Types of Intrusion Detection System(IDS)

What is Intrusion Detection System(IDS)?

An Intrusion Detection System(IDS) is a software application that scans a network or a system for malicious activities or policy violations.
Any malicious activity or violation is reported either to the network administrator or collected using a SIEM system(security information and event management).
A SIEM system combines output from multiple sources and uses alarm filtering techniques to differentiate between malicious activities from false alarms. 

Difference between AES and DES in cryptography

AES and DES are both symmetric-key cryptographic algorithms, in which the sender and receiver both use a single shared key for both encryption and decryption.
AES stands for Advanced Encryption Standard DES stands for Data Encryption Standard
First published in 1998 First published in 1976
The key length can be 128-bits, 192-bits, and 256-bits The effective key length is 56-bits
In AES, the number of rounds depends on key length: 10(128-bits), 12(192-bits), and 14(256-bits)  Uses 16 rounds of Feistel structure
The structure is based on the substitution-permutation network The structure is based on Feistel Cipher
The rounds in AES include Byte Substitution(SubBytes), Shift Rows, Mix Columns, Add RoundKey The rounds in DES include Expansion, XOR operation with round key, Substitution, and Permutation
AES can encrypt 128-bits of plaintext DES can encrypt 64-bits of plaintext
AES was designed by Vincent Rijmen, Joan Daemen DES was designed by IBM
AES is more secure than DES DES is known to have vulnerabilities. 3DES is the secure variation of DES
AES was derived from the square cipher DES was derived from the Lucifer cipher
No known crypt-analytical attacks against AES Known attacks against DES include Brute-force, Davies attack, Differential cryptanalysis(DC), and Linear cryptanalysis(LC)

What is Firewall and its Types?

What is a Firewall?

A Firewall is a cybersecurity tool (computer hardware or software) that helps to protect your network by filtering unwanted or blocking specific traffic based on defined security rules. The primary goal of a firewall is to protect the network from malicious traffic requests and allow only authorized traffic through.
The term firewall is originally referred to as a wall, intended for confining fire within a line of adjacent buildings. Firewall generally works at layer 3 and 4 of the OSI (Open Systems Interconnection) model.


Types of Cryptography Techniques

What is Cryptography?

Cryptography is the technique of protecting your information, by converting or encrypting the message into a secure format. Basically in cryptography, you convert plain text into Ciphertext. The ciphertext is plain text encrypted into a secure format using an encryption algorithm. The ciphertext is then converted into plain text using decryption.
Cryptography is the method of transmitting data into a secure format so that only those for whom it is intended can read and process it. 

Types of Cryptography

Generally, there are 3 main types of Cryptography techniques:


Latest Technology Trends in IT


In this modern era, technology is been updating at a rapid rate and a massive amount of money is being invested in the field of research and development. Lot of computer professionals are contributing in developing the existing technology to get the most of it. 
In this competitive era, keeping yourself updated with the latest technology is of huge importance. Having a brief knowledge of the latest technologies and trends is important.


What is Vue js used for, Why vue?

Before talking about the actual use of Vue js, first, let’s discuss What is Vue JS actually about?

What is Vue JS?

Vue.js is an open-source front-end framework for developing interactive UIs and single-page applications, created by Evan You is an MVVM or Model-View-ViewModel. The first version of Vue came in the year 2014. Currently, the latest version is 3.0.2 which was released in October 2020. Vue.js is a progressive JavaScript framework for building User Interfaces.