Hash function

What is a hash function? Definition, usage, and examples

Hash functions are used in many areas of computer science. They generate hash values that represent digital information in a consistent manner according to defined parameters. They provide additional security (using encryption) during data transmission and allow data to be accessed more quickly. We explain what hash functions are, how they are used and provide some examples.

What is Mandatory Access Control (MAC)?

Mandatory Access Control (MAC): how does it work?

Data protection is very important, especially when it comes to high-security branches like the government and the military. Users in most organisations only have access to the data they need to do their job, and when it comes to highly sensitive data, it’s important to have a system that’s as tamper-proof as possible. That’s where Mandatory Access Control comes in. Keep reading to find out how...

What is role-based access control (RBAC)?

How does role-based access control (RBAC) work?

Organisations restrict access permissions in systems to protect sensitive data from unauthorised access and modification. However, assigning access permissions to users individually is a high-maintenance and error-prone process. In the case of role-based access control (RBAC), permissions are assigned based on previously assigned roles. Here, we explain how role-based access control works.

Hash table

The hash table: fast database access to hash values

A hash table is created using the hash function. This is a method for reducing digital information in such a way that extensive data sets can be retrieved quickly in internet-based databases. This method also makes it possible to implement sophisticated security features using encryption when transferring data.

Brute force attack: definition and protective measures

Brute force attacks: when passwords are served on a silver platter

Being constantly faced with headlines about stolen passwords, it’s understandable that many users are concerned. Your best bet is to make your passwords as complicated as possible and have them consist of many different types of characters. But even this won’t help if it’s the actual log-in area that isn’t secure enough. Even today, attackers are still successful with the notorious and simple...

What is SIEM?

What is SIEM (Security Information and Event Management)?

Security gaps in IT infrastructure can risk a company’s reputation or even threaten its survival. Where criminals manage to shut down company networks or gain access to sensitive data, financial and image-related damage becomes a certainty. SIEM (Security Information and Event Management) allows businesses to detect danger in real-time, allowing for appropriate and timely reactions.

What is spoofing?

What is spoofing?

Spoofing attacks encompass a wide range of potential attack scenarios. Besides conventional approaches like IP spoofing and DNS spoofing, they also include particularly dangerous phishing attacks. Read this article to find out how spoofing attacks work and what measures you can take to protect yourself effectively.

What is SELinux?

What is SELinux?

The SELinux security module is built into the Linux kernel and can be activated on a number of Linux operating systems (distributions). By using SELinux, only essential access to the operating system is permitted. This gives administrators more control over running processes. With SELinux, there is far less risk of unsafe user programs endangering the overall system.

What is a botnet?

Botnets: definition and protection tips

Botnets are tricky to spot, but they’re all over the internet and they cause all kinds of damage every day. They lurk inconspicuously in the background and use millions of private computers for malicious purposes. This guide explains how botnets work, how to keep them away, and how you can avoid falling victim to an illegal network.


Wait! We’ve got something for you!
Get your .co.uk domain for just £1/1st year.

Enter the web address of your choice in the search bar to check its availability.
12 month for £1/1st year
then £10/year