Menu
Computer Network Security

How to Secure Your Wireless Network
If you use a wireless network, chances are good it is not secure. If you don't make some important configuration changes on your wireless router after installing it, your wireless network is wide open to hackers, curious neighbors and people who would rather use your broadband internet service instead of buying their own. More ...

Why Become a CISSP?
As a Certified Information Systems Security Professional (CISSP), you will be seen as a security professional of proven ability who has successfully met a predefined standard of knowledge and experience that is well understood and respected throughout the industry. More ...

Types of DoS (Denial of Service) Attacks
The methods used to launch a DoS (Denial of Service) attack can be divided into three essential categories: Flood attacks, Logic attacks, and Distributed Denial-of-Service (DDoS) attacks. Attackers may use each method to compromise or completely shut down an Internet server. More ...

The Basics of Network Security
As technology and computer networks grow sophisticated over time, so do the intrusion techniques that scammers use in order to infiltrate them. If you're serious about protecting your company's private information , you need to do a lot more than have a router and firewall in place. More ...

Prevent Hacking with Password-Cracking Countermeasures
Taking some general countermeasures can prevent hacking of your important passwords. Many people use the same passwords on every system they use. For this reason, you might instructg users to create different passwords especially on the systems that protect information that's more sensitive. More ...

Public Key Infrastructure
PKI (Public Key Infrastructure) uses a public and private key pair obtained and shared through a trusted authority. Public and private keys are used to lock (encrypt) and unlock (decrypt) data. Certificates are the cornerstones of the PKI. More ...

How SSL (Secure Sockets Layer) Works
SSL is a security protocol standard that encrypts communication between a web browser and a web server. Any organization that uses their website to transmit, receive, store, or display confidential or sensitive information such as passwords, credit card or bank account numbers, social security numbers, and so on, needs to use an SSL Connection. More ...

Detecting Network Sniffers
A packet sniffer is a program or device that eavesdrops on network traffic and gathers data from packets. Malicious intruders may install packet sniffers in order to retrieve usernames and passwords. More ...

Firewall Internet Security - The Basics of a Firewall
Enterprise companies today employ firewalls that inspect sessions between external and internal hosts and devices. The firewall filters traffic by examining the source and destination IP addresses, application port and protocol port before making a decision whether to permit or deny a session or specific traffic. More ...

Understanding the Different Classes of Firewalls
A firewall is able to achieve its functions through the capabilities it is able to provide. These are the capabilities determine the type of firewall to needed to meet a certain and specific set of security needs. More ...

ARP, MAC, Poisoning, and WiFi Security
In this article we cover the basics on Address Resolution Protocol (ARP), Media Access Control Addresses (MAC), Wireless (WiFi), and layer 2 communications. I explain how a 'Man in the Middle Attack' works. The common name for this is ARP poisoning, MAC poisoning, or Spoofing. More ...

Methods to Combat Distributed Denial of Service (DDoS) Attacks
DDOS attacks are costly in terms of lost revenue and added costs. DDoS attack protection plays a fundamental role in keeping businesses online. Here are some strategies that can be used to protect against a DDoS attack. More ...

Remote Access Authentication Protocols
A remote access authentication protocol is the method by which remote users will be authenticated when they log on the network. Some options are EAP, CHAP, and PAP, explined here. More ...


Learn more at amazon.com

Custom Search