Skip to main content

Posts

Access Control [Computer Security System]

  Access control refers to the security measures and practices implemented to regulate and control access to resources, systems, or physical areas. It is a fundamental aspect of information security and helps protect sensitive data, prevent unauthorized activities, and maintain the confidentiality, integrity, and availability of resources. Access control systems are designed to ensure that only authorized individuals or entities can access certain areas or resources. These systems can be physical or logical, depending on the type of access being controlled. Physical Access Control: Physical access control involves securing physical areas such as buildings, rooms, or data centers. It typically involves the use of physical barriers, locks, keys, badges, or biometric systems to authenticate and grant access to authorized personnel. Examples of physical access control measures include swipe cards, proximity cards, PIN codes, fingerprint scanners, or security guards. Logical Access Con...
Recent posts

Differences Between Unix and Windows

  Unix and Windows are two different operating systems commonly used in computers. Here's a simple explanation of their differences: Design and History: Unix: Unix is an operating system developed in the 1970s and is known for its stability, security, and flexibility. It was primarily used in servers and workstations and later became the foundation for various Unix-like systems, such as Linux and macOS. Windows: Windows is an operating system developed by Microsoft in the 1980s. It started as a graphical user interface (GUI) for MS-DOS and evolved into a fully featured operating system for personal computers. User Interface: Unix: Unix traditionally has a command-line interface, which means users interact with the system by typing commands. However, many Unix-like systems now also provide graphical interfaces. Windows: Windows is known for its graphical user interface (GUI) with windows, icons, menus, and a mouse-driven interface. It allows users to interact with the system using a...

Introduction to Computer System Security

  Computer system security refers to the protection of computer systems and networks from unauthorized access, theft, damage, or other malicious activities. It involves the implementation of various technologies, practices, and policies to prevent security breaches and protect against cyber threats. Effective computer system security involves several key elements, including: Access control : This involves limiting access to computer systems and networks to authorized users only. Access control measures include the use of passwords, authentication methods such as biometric scanners or security tokens, and limiting access to sensitive information on a need-to-know basis. Encryption : Encryption is the process of encoding data so that it can only be accessed by authorized users. Encryption is used to protect data during transmission and storage, preventing unauthorized access and tampering. Firewalls : A firewall is a security device that monitors and controls incoming and outgoing ne...

ARTIFICIAL INTELLIGENCE FOR ENGINEERS

                        B.TECH      (SEM I) THEORY EXAMINATION                                 2020-21             ARTIFICIAL INTELLIGENCE                        FOR ENGINEERS Time: 3 Hours Total Marks: 100 Note: 1. Attempt all Sections. If require any missing data; then choose suitably.                               SECTION A 1. Attempt all questions in brief. Q no. Question Marks CO (a)  . What is meant by ethical approach?   Ans-:    The virtue approach to ethics assumes that there are certain ideals toward which we should strive, which provide for the full development of our humanity. These ideals are discovered through thoughtful reflection on...