Understanding the Different Classes of Firewalls
A firewall is able to achieve its functions through the capabilities it is able to provide. These are
the capabilities determine the type of firewall to needed to meet a certain and specific set of security needs. More ...
Denial of Service Attack (DoS) Detection and Mitigation
A Denial of Service Attack is when a hacker attempts to consume such a large amount of a
server's resources that it's services will be unavailable to its intended users. For example
a DoS attack against a web server attempts to prevent it from serving web pages to
legitimate Internet clients. More ...
Digital Signatures and Certificates
The construction of the Digital Signature entails applying a hash function to the message by concatenation of the message with a known secret key and then applying a mathematical function which will produce a fixed length output known as the digest. More ...
Network security starts with physical security. Network components such as servers,
hubs, and routers should be located in a secure equipment room. Part of physical security
is protecting your cable plant from damage and electronic eavesdropping. More ...
How a Firewall Provides Network Security
A firewall provides security by controlling access between a network and an untrusted
network. A firewall can be a hardware device, software, or combination of hardware and software. More ...
What is Penetration Testing?
This book serves as an introduction to the steps required to complete a penetration test
or perform an ethical hack. You learn how to properly utilize and interpret the results
of modern day hacking tools; which are required to complete a penetration test. More ...
Man in the Middle Attack
In a Man in the Middle (MIM) attack the hacker places eavesdropping equipment between the
sending device and the receiving device. He intercepts the data, records it and possibly
modifies it, then sends it on to the intended receiving device. More ...
Wireless Network Security - The Basics of Securing a Wireless LAN
This article discusses how to secure your home and business wireless network. The process of a
client associating and authenticating to an access point is standard. The security requirements
vary from a home network, small business network and government departments requiring
stringent network security. More ...
Domain Name System (DNS) Vulnerabilities
The original design of the DNS did not include robust security features. DNS vulnerabilities
open networks to various types of attacks, cache poisoning and DDoS attacks being the most common. More ...
Design a Network Security Policy
A security policy is a statement of what your systems' users are and are not allowed to do.
Make sure that the policy is consistent and clearly-written. More ...
Are You Meeting ISO 27000 Standards for Information Security Management?
The ISO 27000 standard developed by The (IEC) and (ISO) is an internationally accepted industry
standard for Information Security Management (ISM). More ...
Types of Computer Security Threats
No book nor any checklist or method can show you all the kinds of harm that can happen to computer assets. There are too many ways to interfere with your use of these assets. Two information sources are of value however. The CVE list and the CVSS measurement system. More ...
Methods to Combat Distributed Denial of Service (DDoS) Attacks
DDOS attacks are costly in terms of lost revenue and added costs. DDoS attack protection
plays a fundamental role in keeping businesses online. Here are some strategies that can
be used to protect against a DDoS attack. More ...
Public Key Infrastructure
PKI (Public Key Infrastructure) uses a public and private key pair obtained and shared through a trusted authority. Public and private keys are used to lock (encrypt) and unlock (decrypt) data. Certificates are the cornerstones of the PKI. More ...