Menu
Computer Network Security

Implementing a Secure Password Policy
If your network is compromised, identity thefts could use your company's customers credit card numbers and social security numbers to destroy their lives. And it's not only your company's customers who are going to suffer. When the source of the security breach is traced to your company, the result will be a negligence lawsuit. More ...

Public Key Infrastructure
PKI (Public Key Infrastructure) uses a public and private key pair obtained and shared through a trusted authority. Public and private keys are used to lock (encrypt) and unlock (decrypt) data. Certificates are the cornerstones of the PKI. More ...

Wireless Network Security
Before the IEEE completed the 802.11i standard the Wi-Fi Alliance released WPA. After the release of the IEEE 802.11i standard, the Wi-Fi Alliance released WPA2 which is compatible with both the 802.11i standard and WPA. More ...

Secure, Network Compliant BYOD (Bring Your Own Device) Solutions
A recent IBM study and revealed that 81% of organizations reported their employees are using their personal mobile devices to connect to "company resources". But BYOD (Bring Your Own Device) doesn't necessarily equate to network security problems. More ...

What Is Penetration Testing?
Penetration testing is one of the hottest up and coming skills any IT professional needs to have. Companies are actively looking for penetration testers and professionals with a background in IT security and the ability to do penetration testing. More ...

Understanding the Different Classes of Firewalls
A firewall is able to achieve its functions through the capabilities it is able to provide. These are the capabilities determine the type of firewall to needed to meet a certain and specific set of security needs. More ...

ARP, MAC, Poisoning, and WiFi Security
In this article we cover the basics on Address Resolution Protocol (ARP), Media Access Control Addresses (MAC), Wireless (WiFi), and layer 2 communications. I explain how a 'Man in the Middle Attack' works. The common name for this is ARP poisoning, MAC poisoning, or Spoofing. More ...

What is Penetration Testing?
This book serves as an introduction to the steps required to complete a penetration test or perform an ethical hack. You learn how to properly utilize and interpret the results of modern day hacking tools; which are required to complete a penetration test. More ...

How Snort's Stealth TCP Port Scanning Works
Snort is an open source network intrusion detection system, capable of performing real-time traffic analysis and packet logging on IP networks. It can perform protocol analysis, content searching and matching, and can be used to detect a variety of attacks and probes. More ...

What is a SQL Injection Attack?
SQL injection can be used by an attacker to inject code into a website in order to access and manipulate the database behind the site. More ...

Designing Physical Network Security
Network security covers a multitude of issues. The first issue to address is physical access to your network. More ...

Multi-Layered Approach to Cyber Security
A multi-layered approach can be tailored to different levels of security. Not every asset needs to be completely secure; instead, only the most business critical assets, such as proprietary and confidential information, need be protected by the most restricted settings. More ...

Methods to Combat Distributed Denial of Service (DDoS) Attacks
DDOS attacks are costly in terms of lost revenue and added costs. DDoS attack protection plays a fundamental role in keeping businesses online. Here are some strategies that can be used to protect against a DDoS attack. More ...


Learn more at amazon.com

Custom Search