Home > Articles > Security > Network Security

Network Security

RSS Feed Subscribe to this topic  RSS details

661 Items

Sort by Date | Title

Attacks from Outside the Operating System
By Andrew S. Tanenbaum
Mar 29, 2002
This excerpt from Andy Tanenbaum's Modern Operating Systems looks at some of the operating systems aspects of external threats, primarily focusing on viruses, worms, mobile code, and Java applets.
Authentication
By Mandy Andress
Sep 21, 2001
Authentication means proving that a user is who he claims to be – and then making sure he accesses only what he's allowed to. Mandy Andress discusses the types of authentication available to your organization and tells where they work best.
Authentication and Authorization Policies: Using Cisco Identity Services Engine in a BYOD World
By Jamey Heary, Aaron Woland
Jun 25, 2013
This chapter examines the relationship between authentication and authorization and how to build policies for each, describing a few common Authentication Policies and Authorization Policies to help you see how to work with these policy constructs.
Basic Cisco IOS Software and Catalyst 3550 Series Security
By Dmitry Bokotey, Andrew Mason, Raymond Morrow
Jul 25, 2003
Become comfortable with basic Cisco IOS Software and Catalyst 3550 security features with an introduction to password management, disabling unnecessary services, setting up secure HTTP and NTP services, and SSH.
Basic Virtual Private Network Deployment
By THADDEUS FORTENBERRY
Jan 19, 2001
Substantial interest in VPN has been created by concerns for privacy and data protection. You, the administrator must be aware of security concepts and network designs, and yet, customers require flexible network environments that will satisfy the needs ...
Basics of the PIX Firewall
By Daniel Newman
Nov 7, 2003
There are several areas of a network in a secure environment; the most common are the inside, the outside, and the DMZ firewalls that help divide and control traffic between them. Cisco has designed the PIX series of firewalls to be the primary devices for performing these functions. This chapter covers the basics of the PIX firewall areas that connect to the firewall—the trusted, untrusted, and DMZ.
Been Cracked? Just Put PAM On It!
By Scott Mann, Ellen L. Mitchell
Oct 26, 2001
Pluggable authentication models (PAM) allow you to configure your Linux environment to meet your own particular security needs.
Bluetooth Security Risks in Business
By Nico Darrow
May 9, 2008
Nico Darrow tells you how to keep yourself safe from Bluetooth hackers.
Botnets II: Emerging Threats, Tactics, and Defenses
By Carolyn Meinel
Dec 19, 2008
Carolyn Meinel describes some of the more promising efforts to combat threats from botnets.
Botnets, Part 1: Why They Strike and How to Defend Against Them
By Carolyn Meinel
Dec 5, 2008
Carolyn Meinel describes the threats posed by increasingly sophisticated botnets and dives into some of the latest technology designed to stop them.
Breaking Unwanted TCP Connections by Modifying Your Route Table
By Richard Cardona, Kyle Cassidy
Dec 6, 2001
Kyle Cassidy and Richard Cardona give you a quick-and-dirty explanation on route tables, to help you take advantage of a free and simple way to block unwanted traffic to specific IP addresses or subnets.
Broadband Routers and Firewalls
By Ido Dubrawsky, Wes Noonan
Nov 17, 2006
Building a Human Firewall: Raising Awareness to Protect Against Social Engineering
By Thierry Wohnlich
Oct 27, 2006
Thierry Wohnlich proposes an alternate view of information security awareness, a view that takes into consideration the reasons behind the need for awareness, and discusses the role of the individuals in relation to information technology.
Building a Roadmap for Securing Your Enterprise
By Greg Shipley
Nov 16, 2001
This sample chapter from Maximum Security describes the basics of creating a pro-active information security plan, including the elimination of vulnerability points and the implementation of self-audit mechanisms.
Building a Roadmap for Securing Your Enterprise
By Anonymous
Jul 13, 2001
This sample chapter equips you with a roadmap for surviving the information security onslaught.
Building Cisco IDS 3.0(3) Custom Signatures
By Earl Carter
Feb 15, 2002
Tuning your IDS to meet your specific network requirements is crucial for optimum protection of your network, as discussed in this article by Earl Carter.
Building OpenSSH—Tools and Tradeoffs
By Sun Microsystems
May 23, 2003
This article updates the July 2001 Sun BluePrints OnLine article, "Building and Deploying OpenSSH for the Solaris Operating Environment." You'll learn about gathering the needed components, making compile-time configuration decisions, building components, and finally assembling the OpenSSH environment.
Building OpenSSH--Tools and Tradeoffs, Updated for OpenSSH 3.7.1p2
By Sun Microsystems
Jun 18, 2004
This article contains information about gathering the needed components, deciding the compile-time configuration decisions, building the components, and finally assembling OpenSSH.
Business Innovation from Israel's Masters of Espionage: The Intercept
By Stacy Perman
Jul 22, 2005
In the inky darkness of the predawn hours, the Red Sea had turned choppy. The sun had yet to bathe the sea, known in Arabic as Al Bahr Al Ahmar, in its winter light. Fishing boats moored in the waters surrounded by Yemen, Saudi Arabia, and the Sudan rocked in the stormy darkness. Find out how Israeli intelligence intercepted a ship smuggling Palestinian arms in this sample chapter.
C Language Issues for Application Security
By John McDonald, Mark Dowd, Justin Schuh
Jan 25, 2008
How you use C could adversely affect an application's security and robustness.

<< < Prev Page 1 2 3 4 5 Next >