Category: Security

WannaCry: What is a Ransomware and how does it work?

A ransomware is a software which scrambles information stored on a computer system to make it inaccessible. The process of scrambling is done through known methods of encryption. The purpose is to then ask for an amount of money to decrypt...

/ May 27, 2017

How does secure socket layer (SSL/TLS) work? Why do retail websites require https?

To answer what is secure socket layer and how it keeps websites secure it is important to understand the making of the Internet. The internet in turn is an abstract concept meaning the interconnected network of computers across the globe....

/ March 30, 2017

A brief history of the internet, cryptography, cryptanalysis and encryption laws of India

The internet Thanks to the internet you are reading this article right now. How did the internet get to where it is right today? There is so much history we cannot possibly get it together in this short article. The...

/ February 22, 2017

What are digital signatures? Signing and verification – Relevant Indian Laws

Digital Signatures are considered to be more secure than the traditional ink signatures we all are used to. This is because ink signatures can be copied manually and exact duplicates can also be created through various ways. However, digital signatures can not...

/ February 12, 2017

Understanding Asymmetric Cryptography, Public Key, Private Key and the RSA Algorithm

Encryption as explained earlier is simply substitution of letters with numbers and then using complex mathematical functions to alter the pattern of numbers. This article is about understanding Asymmetric Cryptography, Public Key, Private Key and the RSA Algorithm. Encryption has been...

/ February 9, 2017

Encryption and Symmetric Cryptography – How is data secured electronically?

Computers got popular mostly as a mode of storage and communication. And as the relevance of computers grew in everyday life there arose the need to secure stored data. Encryption is not the creation or function of the internet or of computers. Encryption...

/ February 8, 2017

What is digital fingerprint and hashing? And how is it generated?

To start with digital fingerprints or hashing you need to understand what is a fingerprint and what is digital (no kidding).   What is a fingerprint? Normally a fingerprint in biology and biometrics is the unique pattern of whorls and...

/ February 6, 2017

What is Phishing or Spoofing? Affixing legal liability through Indian Laws

Internet developed rapidly leaving little or no scope for its terminologies to develop. Most internet terms and phrases are English loanwords most analogous to the concept being described. Phishing as a concept is analogous to fishing where predators wait for unsuspecting...

/ February 4, 2017

Denial of Service (DoS) attack and relevant Indian Laws

What is a DoS (Denial of Service) attack? And how is it committed? To understand DoS, you will need to have an idea of what is the Service being provided, how someone can deny it to you, and how it can be...

/ January 31, 2017