In this, we will be learning about Data Breach, how Data Breach happen, which Malicious method is used, and the targeted in Data Breach.

Data Breach?

Data breaches reveal information that is private, sensitive, or protected by an unauthorized person. Infringement files are viewed and/or shared without the permission of…

In this article, we will be learning about AWS (WAF) Web Application Firewall and Amazon GUARD DUTY.


AWS stands for Amazon Web Server is an Amazon subsidiary that on a metered pay-as-you-go basis, offers on-demand cloud computing platforms and APIs to individuals, enterprises, and governments. A number of fundamental…

Overview of Data Storage

Data Storage is a collection of digital information and the ability to retain the data and there is a most prevalent form of data storage that is file storage, block storage, and object storage. It includes cache memory, dynamic RAM, or Main memory. Data in the…

Raju Prasad

student, blogger, painter

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store