Home > Articles > Security > Network Security

Network Security

RSS Feed Subscribe to this topic  RSS details

661 Items

Sort by Date | Title

Securing Overlay Transport Virtualization (OTV) with Cisco TrustSec (CTS)
By Ron Fuller
Apr 25, 2013
Ron Fuller shows just how easy it is to take advantage of MACSEC and AES-128 bit encryption on your Cisco Nexus 7000 series switches.
Secure By Design? Techniques and Frameworks You Need to Know for Secure Application Development
By Randy Nash
Dec 19, 2012
What do you know about developing secure robust software? Randy Nash discusses several available techniques and frameworks for secure application development.
Danger on the Computer and What to Do If You Are the Victim of Identity Theft
By Steve Weisman
Nov 7, 2012
The first step in reducing your vulnerability to identity theft through your computer is learning where you are vulnerable. However, assessing your risk is not enough. Unfortunately, there is nothing you can do to guarantee that you will not become a victim of identity theft, so it is also important to know what to do if you become an identity theft victim.
Making Yourself Less Vulnerable to Identity Theft
By Steve Weisman
Nov 1, 2012
In this excerpt from his book, Steve Weisman discusses types of identity theft and steps you can take to protect yourself from them.
How to Avoid Identity Theft
By Steve Weisman
Oct 31, 2012
As damaging as identity theft can be and as vulnerable as we are to identity theft, there are a number of relatively simple things that you can do to make yourself less likely to become a victim of identity theft. In this chapter from 50 Ways to Protect Your Identity in a Digital Age: New Financial Threats You Need to Know and How to Avoid Them, 2nd Edition, learn about different kinds of identity theft and how they can be avoided.
Introduction to 50 Ways to Protect Your Identity in a Digital Age: New Financial Threats You Need to Know and How to Avoid Them, 2nd Edition
By Steve Weisman
Oct 30, 2012
Steve Weisman introduces his book, which shows you just how vulnerable you are to identity theft, but also shows you steps you can take to protect yourself, as best you can, from becoming a victim.
Creating Your Own VPN
By Eric Geier
Oct 23, 2012
Security expert Eric Geier shows you how to set up a VPN to securely access your PC or network when you’re away, and to secure your Internet connection when using Wi-Fi hotspots.
Recovering and Securing Network and Internet Passwords
By Eric Geier
Oct 8, 2012
Security expert Eric Geier shows you how to find or capture your network, browser, and email passwords, which is useful if you’ve forgotten them. Plus, he explores password vulnerabilities and teaches you how to protect against them.
Securing Wireless Networks for CompTIA Network+
By Anthony Sequeira
May 16, 2012
This important article walks the reader through key security mechanisms that should be considered for any wireless network environment.
An Insider's Look into the 2012 Mid-Atlantic Collegiate Cyber Defense Challenge
By Brad Bowers
May 15, 2012
Brad Bowers takes an insider look into the 2012 Mid-Atlantic Collegiate Cyber Defense Challenge that faces off hardened penetration testers against defending college teams in this annual cyber attack and defend competition.
Cisco IronPort ESA Web User Interface
By Chris Porter
Apr 25, 2012
This chapter covers the layout and workflow of the web user interface used for the administration of the Email Security Appliance (ESA).
Protecting Your Network from the Wi-Fi Protected Setup Security Hole
By Eric Geier
Mar 12, 2012
Even if you’ve encrypted and secured your wireless network with Wi-Fi Protected Access (WPA or WPA2), a security hole affecting most wireless routers may make it fairly easy for those with the right tools to hack your network and connect. Eric Geier shows how to prevent this and protect your network.
The CERT Guide to Insider Threats: Insider Theft of Intellectual Property
By Dawn M. Cappelli, Andrew P. Moore, Randall F. Trzeciak
Mar 2, 2012
This chapter offers a model to prevent insider theft of intellectual property. The first half of this chapter describes the model at a high level.The second half of the chapter digs deeper into the technical methods used in committing these crimes and mitigation strategies that you should consider based on all of this information.
Network Security First-Step: Firewalls
By Donald Stoddard, Thomas M. Thomas
Feb 8, 2012
This chapter dissects a firewall’s duties to understand what makes a firewall operate and how it does its job.
Cyber Stalking, Fraud, and Abuse
By William (Chuck) Easttom
Feb 1, 2012
This chapter explores what the various major types of internet fraud are, what the law says, and what you can do to protect yourself.
Software [In]security: vBSIMM Take Two (BSIMM for Vendors Revised)
By Gary McGraw, Sammy Migues
Jan 26, 2012
Gary McGraw and Sammy Migues introduce a revised, compact version of the BSIMM for vendors called vBSIMM, which can be thought of as a foundational security control for vendor management of third-party software providers.
ZigBee Wireless Security: A New Age Penetration Tester's Toolkit
By Brad Bowers
Jan 9, 2012
Brad Bowers takes a closer look at the ZigBee protocol, some of the attacks that have been leveraged against it, and the security tools that penetration testers can use.
Secure Your iPad 2 Now!
By John Traenkenschuh
Dec 28, 2011
Is your iPad 2 reasonably secured right out of the box? Maybe not. Security specialist John Traenkenschuh, CISSP-ISSAP, provides sensible, flexible security patterns for the iPad 2.
Software [In]security: BSIMM versus SAFECode and Other Kaiju Cinema
By Gary McGraw, Sammy Migues
Dec 26, 2011
Gary McGraw and Sammy Migues clarify the intended use of the Building Security In Maturity Model (BSIMM) and compare it to the SAFECode Practices methodology.
Secure Your Linux Workstation Now!
By John Traenkenschuh
Dec 12, 2011
Security writer John "Tränk" Traenkenschuh, CISSP-ISSAP, explores several easy-to-use security improvements you can make to your Linux workstation, using two very popular distributions as models: Ubuntu 11.10 and Fedora 15.

< Prev Page 1 2 3 4 5 Next >