Domain Name System (DNS) Vulnerabilities
The original design of the DNS did not include robust security features. DNS vulnerabilities
open networks to various types of attacks, cache poisoning and DDoS attacks being the most common. More ...
What is Penetration Testing?
This book serves as an introduction to the steps required to complete a penetration test
or perform an ethical hack. You learn how to properly utilize and interpret the results
of modern day hacking tools; which are required to complete a penetration test. More ...
What is a Password Hash and Salt?
Never store a user's password as plain-text. A Hashing algorithm is similar to encryption. To increase the security of a hashed password,
a random value called salt is added to the hash. More ...
Nessus Network Vulnerability Scanner
Nessus is a network vulnerability scanning program that scans network hosts for
vulnerabilities and generates reports on its findings. More ...
Detecting Network Sniffers
A packet sniffer is a program or device that eavesdrops on network traffic and gathers data from packets.
Malicious intruders may install packet sniffers in order to retrieve usernames and passwords. More ...
Handling Rogue Access Points
A Rogue access point is any wireless access points that exist on your network without the consent of the business. If an insider were
to use a laptop to act as an access point, regardless of the intent, it poses a security risk. More ...
Designing Physical Network Security
Network security covers a multitude of issues. The first issue to address is physical access to your network. More ...
The Basics of Network Security
As technology and computer networks grow sophisticated over time, so do the intrusion
techniques that scammers use in order to infiltrate them. If you're serious about
protecting your company's private information , you need to do a lot more than have
a router and firewall in place. More ...
What is Network AAA (Authentication, Authorization, and Accounting)?
The acronym AAA stands for three network procedures and processes that help to make a network more secure and reliable. The A's
stand for Authentication, Authorization, and Accounting. The difference between authentication, authorization, and accounting is described here. More ...
Firewall Perimeter Network (DMZ)
A DMZ (Demilitarized Zone) or Perimeter Network is the area between the firewall that protects
the network from untrusted external networks (the Internet) and the firewall that protects the internal network. More ...
How a Firewall Provides Network Security
A firewall provides security by controlling access between a network and an untrusted
network. A firewall can be a hardware device, software, or combination of hardware and software. More ...
Elementary Information Security
This book is certified to comply fully with the NSTISSI 4011 federal training standard for information
security professionals. The text emphasizes both the technical and non-technical aspects of information
security and uses practical examples and real-world assessment tools. More ...
Wireless Network Security - The Basics of Securing a Wireless LAN
This article discusses how to secure your home and business wireless network. The process of a
client associating and authenticating to an access point is standard. The security requirements
vary from a home network, small business network and government departments requiring
stringent network security. More ...
How to Protect Your Business From a Cyber Attack
Hackers can be crippling for small businesses who, many times, never recover from the theft.
Here are some precautions you can take to help keep your business protected against hackers. More ...