Modern Encryption Methods
Modern methods of encryption are more secure than the historical methods discussed in the previous section. All the methods discussed in this section are in use today...
Firewall Implementation
Administrators must be able to evaluate implementation issues to achieve a successful security solution for their systems. Understanding the type of firewall means knowing how the firewall...
The History of Encryption
Encrypting communications is a very old idea. People have found the need to send private communications for most of the history of civilization. The need for privacy...
Session Hijacking
Another form of attack is session hacking or hijacking. TCP session hijacking is a process where a hacker takes over a TCP session between two machines. Because...
Approaches of Network Security
Organisations can choose from several approaches to network security. A particular approach, or paradigm, will influence all subsequent security decisions and set the tone for the entire...
VPN Protocols
Multiple ways exist to achieve the encryption needs of a VPN. Certain network protocols are frequently used for VPNs. The two most commonly used protocols for this...
Introduction to Network Security
Computer data often travels from one computer to another, leaving the safety of its protected physical surroundings. Once the data is out of hand, people with bad intention could...
What is Dark Web ? Want to Know about it – Here is All
What is Dark Web ?
The Dark web forms a small part of the deep web, the part of the Web not indexed...
Introduction to VPN
Virtual Private Networks (VPNs) are a common way to connect remotely to a network in a secure fashion. A VPN creates a private network connection over the...
Intrusion Detection System (IDS) Concepts
There are six basic approaches to intrusion-detection and prevention. Some of these methods are implemented in various software packages, and others are simply strategies that an organisation...