Essentials of Endpoint Device Backup
With the proliferation of data on laptops and mobile devices, organizations need to maintain control of how data is being accessed, shared, and distributed. Endpoint backup solutions should encrypt data in transit and in store to prevent unauthorized viewing of sensitive corporate data. More ...
Remote Access Authentication Protocols
A remote access authentication protocol is the method by which remote users will be authenticated when they log on the network. Some options are EAP, CHAP, and PAP, explined here. More ...
Top Ways to Prevent Data Loss
Data loss is crippling for any business, especially in the age of big data where companies rely on digital information to refine their marketing, contact prospects, and process transactions. The first goal should be to prevent data loss from occurring in the first place. More ...
The Role of Security Penetration Testers
An ethical hacker is a person who performs most of the same activities a hacker does but with the owner or company's permission. Ethical hackers are usually contracted to perform penetration tests or security tests. More ...
What is a SQL Injection Attack?
SQL injection can be used by an attacker to inject code into a website in order to access and manipulate the database behind the site. More ...
Firewall Internet Security - The Basics of a Firewall
Enterprise companies today employ firewalls that inspect sessions between external and internal hosts and devices. The firewall filters traffic by examining the source and destination IP addresses, application port and protocol port before making a decision whether to permit or deny a session or specific traffic. More ...
The Use of HoneyPots and HoneyNets to Trick Hackers
A HoneyPot is a storage area on a network that has fake confidential and valuable data used to trick hackers. More ...
How a Firewall Provides Network Security
A firewall provides security by controlling access between a network and an untrusted network. A firewall can be a hardware device, software, or combination of hardware and software. More ...
Wireless Network Security - The Basics of Securing a Wireless LAN
This article discusses how to secure your home and business wireless network. The process of a client associating and authenticating to an access point is standard. The security requirements vary from a home network, small business network and government departments requiring
stringent network security. More ...
Wireless Network Security
Before the IEEE completed the 802.11i standard the Wi-Fi Alliance released WPA. After the release of the IEEE 802.11i standard, the Wi-Fi Alliance released WPA2 which is compatible with both the 802.11i standard and WPA. More ...
What is Cross Site Scripting?
Cross-site scripting attacks are used to steal information from your browser when you visit websites such as ecommerce stores, forums, and even your email accounts. More ...
Design a Network Security Policy
A security policy is a statement of what your systems' users are and are not allowed to do. Make sure that the policy is consistent and clearly-written. More ...
How to Become a Professional Ethical Hacker
As a Professional Ethical Hacker you need to understand the various kind of hacking, which can be classified into White Hat, Grey Hat and non-ethical hacking. Only a deep knowledge can help in combating any sort of breach or unauthorised access in the information system. More ...
