Modern Encryption Methods
Modern methods of encryption are more secure than the historical methods discussed in the previous section. All the methods discussed in this section are in use today...
The History of Encryption
Encrypting communications is a very old idea. People have found the need to send private communications for most of the history of civilization. The need for privacy...
Components, Processes, and Implementation of IDS
Regardless of what IDS you select, they all have certain components in common. It is important to have a general understanding of these components.
Intrusion Detection System (IDS) Concepts
There are six basic approaches to intrusion-detection and prevention. Some of these methods are implemented in various software packages, and others are simply strategies that an organisation...
All about Proxy Servers
What's a Proxy Server?
An intermediary worker goes about as a door among you and the web. It's a mediator worker isolating end clients...
Windows Firewalls
Windows first started shipping a primitive firewall, called Internet Connection Firewall (ICF), with Windows 2000. It was very simple. Each version of Windows since then has expanded...
Firewall Implementation
Administrators must be able to evaluate implementation issues to achieve a successful security solution for their systems. Understanding the type of firewall means knowing how the firewall...
Session Hijacking
Another form of attack is session hacking or hijacking. TCP session hijacking is a process where a hacker takes over a TCP session between two machines. Because...
Denial of Service Attacks
The first type of attack to examine is the denial of service (DoS). A denial of service attack is any attack that aims to deny legitimate users...
Law and Network Security
An increasing number of legal issues affect how administrators approach network security. If your organisation is a publicly traded company, a government agency, or does business with...