Menu
Computer Network Security

What Is Penetration Testing?
Penetration testing is one of the hottest up and coming skills any IT professional needs to have. Companies are actively looking for penetration testers and professionals with a background in IT security and the ability to do penetration testing. More ...

Top Ways to Prevent Data Loss
Data loss is crippling for any business, especially in the age of big data where companies rely on digital information to refine their marketing, contact prospects, and process transactions. The first goal should be to prevent data loss from occurring in the first place. More ...

The Role of Security Penetration Testers
An ethical hacker is a person who performs most of the same activities a hacker does but with the owner or company's permission. Ethical hackers are usually contracted to perform penetration tests or security tests. More ...

Email Security
Email has emerged as one of the most important communication mediums. Failing to secure your organization's mail servers may allow spammers to misuse your servers and bandwidth as an open relay to propagate their spam. More ...

Design a Network Security Policy
A security policy is a statement of what your systems' users are and are not allowed to do. Make sure that the policy is consistent and clearly-written. More ...

What is Cross Site Scripting?
Cross-site scripting attacks are used to steal information from your browser when you visit websites such as ecommerce stores, forums, and even your email accounts. More ...

Network Security Model - Defining an Enterprise Security Strategy
These are the five primary security groups that should be considered with any enterprise security model. These include security policy, perimeter, network, transaction and monitoring security. These are all part of any effective company security strategy. More ...

How SSL (Secure Sockets Layer) Works
SSL is a security protocol standard that encrypts communication between a web browser and a web server. Any organization that uses their website to transmit, receive, store, or display confidential or sensitive information such as passwords, credit card or bank account numbers, social security numbers, and so on, needs to use an SSL Connection. More ...

Nessus Network Vulnerability Scanner
Nessus is a network vulnerability scanning program that scans network hosts for vulnerabilities and generates reports on its findings. More ...

ARP, MAC, Poisoning, and WiFi Security
In this article we cover the basics on Address Resolution Protocol (ARP), Media Access Control Addresses (MAC), Wireless (WiFi), and layer 2 communications. I explain how a 'Man in the Middle Attack' works. The common name for this is ARP poisoning, MAC poisoning, or Spoofing. More ...

Methods to Combat Distributed Denial of Service (DDoS) Attacks
DDOS attacks are costly in terms of lost revenue and added costs. DDoS attack protection plays a fundamental role in keeping businesses online. Here are some strategies that can be used to protect against a DDoS attack. More ...

Elementary Information Security
This book is certified to comply fully with the NSTISSI 4011 federal training standard for information security professionals. The text emphasizes both the technical and non-technical aspects of information security and uses practical examples and real-world assessment tools. More ...

The Use of HoneyPots and HoneyNets to Trick Hackers
A HoneyPot is a storage area on a network that has fake confidential and valuable data used to trick hackers. More ...


Learn more at amazon.com

Custom Search