DoS vs DDoS DoS (Denial-of-Service) attack is a type of attack carried out by a single host that denies a certain service to its intended users, by either crashing or flooding the computer that is offering the service. DDoS (Distributed Denial-of-Service) attack is a DoS attack simultaneously carried out by multiple hosts. What is DoS? […]
Difference Between CISSP and CISM
CISSP vs CISM CISSP and CISM are two of the most widely sought after certification programs for information security. Both CISSP and CISM intend to provide a common body of knowledge for information security professionals and managers around the world. Both CISSP and CISM are approved certifications for the Information Assurance Workforce Improvement Program. What […]
Difference Between Antivirus and Firewall
Antivirus vs Firewall Both Antivirus software and Firewalls are mechanisms that are used as security measures in computer networks. A device or set of devices intended to allow permission to accept/deny transmissions based on a certain set of rules is called a firewall. Firewall is used to protect networks from unauthorized access, while permitting legitimate […]
Difference Between AES and TKIP
AES vs TKIP When communicating over an untrusted medium such as wireless networks, it is very important to protect information. Cryptography (encryption) plays an important role in this. Most modern Wi-Fi devices can use either WPA or WPA2 wireless security protocols. User can use TKIP (Temporal Key Integrity Protocol) encryption protocol with WPA and AES […]
Difference Between Network Security and Information Security
Network Security vs Information Security Network security involves methods or practices used to protect a computer network from unauthorized accesses, misuses or modifications. Networks owned by different organizations require different levels of security. For example, level of security required by a home network would be different than the level of security required by a network […]
Difference Between Cracker and Hacker
Cracker vs Hacker A Cracker is a person who breaks in to a security system only with a malicious intent. A person who breaks in to a computer system for the purpose of earning profit, finding security loopholes of the system, showing protest or just for the sake of challenge is called a hacker. In […]
Difference Between Cryptography and Steganography
Cryptography vs Steganography The study of hiding information is called Cryptography. When communicating over an untrusted medium such as internet, it is very important to protect information and Cryptography plays an important role in this. Today, cryptography uses principles from several disciplines such as mathematics, computer science, etc. Steganography deals with composing hidden messages so […]
Difference Between Cyber Crime and Computer Forensics
Cyber Crime vs Computer Forensics Any criminal offence that involves a computer/network can be known as a cyber crime or a computer crime. The computer could be used to either commit the crime or it could have been the target of the crime. The main target of computer forensics is to find digital evidence in […]
Difference Between Stream Cipher and Block Cipher
Stream Cipher vs Block Cipher | State Cipher vs Block Cipher In cryptography, Stream ciphers and Block ciphers are two encryption/decryption algorithms that belong to the family of symmetric key ciphers. Typically a cipher takes a plain-text as input and produces a ciphertext as output. Block ciphers encrypts fixed-length block of bits using an unvarying […]