Home Blog Page 8

Firewall Implementation

Administrators must be able to evaluate implementation issues to achieve a successful security solution for their systems. Understanding the type of firewall means knowing how the firewall...

Session Hijacking

Another form of attack is session hacking or hijacking. TCP session hijacking is a process where a hacker takes over a TCP session between two machines. Because...
Machines tackling the attacks

What is a Firewall ?

A firewall is a fence between your computer or your internal network and the outside world or the Internet. A particular firewall implementation might use one or...

Buffer Overflow Attacks

Another way of attacking a system is called a buffer overflow (or buffer overrun) attack. Some experts would argue that the buffer overflow occurs as often as...

Denial of Service Attacks

The first type of attack to examine is the denial of service (DoS). A denial of service attack is any attack that aims to deny legitimate users...

Law and Network Security

An increasing number of legal issues affect how administrators approach network security. If your organisation is a publicly traded company, a government agency, or does business with...

Approaches of Network Security

Organisations can choose from several approaches to network security. A particular approach, or paradigm, will influence all subsequent security decisions and set the tone for the entire...

Security Terminology

Security professionals have specific terminology. Individuals or system administrators having experience in network administration are probably already familiar with most of these terms. Although most hacking terminology...

Threat Classification

Your network certainly faces real security threats, and these threats can manifest themselves in a variety forms. There are different ways one might choose to classify the...

The OSI Model

The Open Systems Interconnect (OSI) model describes how networks communicate. It describes the various protocols and activities and states how the protocols and activities relate to each...
Hide picture