Menu
Computer Network Security

Network Security Across the Enterprise
Today's business networks consist of numerous remote access connections from employees and outsourcing firms. Often, the security risks from connections outside the network are overlooked. The proper security solution for your organization will neutralize virtually all of these threats to your network. More ...

Types of Computer Security Threats
No book nor any checklist or method can show you all the kinds of harm that can happen to computer assets. There are too many ways to interfere with your use of these assets. Two information sources are of value however. The CVE list and the CVSS measurement system. More ...

Network Security by Filtering
Filtering allows network administrators to control which packets are permitted or denied in or out of a network. It can be used to control how much bandwidth can be used by parts of a network, but is more often used to provide security for a network. More ...

What is a Botnet Attack and How to Identify It?
Attacks against networks are increasing because attackers find many networks are not properly patched and secured behind a firewall. Once attackers have compromised a machine, they simply install a bot on it to establish communication. The botnet is then controlled by the attacker. More ...

What is a SQL Injection Attack?
SQL injection can be used by an attacker to inject code into a website in order to access and manipulate the database behind the site. More ...

Remote Access Authentication Protocols
A remote access authentication protocol is the method by which remote users will be authenticated when they log on the network. Some options are EAP, CHAP, and PAP, explined here. More ...

Network Security Model - Defining an Enterprise Security Strategy
These are the five primary security groups that should be considered with any enterprise security model. These include security policy, perimeter, network, transaction and monitoring security. These are all part of any effective company security strategy. More ...

What is Network AAA (Authentication, Authorization, and Accounting)?
The acronym AAA stands for three network procedures and processes that help to make a network more secure and reliable. The A's stand for Authentication, Authorization, and Accounting. The difference between authentication, authorization, and accounting is described here. More ...

Intrusion Detection System (IDS) and Intrusion Prevention System (IPS)
"Most organizations use both IDS and an IPS. The IPS automatically blocks attacks where it is accurate, while the IDS logs and notifies network administrators of suspicious activity so they can use their judgment as to what countermeasures to take. More ...

Firewall Internet Security - The Basics of a Firewall
Enterprise companies today employ firewalls that inspect sessions between external and internal hosts and devices. The firewall filters traffic by examining the source and destination IP addresses, application port and protocol port before making a decision whether to permit or deny a session or specific traffic. More ...

Denial of Service Attack (DoS) Detection and Mitigation
A Denial of Service Attack is when a hacker attempts to consume such a large amount of a server's resources that it's services will be unavailable to its intended users. For example a DoS attack against a web server attempts to prevent it from serving web pages to legitimate Internet clients. More ...

How SSL (Secure Sockets Layer) Works
SSL is a security protocol standard that encrypts communication between a web browser and a web server. Any organization that uses their website to transmit, receive, store, or display confidential or sensitive information such as passwords, credit card or bank account numbers, social security numbers, and so on, needs to use an SSL Connection. More ...

Types of DoS (Denial of Service) Attacks
The methods used to launch a DoS (Denial of Service) attack can be divided into three essential categories: Flood attacks, Logic attacks, and Distributed Denial-of-Service (DDoS) attacks. Attackers may use each method to compromise or completely shut down an Internet server. More ...


Learn more at amazon.com

Custom Search