Designing Physical Network Security
Network security covers a multitude of issues. The first issue to address is physical access to your network. More ...
The Use of HoneyPots and HoneyNets to Trick Hackers
A HoneyPot is a storage area on a network that has fake confidential and valuable
data used to trick hackers. More ...
How to Protect Your Business From a Cyber Attack
Hackers can be crippling for small businesses who, many times, never recover from the theft.
Here are some precautions you can take to help keep your business protected against hackers. More ...
How to Become a Professional Ethical Hacker
As a Professional Ethical Hacker you need to understand the various kind of hacking, which can be classified into White Hat, Grey Hat and non-ethical hacking. Only a deep knowledge can help in combating any sort of breach or unauthorised access in the information system. More ...
Handling Rogue Access Points
A Rogue access point is any wireless access points that exist on your network without the consent of the business. If an insider were
to use a laptop to act as an access point, regardless of the intent, it poses a security risk. More ...
Intrusion Detection System (IDS) and Intrusion Prevention System (IPS)
"Most organizations use both IDS and an IPS. The IPS automatically blocks attacks where
it is accurate, while the IDS logs and notifies network administrators of suspicious
activity so they can use their judgment as to what countermeasures to take. More ...
Public Key Infrastructure
PKI (Public Key Infrastructure) uses a public and private key pair obtained and shared through a trusted authority. Public and private keys are
used to lock (encrypt) and unlock (decrypt) data. Certificates are the cornerstones of the PKI. More ...
NMAP (Network Mapper) Port Scanner
When hackers attempt to gain unauthorized access to a computer on the Internet the
first things they do is look for open ports. NMAP is a free and open source port
scanner that hackers can use to automate the process of finding open ports to attack. More ...
Cyber Security Tips for Small and Medium Business (SMB)
When it comes to small or medium enterprise the impact of security threat is even more severe. Cyber criminals
love to target small business largely due to the fact that SMBs cannot afford to implement strong security protocols. More ...
Network Security Model - Defining an Enterprise Security Strategy
These are the five primary security groups that should be considered with any
enterprise security model. These include security policy, perimeter, network,
transaction and monitoring security. These are all part of any effective
company security strategy. More ...
What is a Password Hash and Salt?
Never store a user's password as plain-text. A Hashing algorithm is similar to encryption. To increase the security of a hashed password,
a random value called salt is added to the hash. More ...
Man in the Middle Attack
In a Man in the Middle (MIM) attack the hacker places eavesdropping equipment between the
sending device and the receiving device. He intercepts the data, records it and possibly
modifies it, then sends it on to the intended receiving device. More ...
Firewall Perimeter Network (DMZ)
A DMZ (Demilitarized Zone) or Perimeter Network is the area between the firewall that protects
the network from untrusted external networks (the Internet) and the firewall that protects the internal network. More ...
Denial of Service Attack (DoS) Detection and Mitigation
A Denial of Service Attack is when a hacker attempts to consume such a large amount of a
server's resources that it's services will be unavailable to its intended users. For example
a DoS attack against a web server attempts to prevent it from serving web pages to
legitimate Internet clients. More ...