Menu
Computer Network Security

Design a Network Security Policy
A security policy is a statement of what your systems' users are and are not allowed to do. Make sure that the policy is consistent and clearly-written. More ...

The Basics of Network Security
As technology and computer networks grow sophisticated over time, so do the intrusion techniques that scammers use in order to infiltrate them. If you're serious about protecting your company's private information , you need to do a lot more than have a router and firewall in place. More ...

What is Network AAA (Authentication, Authorization, and Accounting)?
The acronym AAA stands for three network procedures and processes that help to make a network more secure and reliable. The A's stand for Authentication, Authorization, and Accounting. The difference between authentication, authorization, and accounting is described here. More ...

Elementary Information Security
This book is certified to comply fully with the NSTISSI 4011 federal training standard for information security professionals. The text emphasizes both the technical and non-technical aspects of information security and uses practical examples and real-world assessment tools. More ...

Cyber Security Tips for Small and Medium Business (SMB)
When it comes to small or medium enterprise the impact of security threat is even more severe. Cyber criminals love to target small business largely due to the fact that SMBs cannot afford to implement strong security protocols. More ...

Network Security by Filtering
Filtering allows network administrators to control which packets are permitted or denied in or out of a network. It can be used to control how much bandwidth can be used by parts of a network, but is more often used to provide security for a network. More ...

Implementing a Secure Password Policy
If your network is compromised, identity thefts could use your company's customers credit card numbers and social security numbers to destroy their lives. And it's not only your company's customers who are going to suffer. When the source of the security breach is traced to your company, the result will be a negligence lawsuit. More ...

What is a Password Hash and Salt?
Never store a user's password as plain-text. A Hashing algorithm is similar to encryption. To increase the security of a hashed password, a random value called salt is added to the hash. More ...

Network Security Across the Enterprise
Today's business networks consist of numerous remote access connections from employees and outsourcing firms. Often, the security risks from connections outside the network are overlooked. The proper security solution for your organization will neutralize virtually all of these threats to your network. More ...

Email Security
Email has emerged as one of the most important communication mediums. Failing to secure your organization's mail servers may allow spammers to misuse your servers and bandwidth as an open relay to propagate their spam. More ...

Firewall Perimeter Network (DMZ)
A DMZ (Demilitarized Zone) or Perimeter Network is the area between the firewall that protects the network from untrusted external networks (the Internet) and the firewall that protects the internal network. More ...

How to Use the Open Source Intrusion Detection System SNORT
In terms of raw power and features, SNORT, the most commonly used Open Source Intrusion Detection System, (IDS) has begun to eclipse many expensive proprietary IDSes. In terms of documentation or ease of use, however, SNORT can seem overwhelming. More ...

What Roles Do Firewalls and Proxy Servers Play in Network Security?
A firewall can detect specific application protocol content and filter out any applications that exhibits certain characteristics. A proxy server sits between hosts and server that filters requests by checking IP Addresses, Protocol and application content. More ...


Learn more at amazon.com

Custom Search