Home > Articles > Security > Network Security

Network Security

RSS Feed Subscribe to this topic  RSS details

663 Items

Sort by Date | Title

An Executive's Information Security Challenge
By Tim Mather, Mark Egan
May 6, 2005
Security isn't just an issue for network administrators to deal with. Everyone from the mail clerk to the executive board needs to be aware of information security issues. This chapter details the issues involved in information security as it affects executives.
An Insider's Look into the 2012 Mid-Atlantic Collegiate Cyber Defense Challenge
By Brad Bowers
May 15, 2012
Brad Bowers takes an insider look into the 2012 Mid-Atlantic Collegiate Cyber Defense Challenge that faces off hardened penetration testers against defending college teams in this annual cyber attack and defend competition.
An Introduction to Snort: A Lightweight Intrusion Detection System
By Joseph Dries
Jun 15, 2001
In this first of a two-part series of articles on Snort, Joseph Dries introduces you to this Intrusion Detection System and tells you the advantages of deploying it.
An Overview of Computer Security
By Matt Bishop
Jan 3, 2005
Analyzing MPLS VPN Security
By Michael H. Behringer, Monique Morrow
Oct 6, 2005
VPN users have certain expectations and requirements for their VPN service. In a nutshell, they want their service to be both private and secure. In other words, they want their VPN to be as secure as with dedicated circuits while gaining the scalability benefits of a shared infrastructure. Both concepts, of privacy and security, are not black and white, and need to be defined for a real world implementation. This chapter introduces you to VPN MPLS security requirements.
Analyzing the Crossover Virus: The First PC to Windows Handheld Cross-infector
By Cyrus Peikari
Mar 8, 2006
"Airborne" mobile viruses have been increasing in complexity at a surprising pace. In this article, Cyrus Peikari analyzes the new Crossover Trojan, which is the first malware that simultaneously infects both Windows PCs and Windows Mobile handheld devices.
Anatomy Of A Hackโ€”The Rise And Fall Of Your Network
By Steve Riley, Jesper M. Johansson
Jul 1, 2005
There are myriad ways that a network can be compromised, and an administrator needs to be aware of them all (and anticipate new ways coming around the corner). This chapter will not to show how to attack something, but show how attackers take advantage of your mistakes. This will enable you to protect your network by avoiding the pitfalls attackers use.
Anatomy of an Intrusion Prevention System
By Marc Willebeek-LeMair
Oct 14, 2005
Ultimately, security will be embedded within the network fabric, where traffic of all types (e.g., data, voice, video, graphics, fax) is not just routed from source to destination, but delivered with the necessary quality of service, and delivered securely. Intrusion Prevention Systems are the first step in this direction.
Application of Denial of Service Attacks
By Corsaire, Stephen de Vries
Jul 30, 2004
Denial-of-Service (DoS) attacks can severely damage your business. In this article, Stephen de Vries explains the basics of DoS attacks, and how you can begin to protect yourself from them.
Application Security for Visual C++.NET Developers
By John Paul Mueller
Jul 18, 2003
It's one thing to say you'll build secure applications, another thing entirely to know how to do so. Learn the basic techniques for improving the security of your .NET applications.
Are Private-Sector Organizations Responsible for Failing to Plan for Natural Disasters? (Part 2 of 3)
By Leo Wrobel, Sharon Wrobel
Mar 23, 2009
Contingency planners must adopt those new technologies - or be held responsible for failure to do so. How do these issues affect your role in emergency planning for your organization?
Are Private-Sector Organizations Responsible for Failing to Plan for Natural Disasters? (Part 3 of 3)
By Leo Wrobel, Sharon Wrobel
Mar 31, 2009
Leo A. Wrobel and Sharon M. Wrobel conclude this series with a discussion of an alarming fact (disasters are on the rise) and what might be an even more alarming conclusion for disaster recovery planners (yep, you're responsible).
Are You Still Using RSH?
By Russ Hunter
Jan 30, 2004
Running RSH is like leaving your house keys under the welcome mat. SSH offers the same convenience and functionality with far greater security, so why haven't you switched?
Are Your Passwords Strong Enough? Advice from a Software Tester
By Karen N. Johnson
Nov 9, 2007
Here's a look at passwords from the perspectives of a software tester, a business analyst, and a user.
By Matthew David
Jan 1, 2003
As the Worm Turns: The Stuxnet Legacy
By Larry L. Constantine
Mar 14, 2011
In his ongoing series about the intersections of technology and society, Larry Constantine (an interaction designer specializing in safety-critical applications) discusses the history of the malware known as stuxnet and offers suggestions on how it can be stopped.
ASP.NET 2.0 Security
By Alex Homer, Rob Howard, Dave Sussman
Dec 10, 2004
This chapter outlines some of the new security features included in ASP.NET 2.0. Many of these new features were added to address problems developers were forced to address in previous releases.
Assessing Your Security Needs
By Joseph Dries
Jun 15, 2001
Effective security is achieved through multiple layers of simple-to-understand-and-implement policies. Let security expert Joseph Dries show you how.
Asymmetric Cryptography
By Peter Thorsteinson, G. Gnana Arun Ganesh
Dec 19, 2003
Learn how asymmetric algorithms solve the shortcomings of symmetric algorithms. The authors of ".NET Security and Cryptography" also examine how asymmetric algorithms work at a conceptual level, and also provide a detailed analysis of RSA, which is currently the most popular asymmetric algorithm. Finally, they show how to use RSA in a typical program using the appropriate .NET Security Framework classes.
Attacking and Defending the Internet with Border Gateway Protocol (BGP)
By Carolyn Meinel
Aug 25, 2008
Carolyn Meinel explains how sysadmins can take advantage of resources offered by several organizations to detect and defeat BGP problems.

< Prev Page 1 2 3 4 5 Next >