Skip to content
Tuesday, Oct 7, 2025
ICT BYTE Logo

ICT BYTE

Tech News in Nepal | #1 Tech Blog

  • HOME
  • GADGETS
    • MOBILE
    • LAPTOPS
    • SMARTWATCH
    • TABLETS
  • EVENTS
  • NEPAL
    • Banking
    • B.Sc. CSIT
    • BCA
  • MCS
    • 1st Sem
      • Managerial Communication
      • Object Oriented Programming
      • Open Source Technology
      • Design and Analysis of Algorithm
    • 2nd Sem
    • 3rd Sem
    • 4th Sem
  • Hult Prize
  • Utility Tools

Tag: Cyber security

Masters of Computer ScienceCyber Security

Social Engineering Explained in Simple Way

Social engineering is the art of convincing people to reveal confidential information Common targets of social engineering include help desk…

byICT Byte
Malware Threats in Cyber Security. What actually it is?
Masters of Computer ScienceCyber Security

Malware Threats in Cyber Security. What actually it is?

Malware Overview Malware is a malicious software that damages or disables computer systems and gives limited or full control of…

byICT Byte
System Hacking. Here is how your system can be hacked
Masters of Computer ScienceCyber Security

System Hacking. Here is how your system can be hacked

What is system hacking? System hacking is defined as the compromise of computer systems and software to access the target…

byICT Byte
Cyber Security Vulnerability Assessment
Masters of Computer ScienceCyber Security

Cyber Security Vulnerability Assessment

Vulnerability analysis is the next phase of Ethical hacking to identify the security holes or vulnerabilities in your system or…

byICT Byte
Enumeration in Cyber Security! Everything that you need to understand.
Masters of Computer ScienceCyber Security

Enumeration in Cyber Security! Everything that you need to understand.

What is Enumeration? In the enumeration phase, attacker creates active connections to system and performs directed queries to gain more…

byICT Byte
Scanning Networks in Cyber Security
Cyber SecurityMasters of Computer Science

Scanning Networks in Cyber Security

Network Scanning Concepts Network scanning refers to a set of procedures for identifying hosts, ports, and services in a network.…

byICT Byte
Masters of Computer ScienceCyber Security

Cyber Security Syllabus | MCS | Lincoln University College

Introduction to Ethical Hacking Overview of Current Security Trends Elements of Information Security Information Security Threats and Attack Vectors Hacking…

byICT Byte
International Webinar 2020: Strategies for National Cyber Security

International Webinar 2020: Strategies for National Cyber Security

Centre for Cyber Security Research and Innovation and Information Security Response Team Nepal is organizing this event, International Webinar 2020:…

bySarbeshwori Tajhya
Cyber Security Jobs with Salaries : Cyber Security Salary In Nepal 2023
NEPALSecurity

Cyber Security Jobs with Salaries : Cyber Security Salary In Nepal 2023

Before knowing about the jobs related to Cyber security, let us understand what Cybersecurity is. The process of protecting the…

byBipisha Bajracharya

Copyright © 2025 ICT BYTE | Expose News by Ascendoor | Powered by WordPress.