Menu
Computer Network Security

Multi-Layered Approach to Cyber Security
A multi-layered approach can be tailored to different levels of security. Not every asset needs to be completely secure; instead, only the most business critical assets, such as proprietary and confidential information, need be protected by the most restricted settings. More ...

Network Security Across the Enterprise
Today's business networks consist of numerous remote access connections from employees and outsourcing firms. Often, the security risks from connections outside the network are overlooked. The proper security solution for your organization will neutralize virtually all of these threats to your network. More ...

What Roles Do Firewalls and Proxy Servers Play in Network Security?
A firewall can detect specific application protocol content and filter out any applications that exhibits certain characteristics. A proxy server sits between hosts and server that filters requests by checking IP Addresses, Protocol and application content. More ...

Remote Access Authentication Protocols
A remote access authentication protocol is the method by which remote users will be authenticated when they log on the network. Some options are EAP, CHAP, and PAP, explined here. More ...

Intrusion Detection System (IDS) and Intrusion Prevention System (IPS)
"Most organizations use both IDS and an IPS. The IPS automatically blocks attacks where it is accurate, while the IDS logs and notifies network administrators of suspicious activity so they can use their judgment as to what countermeasures to take. More ...

What is a Botnet Attack and How to Identify It?
Attacks against networks are increasing because attackers find many networks are not properly patched and secured behind a firewall. Once attackers have compromised a machine, they simply install a bot on it to establish communication. The botnet is then controlled by the attacker. More ...

Firewall Internet Security - The Basics of a Firewall
Enterprise companies today employ firewalls that inspect sessions between external and internal hosts and devices. The firewall filters traffic by examining the source and destination IP addresses, application port and protocol port before making a decision whether to permit or deny a session or specific traffic. More ...

Types of Computer Security Threats
No book nor any checklist or method can show you all the kinds of harm that can happen to computer assets. There are too many ways to interfere with your use of these assets. Two information sources are of value however. The CVE list and the CVSS measurement system. More ...

Difference Between Network Firewall and Web Application Firewall
A Network Firewall acts as a security barrier between a trusted network, such as the local network (LAN), and an untrusted network, such as the Internet. A >Web Application Firewall (WAF) monitors and allows or blocks data packets as they travel to and from a Web application. More ...

How to Stop Hackers from Invading Your Network
Large corporations, banks, financial institutions, security establishments are particularly favorite targets for hackers. However, this menace can be prevented to a great extent if proper security measures are taken. More ...

Design a Network Security Policy
A security policy is a statement of what your systems' users are and are not allowed to do. Make sure that the policy is consistent and clearly-written. More ...

Cyber Security Tips for Small and Medium Business (SMB)
When it comes to small or medium enterprise the impact of security threat is even more severe. Cyber criminals love to target small business largely due to the fact that SMBs cannot afford to implement strong security protocols. More ...

ARP, MAC, Poisoning, and WiFi Security
In this article we cover the basics on Address Resolution Protocol (ARP), Media Access Control Addresses (MAC), Wireless (WiFi), and layer 2 communications. I explain how a 'Man in the Middle Attack' works. The common name for this is ARP poisoning, MAC poisoning, or Spoofing. More ...


Learn more at amazon.com

Custom Search