In this article, we have a look at a broad range of network security threats that concerns an enterprise user, what is Unified Threat Management (UTM) and why it is...
Tag: Network Security
Threats arising due to internet usage are quite wide. We will look at a few of them, especially the ones where cyber criminals use deception as the main tool to...
Recently, the micro-blogging platform Twitter was down for more than two hours, thereby denying access to many users across the world for that time. The culprit was found to be...
This article gives an introduction to Host Integrity Check mechanism that enables enterprises to enforceĀ the connectivity of their endpoints (Laptops/Desktops) only if they comply to the security policies of...
This article looks at the main types of Denial Of Service attacks like Previously known DoS attacks (Juno etc.), Unknown DoS flooding attacks, SYN floods, connection limit attacks etc. in...
This article provides an introduction to what is URL Filtering, why it is needed and how it is done at enterprise level. We also have a look at the various...
This article attempts to see if bulk enterprise security policies can be applied to portable devices like USB pen drives, mp3 players, cellphones connecting through USB, CD/DVD media, Digital Cameras...
This article explains what are Phishing attacks, why it is a network security threat, how emails are used to gain confidential information, what else the phishers can do other than...
This article examines the different types of Firewall technologies. The four common types of firewalls are: 1. Packet Filtering Firewalls 2. Circuit level gateway Firewalls 3. Application level gateway Firewalls...
This article covers an overview of the products and technologies that help maintain network security. We would see small introduction to firewalls, anti-virus, anti-spam, content filtering in email, URL web...