Knowledge Base
cryptocurrency
A cryptocurrency is a digital asset designed to work as a medium of exchange that uses strong cryptography to secure financial transactions, control the creation of additional units, and verify the transfer of assets.
Digital Evidence
Digital evidence is defined as information and data of value to an investigation that is stored on, received or transmitted by an electronic device. This evidence can be acquired when electronic devices are seized and secured for examination.
social media
Social media are interactive computer-mediated technologies that facilitate the creation or sharing of information, ideas, career interests and other forms of expression via virtual communities and networks
mobile security
The term mobile security covers everything from malware threats to reducing risks and securing mobile devices and their data in the case of theft, unauthorized access or accidental loss .of the mobile device.
Artificial Intelligence
Artificial intelligence (AI) is the simulation of human intelligence processes by machines, especially computer systems. These processes include learning, reasoning and self-correction.
Malware
Malware, or malicious software, is any program or file that is harmful to a computer user. Types of malware can include computer viruses, worms, Trojan horses and spyware.
Information Security
It is the state of being protected against the unauthorized use of information, especially electronic data, or the measures taken to achieve this.
APP's Security
App security is the measure and means of defending mobile device apps from digital fraud in the form of malware, hacking, and other criminal manipulation.
Data Warehousing
Data warehousing is the process of constructing and using a data warehouse. A data warehouse is constructed by integrating data from multiple heterogeneous sources that support analytical reporting, structured and/or ad hoc queries, and decision making.
Data Mining
Data mining is defined as a process used to extract usable data from a larger set of any raw data. It implies analysing data patterns in large batches of data using one or more software. ... Data mining is also known as Knowledge Discovery in Data (KDD).
Mobile O/S
A mobile operating system is used for Phones, Tablets, SmartWatches, etc
Data Recovery Policy
Data recovery (DR) is an area of security planning that aims to protect an organization from the effects of significant negative events. DR allows an organization to maintain or quickly resume mission-critical functions following a disaster.
Do's & Dont's ~
Cyber Space
Don't go for 'Keep me logged in' or 'Remember me' options on websites, especially on public computers. Never use your official email address for social media sites. ... Do not install software that comes as an attachment in emails. Avoid saving your credit/debit card information on websites and web browsers