Confidentiality, Integrity, and Availability (CIA)

                  Confidentiality, integrity and availability, known as the CIA triad (Figure 1), is a guideline for information security for an organization. Confidentiality ensures the privacy of data by restricting access through authentication encryption. Integrity assures that the information is accurate and trustworthy. Availability ensures that the information …

Li-Fi (Light Fidelity)

1. Introduction Li_fi refers to light based comunication technology that delivers a high speed, bi-directional, mobile communications similar to wifi but more secure and with greater speed. Li-Fi uses household LEDs to enable data transfer boosting transfer speed of 224 Gb/s. 2. Why the need for Li-Fi In general mode of communication the transmitter is …

Small Description of Information Technology

Access Control List (ACL): A list of permissions attached to an object. An ACL specifies which users or system processes are granted access to objects, as well as what operations are allowed on given objects. Application: A software program that runs on your computer. Web browsers, e-mail programs, word processors, and utilities are all applications. Domains: A domain …