Home Security Network Security

Network Security

Network security is the practice of preventing and protecting against unauthorized intrusion into corporate networks. As a philosophy, it complements endpoint security, which focuses on individual devices; network security instead focuses on how those devices interact, and on the connective tissue between them.

Intrusion Detection System (IDS) Concepts

There are six basic approaches to intrusion-detection and prevention. Some of these methods are implemented in various software packages, and others are simply strategies that an organisation...

All about Proxy Servers

What's a Proxy Server? An intermediary worker goes about as a door among you and the web. It's a mediator worker isolating end clients...

Windows Firewalls

Windows first started shipping a primitive firewall, called Internet Connection Firewall (ICF), with Windows 2000. It was very simple. Each version of Windows since then has expanded...

Session Hijacking

Another form of attack is session hacking or hijacking. TCP session hijacking is a process where a hacker takes over a TCP session between two machines. Because...

Denial of Service Attacks

The first type of attack to examine is the denial of service (DoS). A denial of service attack is any attack that aims to deny legitimate users...

Law and Network Security

An increasing number of legal issues affect how administrators approach network security. If your organisation is a publicly traded company, a government agency, or does business with...

Approaches of Network Security

Organisations can choose from several approaches to network security. A particular approach, or paradigm, will influence all subsequent security decisions and set the tone for the entire...

Security Terminology

Security professionals have specific terminology. Individuals or system administrators having experience in network administration are probably already familiar with most of these terms. Although most hacking terminology...

Threat Classification

Your network certainly faces real security threats, and these threats can manifest themselves in a variety forms. There are different ways one might choose to classify the...

Basic Network Utilities

Ipconfig The first thing you want to do is get information about your own system. To accomplish this, you must get a command prompt....
Hide picture