How SSL (Secure Sockets Layer) Works
SSL is a security protocol standard that encrypts communication between a web browser and a web server. Any organization that uses their website to transmit, receive, store, or display confidential or sensitive information such as passwords, credit card or bank account numbers, social security numbers, and so on, needs to use an SSL Connection. More ...
Denial of Service Attack (DoS) Detection and Mitigation
A Denial of Service Attack is when a hacker attempts to consume such a large amount of a server's resources that it's services will be unavailable to its intended users. For example a DoS attack against a web server attempts to prevent it from serving web pages to
legitimate Internet clients. More ...
Difference Between Network Firewall and Web Application Firewall
A Network Firewall acts as a security barrier between a trusted network, such as the local network (LAN), and an untrusted network, such as the Internet. A >Web Application Firewall (WAF) monitors and allows or blocks data packets as they travel to and from a Web application. More ...
Network Security by Filtering
Filtering allows network administrators to control which packets are permitted or denied in or out of a network. It can be used to control how much bandwidth can be used by parts of a network, but is more often used to provide security for a network. More ...
Overview of IPsec with IKEv1
VPN (Virtual Private Network) technologies such as IPsec (IP Security) with IKE (Internet Key Exchange) offer the ability to transmit over broadband securely. More ...
What is Penetration Testing?
This book serves as an introduction to the steps required to complete a penetration test or perform an ethical hack. You learn how to properly utilize and interpret the results of modern day hacking tools; which are required to complete a penetration test. More ...
How Snort's Stealth TCP Port Scanning Works
Snort is an open source network intrusion detection system, capable of performing real-time traffic analysis and packet logging on IP networks. It can perform protocol analysis, content searching and matching, and can be used to detect a variety of attacks and probes. More ...
The Use of HoneyPots and HoneyNets to Trick Hackers
A HoneyPot is a storage area on a network that has fake confidential and valuable data used to trick hackers. More ...
How to Use the Open Source Intrusion Detection System SNORT
In terms of raw power and features, SNORT, the most commonly used Open Source Intrusion Detection System, (IDS) has begun to eclipse many expensive proprietary IDSes. In terms of documentation or ease of use, however, SNORT can seem overwhelming. More ...
Handling Rogue Access Points
A Rogue access point is any wireless access points that exist on your network without the consent of the business. If an insider were to use a laptop to act as an access point, regardless of the intent, it poses a security risk. More ...
Types of DoS (Denial of Service) Attacks
The methods used to launch a DoS (Denial of Service) attack can be divided into three essential categories: Flood attacks, Logic attacks, and Distributed Denial-of-Service (DDoS) attacks. Attackers may use each method to compromise or completely shut down an Internet server. More ...
Multi-Layered Approach to Cyber Security
A multi-layered approach can be tailored to different levels of security. Not every asset needs to be completely secure; instead, only the most business critical assets, such as proprietary and confidential information, need be protected by the most restricted settings. More ...
Implementing a Secure Password Policy
If your network is compromised, identity thefts could use your company's customers credit card numbers and social security numbers to destroy their lives. And it's not only your company's customers who are going to suffer. When the source of the security breach is traced to your company, the result will be a negligence lawsuit. More ...
