This article attempts to see if bulk enterprise security policies can be applied to portable devices like USB pen drives, mp3 players, cellphones connecting through USB, CD/DVD media, Digital Cameras...
Category: Network Security
This article explains what are Phishing attacks, why it is a network security threat, how emails are used to gain confidential information, what else the phishers can do other than...
This article examines the different types of Firewall technologies. The four common types of firewalls are: 1. Packet Filtering Firewalls 2. Circuit level gateway Firewalls 3. Application level gateway Firewalls...
This article covers an overview of the products and technologies that help maintain network security. We would see small introduction to firewalls, anti-virus, anti-spam, content filtering in email, URL web...