Browsing articles tagged with " Network Security"
Jun
13
2014

How to secure your wireless home network

Tip: Best option for securing wireless network is to apply MAC filtering  How to block hackers on wireless home network: Wireless networks are the best option for home network because of its ease of installation and relatively low cost. While a wireless network allows sharing of resources and Internet connectivity easy, it also introduces a number […]

Jun
8
2014

What is a computer keylogger?

Keyboard keylogger: A keylogger is a type of spyware to spy specialized keystrokes on the computer that hosts it, and can transmitting via the Internet to an address where an attacker can exploit. Any strike entered on the keyboard or screen viewed is recorded with a timestamp. Some keylogger only create keystrokes log only on the computer where they are installed. […]

Jun
8
2014

What is a spyware?

Computer spyware: Spyware is a spy software who, without your knowledge, can recover data on your PC and monitor your internet activity, including what is typed on your keyboard.  Presence of spyware can cause serious technical damage: the “crashes” to repeat your computer with data loss, system slowdowns, or opening security holes on your computer.   How Spyware are […]

Jun
8
2014

What is computer Trojan?

what are Trojans? A computer software that perform malicious operations without the knowledge of the user are called Trojan. A Trojan is a hidden software that executes commands, which usually gives access to the computer on which it is running by opening a backdoor.   Effects of Trojan: Recovery of passwords or other confidential data on infected computer. Joint […]

Aug
22
2013

CCDA Certification and training tutorials | Cisco Certified Design Associate

certifications

What is CCDA? Cisco Certified Design Associate (CCDA) certification is about designing the Cisco network in most efficient way. CCDA course is for validating all fundaments related to network designing, its cover void Variety of route and switch design and covers LAN, WAN, broadband, campus, data-center and wireless network design.Cisco recommends before you attempt the […]

Aug
12
2013

WLAN Security | The Best Practices

Wireless authentication process

Security in wireless network is a very essential and while designing a WLAN you have to focus and consider the following important aspects of security. 1EEE 802.11i/WPA2: In WLAN we have different security protocols for security. One of the famous protocol is WEP (Wired Equivalent Privacy) that emerge with 802.11b standard but it is faulty […]

Aug
10
2013

Network Security Design | CCDA security Management

Network security

Deigning network with implementing security: CCDA security management is about the Implementation of security with some design standpoint, as a CCDA candidate you should understand the reason of network security and some efficient approaches for implementing the network security. You also need to focus on confidentially, integrity and Authentication. You can design a good secure […]

Aug
10
2013

Network Security Policy and Process

Network security policy System Life Cycle

Network security System Life Cycle: As a Design professional security is one important aspect of job and as a CCDA candidate you should know about the security policy that is a key aspect of an organization’s network design. To offer the level of security that you need to enhance the network confidentially, integrity and Authenticity, […]