- Trending Categories
Data Structure
Networking
RDBMS
Operating System
Java
MS Excel
iOS
HTML
CSS
Android
Python
C Programming
C++
C#
MongoDB
MySQL
Javascript
PHP
Physics
Chemistry
Biology
Mathematics
English
Economics
Psychology
Social Studies
Fashion Studies
Legal Studies
- Selected Reading
- UPSC IAS Exams Notes
- Developer's Best Practices
- Questions and Answers
- Effective Resume Writing
- HR Interview Questions
- Computer Glossary
- Who is Who
Found 1009 Articles for Safe & Security
![Ayushi Bhargava](https://www.tutorialspoint.com/assets/profiles/391151/profile/60_449404-1635404331.jpg)
1K+ Views
A "whitelist" is a list of organizations that have been approved for permitted access or privileged membership in a certain region of the computer world. These entities might be electronic groups or organizations, restricted websites, or even email addresses. A whitelist may also refer to an actionable promotion or recognition of a company, organization, or individual. This is also known as an "approved list."Whitelists are sometimes used by Internet Service Providers to safeguard their consumers. Commercial, non-commercial, local area network (LAN), program, and application whitelists are all examples of whitelists.Whitelisting, rather than blacklisting problematic websites, is seen as a proactive ... Read More
![Ayushi Bhargava](https://www.tutorialspoint.com/assets/profiles/391151/profile/60_449404-1635404331.jpg)
242 Views
What is Zero Trust Network Access?In the ZTNA paradigm, access is granted only once if a user has been authenticated by the ZTNA service, which then gives secure and encrypted access to an application or network. The service stops users from seeing programs or data they don't have authorization to see, preventing lateral movement by a potential attacker. This type of movement would otherwise be conceivable if an unauthorized device or agent could utilize a compromised endpoint or permitted credentials to pivot to other services or apps.Protected apps are concealed from discovery using ZTNA, and access to them is limited ... Read More
![Ayushi Bhargava](https://www.tutorialspoint.com/assets/profiles/391151/profile/60_449404-1635404331.jpg)
193 Views
Technological advancements have widened the meaning of "office, " allowing companies to communicate via mobile devices and other software, regardless of where their employees are. These changes, however, create a cybersecurity problem. The perimeter of security is no longer limited to the confines of an office building. Business data is constantly transferred between SaaS apps, IaaS, data centers, distant users, IoT devices, and other systems. As a result, cybercriminals now have access to more attack surfaces and entry points than ever before.What is Zero Trust?Zero Trust (ZT) is a set of guidelines for allowing specific features that help protect enterprises ... Read More
![Ayushi Bhargava](https://www.tutorialspoint.com/assets/profiles/391151/profile/60_449404-1635404331.jpg)
437 Views
You can download files from nearly any place while you're connected to the Internet. You have the option of purchasing and downloading games, music, movies, and other types of media from reputable sources or shareware and third-party websites. There may be hazards depending on which path you choose, and your device will strive to defend itself and you from cyber threats. Windows Defender SmartScreen comes to the rescue in this situation.What is Windows SmartScreen?Windows 10 comes with various built-in security features to enhance your computer’s security. Windows 10 provides more protection than previous Windows editions, from integrated antivirus screening to ... Read More
![Ayushi Bhargava](https://www.tutorialspoint.com/assets/profiles/391151/profile/60_449404-1635404331.jpg)
180 Views
As the number of cybercrimes increasing each day, Microsoft has come up with a monthly security fix; this is a great initiative since the hackers are continuously trying to find a vulnerability to exploit users.What is Patch Tuesday?Microsoft's monthly security update delivery is known as Patch Tuesday. Patch Tuesday is a monthly event that occurs on the second Tuesday of each month.Microsoft releases these security patches to address vulnerabilities found in its software products so that hackers don't exploit these loopholes.When Microsoft fixes a security vulnerability, it does not disclose the Patch right away. Instead, the business compiles all fixes ... Read More
![Ayushi Bhargava](https://www.tutorialspoint.com/assets/profiles/391151/profile/60_449404-1635404331.jpg)
248 Views
What is WebRTC?Web Real-Time Communication (WebRTC) is an open-source program that enables web browsers to establish real-time peer-to-peer connections with websites they visit.WebRTC enables your Firefox browser, for example, to exchange live audio and video feeds back and forth between you and another online user without the need for any additional software to be downloaded.WebRTC is a non-proprietary protocol that allows any website to plug in and connect (with your permission). WebRTC does this by using the browser to build specific real-time communication channels. They exchange information with the website you are browsing (including your local and public IP addresses).WebRTC ... Read More
![Ayushi Bhargava](https://www.tutorialspoint.com/assets/profiles/391151/profile/60_449404-1635404331.jpg)
756 Views
In today's world, we are all in the modern era where toddlers to senior citizens use the internet to access their needs and wants; even businesses are now very much internet-focused. Businesses of all sizes can use the internet to gain access to vast amounts of information and other valuable tools vital to their success.While the internet is a fantastic tool when utilised correctly, it also has a lot of negative consequences, such as: Malicious hackers stealing valuable information, minors discovering age-inappropriate content, and lost productivity due to employees spending too much time on unwanted websites are all examples of ... Read More
![Ayushi Bhargava](https://www.tutorialspoint.com/assets/profiles/391151/profile/60_449404-1635404331.jpg)
2K+ Views
Server Message Block ProtocolThe Server Message Block (SMB) Protocol is a Microsoft Windows protocol that allows users to share files, printers, and serial ports across a network. SMBv2 is the most recent version released with Windows Vista and has undergone more revisions under Windows 7.The IBM-developed Server Message Block protocol is a networking protocol. In the 1990s, Microsoft upgraded the protocol, allowing Windows-based networks to create, alter, and delete shared files, printers, and serial ports.SMB is an application layer protocol that interacts through TCP port 445 in most deployments. Compared to similar protocols such as the File Transfer Protocol (FTP), ... Read More
![Ayushi Bhargava](https://www.tutorialspoint.com/assets/profiles/391151/profile/60_449404-1635404331.jpg)
3K+ Views
Protecting documents with a password will keep your data secure, whether you're sharing a device with other users or exchanging files over the internet. Some of the most fundamental Windows capabilities, such as the ability to specify passwords for specific files and folders, are often overlooked nowadays. This security feature can be useful in the event of a breach because hackers won't be able to access your personal papers.We frequently discuss ways to safeguard users' email, social media accounts, and other personal information, but what about text documents and other files that we could keep on our devices? If you ... Read More
![Ayushi Bhargava](https://www.tutorialspoint.com/assets/profiles/391151/profile/60_449404-1635404331.jpg)
250 Views
What is Security Service Edge?In its 2021 Roadmap for SASE Convergence research, Gartner presented Security Service Edge (SSE) as a new cybersecurity concept. SSE, according to Gartner, is a combination of integrated, cloud-centric security features that enables secure access to websites, SaaS apps, and private applications.A comprehensive SSE solution gives provides organizations with the complete set of security technologies they need to provide secure remote access to applications, data, tools, and other corporate resources to employees, trusted partners, and contractors, as well as monitor and track behavior once users are on the network.Following three essential services make up the secure ... Read More