Menu
Computer Network Security

What is a SQL Injection Attack?
SQL injection can be used by an attacker to inject code into a website in order to access and manipulate the database behind the site. More ...

Methods to Combat Distributed Denial of Service (DDoS) Attacks
DDOS attacks are costly in terms of lost revenue and added costs. DDoS attack protection plays a fundamental role in keeping businesses online. Here are some strategies that can be used to protect against a DDoS attack. More ...

What Is Penetration Testing?
Penetration testing is one of the hottest up and coming skills any IT professional needs to have. Companies are actively looking for penetration testers and professionals with a background in IT security and the ability to do penetration testing. More ...

Firewall Internet Security - The Basics of a Firewall
Enterprise companies today employ firewalls that inspect sessions between external and internal hosts and devices. The firewall filters traffic by examining the source and destination IP addresses, application port and protocol port before making a decision whether to permit or deny a session or specific traffic. More ...

Remote Access Authentication Protocols
A remote access authentication protocol is the method by which remote users will be authenticated when they log on the network. Some options are EAP, CHAP, and PAP, explined here. More ...

How to Stop Hackers from Invading Your Network
Large corporations, banks, financial institutions, security establishments are particularly favorite targets for hackers. However, this menace can be prevented to a great extent if proper security measures are taken. More ...

What is Cross Site Scripting?
Cross-site scripting attacks are used to steal information from your browser when you visit websites such as ecommerce stores, forums, and even your email accounts. More ...

Difference Between Network Firewall and Web Application Firewall
A Network Firewall acts as a security barrier between a trusted network, such as the local network (LAN), and an untrusted network, such as the Internet. A >Web Application Firewall (WAF) monitors and allows or blocks data packets as they travel to and from a Web application. More ...

Network Security Across the Enterprise
Today's business networks consist of numerous remote access connections from employees and outsourcing firms. Often, the security risks from connections outside the network are overlooked. The proper security solution for your organization will neutralize virtually all of these threats to your network. More ...

Wireless Network Security - The Basics of Securing a Wireless LAN
This article discusses how to secure your home and business wireless network. The process of a client associating and authenticating to an access point is standard. The security requirements vary from a home network, small business network and government departments requiring stringent network security. More ...

What is a Botnet Attack and How to Identify It?
Attacks against networks are increasing because attackers find many networks are not properly patched and secured behind a firewall. Once attackers have compromised a machine, they simply install a bot on it to establish communication. The botnet is then controlled by the attacker. More ...

ARP, MAC, Poisoning, and WiFi Security
In this article we cover the basics on Address Resolution Protocol (ARP), Media Access Control Addresses (MAC), Wireless (WiFi), and layer 2 communications. I explain how a 'Man in the Middle Attack' works. The common name for this is ARP poisoning, MAC poisoning, or Spoofing. More ...

Network User Authentication
Some switches require users to authenticate themselves before gaining access to the rest of the network. Network Access Control (NAC) checks the characteristics of the device seeking admission to the network. More ...


Learn more at amazon.com

Custom Search