Posts

Point-to-Point Protocol

Point-to-Point Protocol   What does  Point-to-Point Protocol (PPP)  mean? Point-to-point protocol (PPP) is a computer network protocol used to transfer a datagram between two directly connected (point-to-point) computers. This protocol is used for a very basic level of connectivity providing data linkage between the computers. Point-to-point protocol is widely used for the heavier and faster connections necessary for broadband communications. Point-to-point protocol is also known as RFC 1661 explains  Point-to-Point Protocol (PPP)-- There are many physical mediums for point-to-point connectivity, such as simple serial cables, mobile phones and telephone lines. For Ethernet networks, TCP and IP were introduced for data communication purposes. Both of these protocols have specifications for Ethernet networks only. Thus, TCP and IP do not support point-to-point connections. Therefore, PPP was introduced for point-to-point connectivity without...

IEEE Code of Ethics

IEEE Code of Ethics:- We, the members of the IEEE, in recognition of the importance of our technologies in affecting the quality of life throughout the world, and in accepting a personal obligation to our profession, its members and the communities we serve, do hereby commit ourselves to the highest ethical and professional conduct and agree: 1. to accept responsibility in making decisions consistent with the safety, health and welfare of the public, and to disclose promptly factors that might endanger the public or the environment; 2. to avoid real or perceived conflicts of interest whenever possible, and to disclose them to affected parties when they do exist; 3. to be honest and realistic in stating claims or estimates based on available data;? 4. to reject bribery in all its forms; 5. to improve the understanding of technology, its appropriate application, and potential consequences; 6. to maintain and improve our technical competence and to undertake technological ta...

Code of Ethics and Professional Conduct

Image
Code of Ethics and Professional Conduct  A code of ethics and professional conduct outlines the ethical principles that govern decisions and behavior at a company or organization. They give general outlines of how employees should behave, as well as specific guidance for handling issues like harassment, safety, and conflicts of interest. The Difference Between a Code of Ethics and a Code of Conduct: A code of ethics is broad, giving employees or members a general idea of what types of behavior and decisions are acceptable and encouraged at a business or organization. A code of conduct is more focused. It defines how employees or members should act in specific situations. Can You Combine a Code of Conduct and Code of Ethics? Yes, in most cases businesses will combine both of these documents into one as there is significant overlap between them. It is rare to find businesses that have two separate policies. Whilst they are technically different documents, employees w...

Professional Organizations in Information Security

Professional Organizations in Information Security:- Like many industries, the field of information security is served by a variety of professional organizations. These groups offer tools, resources, training, and certifications to help professionals build promising careers and meet the challenges of growing information security job market. As featured in our  resources page , here are a few of the most popular and respected professional organizations in information security: CompTIA CompTIA is a non-profit trade association, dedicated to advancing the global interests of IT professionals and IT channel organizations. CompTIA provides IT education,  certifications , business credentials, and resources as well as networking opportunities for professionals to connect with like-minded, leading IT industry experts. EC-Council The EC-Council is a member-supported professional organization providing information security resources for professionals in the fi...

Capability Maturity Model (CMM)

Image
What is CMM? Capability Maturity Model is used as a benchmark to measure the maturity of an organization's software process. CMM was developed at the Software engineering institute in the late 80's. It was developed as a result of a study financed by the U.S Air Force as a way to evaluate the work of subcontractors. Later based on the CMM-SW model created in 1991 to assess the maturity of software development, multiple other models are integrated with CMM-I they are What is Capability Maturity Model (CMM) Levels? Initial Repeatable/Managed Defined Quantitatively Managed Optimizing     Maturity levels consist of a predefined set of process areas. The maturity levels are measured by the achievement of the  specific  and  generic goals  that apply to each predefined set of process areas. The following sections describe the characteristics of each maturity level in detail. Level 1 – Initial: Company has no standard process for soft...

Data Transmission

Image
Definition :- When we enter data into the  computer  via keyboard, each keyed element is encoded by the electronics within the keyboard into an equivalent binary coded pattern, using one of the standard coding schemes that are used for the interchange of  information . To represent all characters of the keyboard, a unique pattern of 7 or 8 bits in size is used. The use of 7 bits means that 128 different elements can be represented, while 8 bits can represent 256 elements. A similar procedure is followed at the receiver that decodes every received binary pattern into the corresponding character. The most widely used codes that have been adopted for this function are the Extended Binary Coded Decimal (EBCDIC) and the American Standard Code for Information Interchange codes (ASCII). Both coding schemes cater to all the normal alphabetic, numeric, and punctuation characters, collectively referred to as  printable characters  and a range of additional control ...