WEP) was the initial security algorithm used in IEEE 802.11. WEP was vulnerable and exploitable. Wi-Fi Alliance brought in WPA…
Ciphertext
Ciphertext is the encrypted form of the plaintext that is encrypted by an encryption algorithm. When a data needs to be transmitted but kept confidential, so that nobody can read the data while in transit, encryption process is used. On the sender side, the plaintext is given as input into encryption algorithm which does complex…
Wireless Network
Wireless Network is a Network that uses Wireless for Communication for data and voice transmission. Wireless Network doesn’t use physical cables for data transmission rather it uses radio waves to transmit data. Wireless Personal Area Network, Wireless Local Area Network (WLAN), Cellular Networks, Wireless Metropolitan Area Network (WMAN), Wireless Wide Area Network (WWAN) are various Wireless…
IEEE
Institute of Electrical and Electronics Engineers (IEEE) is a non-profit organization founded in 1963. It is the world largest technical professional organization of STEM (Science, Technology, Engineering, and Mathematics) engineers focusing on technology advancement and innovation. IEEE develops standards through it’s operating unit Institute of Electrical and Electronics Engineers Standards Association (IEEE SA). IEEE covers multiple areas like Computing,…