Difference Between Network Firewall and Web Application Firewall
A Network Firewall acts as a security barrier between a trusted network, such as the local network (LAN), and an untrusted network, such as the Internet. A >Web Application Firewall (WAF) monitors and allows or blocks data packets as they travel to and from a Web application. More ...
Why Become a CISSP?
As a Certified Information Systems Security Professional (CISSP), you will be seen as a security professional of proven ability who has successfully met a predefined standard of knowledge and experience that is well understood and respected throughout the industry. More ...
Network Security Across the Enterprise
Today's business networks consist of numerous remote access connections from employees and outsourcing firms. Often, the security risks from connections outside the network are overlooked. The proper security solution for your organization will neutralize virtually all of these threats to your network. More ...
Wireless Network Security - The Basics of Securing a Wireless LAN
This article discusses how to secure your home and business wireless network. The process of a client associating and authenticating to an access point is standard. The security requirements vary from a home network, small business network and government departments requiring
stringent network security. More ...
Firewall Rules
The purpose of a network firewall is to protect computer and IT resources from malicious sources while allowing internal network users to access the Internet. For this purpose it uses an Access Control List (ACL). More ...
Network Security by Filtering
Filtering allows network administrators to control which packets are permitted or denied in or out of a network. It can be used to control how much bandwidth can be used by parts of a network, but is more often used to provide security for a network. More ...
How to Protect Your Business From a Cyber Attack
Hackers can be crippling for small businesses who, many times, never recover from the theft. Here are some precautions you can take to help keep your business protected against hackers. More ...
Difference Between Rule and Role Based Access Control
Access control is the method used to block or allow access to a network or network resources. Two types of access control are rule-based and role-based. The difference between rule-based and role-based access control is explained here. More ...
How to Secure Your Small Business Network
Automated scanning techniques and botnets don't care whether your company is big or small, they're only looking for holes in your network security to exploit. Here are 10 of the most critical steps you can take to keep your data secure, and none of them take much time or effort to accomplish. More ...
How a Firewall Provides Network Security
A firewall provides security by controlling access between a network and an untrusted network. A firewall can be a hardware device, software, or combination of hardware and software. More ...
Handling Rogue Access Points
A Rogue access point is any wireless access points that exist on your network without the consent of the business. If an insider were to use a laptop to act as an access point, regardless of the intent, it poses a security risk. More ...
Domain Name System (DNS) Vulnerabilities
The original design of the DNS did not include robust security features. DNS vulnerabilities open networks to various types of attacks, cache poisoning and DDoS attacks being the most common. More ...
Digital Signatures and Certificates
The construction of the Digital Signature entails applying a hash function to the message by concatenation of the message with a known secret key and then applying a mathematical function which will produce a fixed length output known as the digest. More ...
