Menu
Computer Network Security

Firewall Perimeter Network (DMZ)
A DMZ (Demilitarized Zone) or Perimeter Network is the area between the firewall that protects the network from untrusted external networks (the Internet) and the firewall that protects the internal network. More ...

How to Become a Professional Ethical Hacker
As a Professional Ethical Hacker you need to understand the various kind of hacking, which can be classified into White Hat, Grey Hat and non-ethical hacking. Only a deep knowledge can help in combating any sort of breach or unauthorised access in the information system. More ...

Security Issues with Wireless LANs
Wireless LAN (WLAN) security threats include war dialing, war driving, war chalking, WEP and WPA security cracking, and rogue access points. This artilce discuses approaches to WLAN Security. More ...

Email Security
Email has emerged as one of the most important communication mediums. Failing to secure your organization's mail servers may allow spammers to misuse your servers and bandwidth as an open relay to propagate their spam. More ...

What is Network AAA (Authentication, Authorization, and Accounting)?
The acronym AAA stands for three network procedures and processes that help to make a network more secure and reliable. The A's stand for Authentication, Authorization, and Accounting. The difference between authentication, authorization, and accounting is described here. More ...

What is a SQL Injection Attack?
SQL injection can be used by an attacker to inject code into a website in order to access and manipulate the database behind the site. More ...

Cyber Security Tips for Small and Medium Business (SMB)
When it comes to small or medium enterprise the impact of security threat is even more severe. Cyber criminals love to target small business largely due to the fact that SMBs cannot afford to implement strong security protocols. More ...

What is Penetration Testing?
This book serves as an introduction to the steps required to complete a penetration test or perform an ethical hack. You learn how to properly utilize and interpret the results of modern day hacking tools; which are required to complete a penetration test. More ...

Denial of Service Attack (DoS) Detection and Mitigation
A Denial of Service Attack is when a hacker attempts to consume such a large amount of a server's resources that it's services will be unavailable to its intended users. For example a DoS attack against a web server attempts to prevent it from serving web pages to legitimate Internet clients. More ...

Types of DoS (Denial of Service) Attacks
The methods used to launch a DoS (Denial of Service) attack can be divided into three essential categories: Flood attacks, Logic attacks, and Distributed Denial-of-Service (DDoS) attacks. Attackers may use each method to compromise or completely shut down an Internet server. More ...

How to Protect Your Business From a Cyber Attack
Hackers can be crippling for small businesses who, many times, never recover from the theft. Here are some precautions you can take to help keep your business protected against hackers. More ...

What is a Botnet Attack and How to Identify It?
Attacks against networks are increasing because attackers find many networks are not properly patched and secured behind a firewall. Once attackers have compromised a machine, they simply install a bot on it to establish communication. The botnet is then controlled by the attacker. More ...

Multi-Layered Approach to Cyber Security
A multi-layered approach can be tailored to different levels of security. Not every asset needs to be completely secure; instead, only the most business critical assets, such as proprietary and confidential information, need be protected by the most restricted settings. More ...


Learn more at amazon.com

Custom Search