Indicator of Intrusion is the indicator that an intruder had gained or made attempts to gain un-authorized access to a system. Types of Indicator of Intrusion File System Intrusion By observing and assessing files in the system, we can detect intrusion by the following ways: Network Intrusion Indicator By monitoring the network activity, we can…
Clock Generator
Clock Generator generates digital signal for synchronizing all the activities across the computer performed by the CPU. The clock generator is a Crystal Oscillator that has the property of Piezoelectricity which is a phenomenon that happens when a certain matter generates an electric charge when subjected to mechanical stress or pressure.
Clock Rate
In computing, Clock Rate also known as Clock Speed is the number of frequencies generated by clock generator in a processor measured in Hertz which indicates the speed of the processor in the computing device. An unit of the Clock Rate is known as Clock Cycle or Clock Tick which is a combination of positive…
Session Hijacking
Session Hijacking is an act, where an attacker takes the control of an existing network or application session between two systems and gets the access to un-authorized information from the session. The end users who own the systems whose session has been hijacked are not aware that their session has been hijacked. Types of Session…
DoS And DDoS
DoS (Denial of Service) Attack DoS (Denial of Service) is the act, where an attacker makes a computer or network un-available to the users. It is done by flooding the computer or network with huge traffic which depletes the available resources which are CPU, Memory for a computing system and bandwidth for a network and…
TCP 3-Way Handshake
TCP is the primary transport layer protocol that is used to transport data between systems when communicating over a network. TCP is a connection oriented protocol that provides reliability, flow control, congestion control and multiplexing. TCP establishes a connection between the systems when they want to send data with a 3-way handshake. The client starts…
Piezoelectricity
Piezoelectricity is the property of certain matter to generate an electric charge when subjected to mechanical stress or pressure. Piezoelectric Effect When mechanical pressure is applied to a piezoelectric material, the internal structure of the piezoelectric material changes which causes a separation of positive and negative charges and this charge imbalance builds an electric field…
FLOPS
FLOPS (Floating Point Operations Per Second) is a performance metric that is used to measure the performance of a computer with respect to its ability to perform mathematical calculations of floating point numbers (numbers with decimal points) like addition, subtraction, multiplication, and division. Following are various FLOPS metrics used KiloFLOPS KFLOPS 1000 FLOPS MegaFLOPS MFLOPS…
Botnet
Botnet also known as roBOT NETwork is a network of compromised computers called bots also known as zombies that are infected with malware (virus, worms, trojan) and controlled remotely by a attacker. The bots in the network are controlled by the attacker and used to perform attacks DDoS (Distributed Denial of Service attack), data theft, data mining,…
Computer Zombies (Bots)
Zombies also known as Bots are computers that are connected to Internet which have been compromised by malware (viruses, worms, trojans) and is controlled remotely by an attacker. Attackers use Zombie is used to attack a target. The Zombie act individually but are mostly part of a bigger group known as Botnet. Attacker use Botnet…