If your finance department personnel do quite a number of bank transfers/ financial transactions over the Internet (web portal) everyday, there is a chance that their user-names/passwords can be stolen...
Category: Network Security
Well, this is not exactly Infographics! It is just an attempt to explain the basic concepts of DMZ – Demilitarized Zone (Computer Networking) through an image. These days, the web-servers...
In bigger organizations and service providers, multiple Firewalls are routinely utilized for each department or class of subscribers as some of them require individual Firewall policies. And more importantly, they...
Logs are generated by a lot of devices in an organization. In one branch alone, there are so many devices (Like Router, Firewall, IDS, etc) that can generate a lot...
A VPN (Virtual Private Network) is a concept which helps enterprise companies with distributed offices to connect to each other securely over the Internet – In this article, we would...
This article gives an overview about Snort which is an software based freely download-able open source Network Intrusion Detection system along with its components, installation ways and methods, modes of...
This article gives a general introduction to IPS – Intrusion Prevention System for Network Security and also gives a list of network threats that can be identified and mitigated by...
This article is about the two types of Unified Threat Management solutions (UTM) – hardware and software. We will discuss the plus and minus points of both of them. We...
In this article, we have a look at a broad range of network security threats that concerns an enterprise user, what is Unified Threat Management (UTM) and why it is...
Threats arising due to internet usage are quite wide. We will look at a few of them, especially the ones where cyber criminals use deception as the main tool to...
This article gives an introduction to Host Integrity Check mechanism that enables enterprises to enforceĀ the connectivity of their endpoints (Laptops/Desktops) only if they comply to the security policies of...
This article looks at the main types of Denial Of Service attacks like Previously known DoS attacks (Juno etc.), Unknown DoS flooding attacks, SYN floods, connection limit attacks etc. in...
This article provides an introduction to what is URL Filtering, why it is needed and how it is done at enterprise level. We also have a look at the various...
This article provides an overview of the various options available for securing enterprise email communications like anti-spam, anti-virus, zero-hour anti-virus, content policies, outbound email attachment scanning for DLP, email encryption,...