Menu
Computer Network Security

Security Issues with Wireless LANs
Wireless LAN (WLAN) security threats include war dialing, war driving, war chalking, WEP and WPA security cracking, and rogue access points. This artilce discuses approaches to WLAN Security. More ...

How Snort's Stealth TCP Port Scanning Works
Snort is an open source network intrusion detection system, capable of performing real-time traffic analysis and packet logging on IP networks. It can perform protocol analysis, content searching and matching, and can be used to detect a variety of attacks and probes. More ...

What is Cross Site Scripting?
Cross-site scripting attacks are used to steal information from your browser when you visit websites such as ecommerce stores, forums, and even your email accounts. More ...

Design a Network Security Policy
A security policy is a statement of what your systems' users are and are not allowed to do. Make sure that the policy is consistent and clearly-written. More ...

Methods to Combat Distributed Denial of Service (DDoS) Attacks
DDOS attacks are costly in terms of lost revenue and added costs. DDoS attack protection plays a fundamental role in keeping businesses online. Here are some strategies that can be used to protect against a DDoS attack. More ...

How to Secure Your Wireless Network
If you use a wireless network, chances are good it is not secure. If you don't make some important configuration changes on your wireless router after installing it, your wireless network is wide open to hackers, curious neighbors and people who would rather use your broadband internet service instead of buying their own. More ...

Implementing a Secure Password Policy
If your network is compromised, identity thefts could use your company's customers credit card numbers and social security numbers to destroy their lives. And it's not only your company's customers who are going to suffer. When the source of the security breach is traced to your company, the result will be a negligence lawsuit. More ...

Firewall Perimeter Network (DMZ)
A DMZ (Demilitarized Zone) or Perimeter Network is the area between the firewall that protects the network from untrusted external networks (the Internet) and the firewall that protects the internal network. More ...

Types of Computer Security Threats
No book nor any checklist or method can show you all the kinds of harm that can happen to computer assets. There are too many ways to interfere with your use of these assets. Two information sources are of value however. The CVE list and the CVSS measurement system. More ...

How to Tell if Someone is Lurking on Your Wireless Network
Have you ever wondered if someone else is on your wireless network, with out your knowledge, watching every site you visit or stealing account information? More ...

Understanding the Dangers Your Systems Face
It's one thing to know generally that your systems are under fire from hackers around the world and malicious users around the office; it's another to understand specific attacks against your systems. This section discusses some well-known attacks but is by no means a comprehensive listing. More ...

Top Ways to Prevent Data Loss
Data loss is crippling for any business, especially in the age of big data where companies rely on digital information to refine their marketing, contact prospects, and process transactions. The first goal should be to prevent data loss from occurring in the first place. More ...

Secure, Network Compliant BYOD (Bring Your Own Device) Solutions
A recent IBM study and revealed that 81% of organizations reported their employees are using their personal mobile devices to connect to "company resources". But BYOD (Bring Your Own Device) doesn't necessarily equate to network security problems. More ...


Learn more at amazon.com

Custom Search