Articles by Team EasyExamNotes

Categories of security assessments

There are following categories of security Assessments: Vulnerability Assessment Penetration Test White/Grey/Black-Box Assessment Risk Assessment Threat Assessment 1.Vulnerability Assessment: Vulnerability assessment, is also known as … Read more

Intrusion detection tool

Introduction: 1.An intrusion detection system (IDS) is a device or software application that monitors a network or systems for malicious activity or policy violations. 2.Any … Read more

Security threats

In computer security a threat is a possible danger that might exploit a vulnerability to breach security and therefore cause possible harm. Here’s a quick … Read more

Types of Attack

TYPES OF ATTACKS Without security measures and controls in place, your data might be subjected to an attack. Some attacks are passive, meaning information is … Read more

Global data flow analysis

Introduction to Global data flow analysis Data-flow analysis Data-flow analysis is a process in which optimizing compiler collects the data-flow information. Here,Data-flow information means status … Read more

Loop optimization

Loop optimization is a set of techniques used to improve the efficiency and performance of loops in computer programs. Since loops often account for a … Read more