Menu
Computer Network Security

ARP, MAC, Poisoning, and WiFi Security
In this article we cover the basics on Address Resolution Protocol (ARP), Media Access Control Addresses (MAC), Wireless (WiFi), and layer 2 communications. I explain how a 'Man in the Middle Attack' works. The common name for this is ARP poisoning, MAC poisoning, or Spoofing. More ...

Network User Authentication
Some switches require users to authenticate themselves before gaining access to the rest of the network. Network Access Control (NAC) checks the characteristics of the device seeking admission to the network. More ...

What Is Penetration Testing?
Penetration testing is one of the hottest up and coming skills any IT professional needs to have. Companies are actively looking for penetration testers and professionals with a background in IT security and the ability to do penetration testing. More ...

What's the Difference Between Sniffing, Snooping, and Spoofing?
Network sniffing and snooping involve tapping into network traffic for the purpose extracting usernames, passwords, account numbers, and other information. Spoofing is when a hacker creates an email or a website that appears to genuine but is designed for the purpose extracting usernames, passwords, account numbers. More ...

Designing Physical Network Security
Network security covers a multitude of issues. The first issue to address is physical access to your network. More ...

Firewall Internet Security - The Basics of a Firewall
Enterprise companies today employ firewalls that inspect sessions between external and internal hosts and devices. The firewall filters traffic by examining the source and destination IP addresses, application port and protocol port before making a decision whether to permit or deny a session or specific traffic. More ...

How Snort's Stealth TCP Port Scanning Works
Snort is an open source network intrusion detection system, capable of performing real-time traffic analysis and packet logging on IP networks. It can perform protocol analysis, content searching and matching, and can be used to detect a variety of attacks and probes. More ...

Design a Network Security Policy
A security policy is a statement of what your systems' users are and are not allowed to do. Make sure that the policy is consistent and clearly-written. More ...

Overview of IPsec with IKEv1
VPN (Virtual Private Network) technologies such as IPsec (IP Security) with IKE (Internet Key Exchange) offer the ability to transmit over broadband securely. More ...

How to Secure Your Wireless Network
If you use a wireless network, chances are good it is not secure. If you don't make some important configuration changes on your wireless router after installing it, your wireless network is wide open to hackers, curious neighbors and people who would rather use your broadband internet service instead of buying their own. More ...

What is a SQL Injection Attack?
SQL injection can be used by an attacker to inject code into a website in order to access and manipulate the database behind the site. More ...

How to Secure Your Small Business Network
Automated scanning techniques and botnets don't care whether your company is big or small, they're only looking for holes in your network security to exploit. Here are 10 of the most critical steps you can take to keep your data secure, and none of them take much time or effort to accomplish. More ...

Essentials of Endpoint Device Backup
With the proliferation of data on laptops and mobile devices, organizations need to maintain control of how data is being accessed, shared, and distributed. Endpoint backup solutions should encrypt data in transit and in store to prevent unauthorized viewing of sensitive corporate data. More ...


Learn more at amazon.com

Custom Search