Familiarity with Dell Servers

In this blog, we are going to have an overview of the most popular servers of the famous Dell Company. Dell is an American multinational computer technology company that develops, sells, repairs, and supports computers and related products and services, and It is one of the biggest PC product companies in [...]

By |2021|Networking|0 Comments

What’s HPE iLO?

Integrated Lights-Out, or iLO, is a proprietary embedded server management technology by HP (Hewlett-Packard) which provides out-of-band management facilities. HP iLO is combination of the iLO ASIC that is part of the server-board and the firmware that powers the ASIC. iLO is key to make the server operational and boot [...]

Network Switching: Part 9 – HP Switches: Core & Data Center Switches ( Such as Aruba CX 8400 Series, and Aruba CX 8320 Series)

To make you more familiar with the concepts of network switching and to get acquainted with the reputable vendors of network switches, we have prepared a number of blogs as a series, the different parts of which are as follows: Part 1 - What is a Network Switch? Switching Terms [...]

Network Switching: Part 8 – HP Switches: Terms, and Access Switches ( Such as Aruba CX 6400 Series, and Aruba 5400R Series )

To make you more familiar with the concepts of network switching and to get acquainted with the reputable vendors of network switches, we have prepared a number of blogs as a series, the different parts of which are as follows: Part 1 - What is a Network Switch? Switching Terms [...]

Network Switching: Part 6 – Cisco Switches: Other Switches (Industrial Ethernet, InfiniBand , Small Business, Service Provider (Aggregation, and Ethernet Access)

Network Switching To make you more familiar with the concepts of network switching and to get acquainted with the reputable vendors of network switches, we have prepared a number of blogs as a series, the different parts of which are as follows: Part 1 - What is a Network Switch? [...]

Network Switching: Part 5: Cisco Switches: Campus LAN Switches (Terms, Core and Distribution), and Data Center Switches

To make you more familiar with the concepts of network switching and to get acquainted with the reputable vendors of network switches, we have prepared a number of blogs as a series, the different parts of which are as follows: Part 1 - What is a Network Switch? Switching Terms [...]

Network Switching: Part 1: What is a Network Switch? Switching Terms (Such as Blade Server, Half Duplex, and Full Duplex)

To make you more familiar with the concepts of network switching and to get acquainted with the reputable vendors of network switches, we have prepared a number of blogs as a series, the different parts of which are as follows: Part 1 - What is a Network Switch? Switching Terms [...]

TDoS Attack

In this post, we are going to talk about TDoS attack. First of all, we recommend that you read our other post, in which we describe the DoS and DDoS attacks: DoS and DDoS Attacks In its annual report "Internet Crime Report" for 2019, the U.S. Federal Bureau of Investigation [...]

By |2021|Network Security|0 Comments

What is Kali Linux?

Kali Linux is a Debian-derived Linux distribution designed for digital forensics and penetration testing. It is maintained and funded by Offensive Security,a leading information security training company. In fact, it’s a Debian-based rewrite of their previous Knoppix-based digital forensics and penetration testing distribution BackTrack. One of the biggest reasons cyber [...]

What is NESSUS and How Does it Work?

Nessus is a proprietary vulnerability scanner developed by Tenable, Inc. is a subscription-based service. Tenable also contains what was previously known as Nessus Cloud, which used to be Tenable’s Software-as-a-Service solution.  Nessus is an open-source network vulnerability scanner that uses the Common Vulnerabilities and Exposures architecture for easy cross-linking [...]

Vulnerability Scanning Tools

We discussed vulnerability scanning in recent blog. Now in this blog we are going to introduce a number of vulnerability scanning tools. What is Network Vulnerability Scanning? Among the famous tools in this area are the following: SolarWinds MSP OpenVAS Nikto Retina products Solarwinds Network Configuration Manager Nexpose Community Edition [...]

The Best of NetFlow Tools

NetFlow is a network protocol that collects information about your network’s IP traffic and monitors network traffic activity. In this blog, we are going to review a number of NetFlow tools. We have already posted a blog about NetFlow on this site, which we recommend you read before continuing to [...]

By |2021|Network Monitoring|0 Comments


In this post, we are going to introduce you to a powerful tool in the field of network monitoring. It is better to read this blog first of all: Network Monitoring. The tool we are going to discuss is called Auvik network management and monitoring. It is a cloud-based software. [...]

What is CVE?

The Common Vulnerabilities and Exposures (CVE) system identifies all vulnerabilities and threats related to the security of information systems. This system provides a reference-method for publicly known information-security vulnerabilities and exposures. The catalog is sponsored by the United States Department of Homeland Security (DHS). This system was officially launched for [...]

What’s SNMP?

Network admins generally manage the devices in a network and allocate and free up ports and interfaces to ensure continuous uptime and bandwidth-hog-free network operations. Closely monitoring SNMP devices is a major part of this. Simple Network Management Protocol (SNMP) is an Internet Standard protocol for collecting and organizing information [...]

Email Tracking

  Email tracking is a method for monitoring the delivery of email messages to the intended recipient. Email tracking means monitoring opens and clicks of emails to follow up with leads, job applicants, and partners. In other words, email tracking is the process of tracking sent emails and using [...]

All we should know about HIPAA Compliance

The Health Insurance Portability And Accountability Act (HIPAA) compliance a legislation which provides security provisions and data privacy, in order to keep patients’ medical information safe. The law has emerged into greater prominence in recent years with the proliferation of health data breaches caused by cyberattacks and ransomware attacks on [...]

By |2020|Network Compliances|0 Comments

DoS and DDoS Attacks

A denial-of-service attack (DoS attack) is a cyber-attack in which the perpetrator seeks to make a machine or network resource unavailable to its intended users by temporarily or indefinitely disrupting services of a host connected to the network or Internet. Also, a Distributed Denial of Service (DDoS) attack is an [...]

By |2020|Network Security|0 Comments

Technical Support Scam

A technical support scam refers to any class of telephone fraud activities in which a scammer claims to offer a legitimate technical support service. The scammers may pretend to be from a well-known tech company, such as Microsoft. The scammer will typically attempt to get the victim to allow remote [...]

By |2020|Network Security|0 Comments

Features of a Powerful Anti-malware

There are small and large manufacturers that produce powerful anti-malware. So you have to choose one of the products of these manufacturers. There are not many differences between the products of these manufacturers in terms of quality. In fact, there is a very close competition between these products. In this [...]

By |2020|Anti-malware & Firewalls|0 Comments

Introduction of Several Encryption Software

Encryption software is software that uses cryptography to prevent unauthorized access to digital information. We have already discussed the concepts of cryptography in detail in a separate post: Data Encryption. Software encryption uses a cipher to obscure the content into cipher-text. Ciphers are into two categories: Public key (Asymmetric) ciphers: [...]

By |2020|Network Security|0 Comments

BitLocker Drive Encryption

BitLocker Drive Encryption is a tool in the Windows operating system for encrypting the entire contents of a drive from a computer hard drive. In this post, we do not intend to discuss the concepts of cryptography. You can read this post to understand these concepts. This tool in Windows [...]

By |2020|Network Security|0 Comments

DMZ Networks

The subject of this post is DMZ networks. But what exactly are the DMZ networks? DMZ ((DeMilitarized Zone) is essentially a military and political term meaning a civilian area. The most famous example of a demilitarized zone right now is the demilitarized zone on the border between South Korea and [...]

By |2020|Network Security, Networking|0 Comments

5 Backup Software (for Home/Personal Computer)

In this post, we are going to introduce you to five powerful backup software. All of these applications are suitable for home and personal computers.     Acronis True Image is one of best backup tools. Acronis official website This software has a good desktop interface and working with [...]

By |2020|Backup|0 Comments

Cisco ASA Firewalls

This post is about Cisco Firewalls. It aggregates available information from datasheets published by Cisco. The ASA in Cisco ASA stands for Adaptive Security Appliance. We suggest that you read the following two posts before continuing to read this post: All Things about Firewall Hardware Firewalls In fact, Cisco ASA is [...]

How to Comply with PCI DSS

This post presents How to comply with PCI DSS. This article is a summary from of the website. With the following link: PCI DSS Quick Reference Guide For more info please refer to We recommend you that before continuing, read this post. Each payment card brand maintains its [...]


A virtual private network (VPN) extends a private network across a public network and enables users to send and receive data across shared or public networks as if their computing devices were directly connected to the private network. In other words, A Virtual Private Network is a connection method used [...]

HIPAA Series – Security Standards: Organizational, Policies and Procedures and Documentation Requirements

In this post we are going to talk about Organizational, Policies and Procedures and Documentation Requirements. This post is the Fifth post in the HIPAA series. This series of posts is called the HIPAA Series. The series will contain seven post: Security 101 for Covered Entities Security Standards: Administrative Safeguards [...]

HIPAA: Medical Security

HIPAA law was created to ensure that patient’s sensitive information is protected. Protected health information (PHI) must be secured in the form of administrative, physical, and technical safeguards. It's better that before continuing to read this post, first read our previous post about HIPAA. The Health Insurance Portability and Accountability Act [...]

Hacking & Hackers

Hacking refers to activities that seek to compromise digital devices, such as computers, smartphones, tablets, and even entire networks. In other words, hacking is identifying weakness in computer systems or networks to exploit its weaknesses to gain access. Businesses need to protect themselves against such attacks. Hacking is typically technical [...]

Mobile Device Management (MDM) Solutions

Mobile devices come with their own set of problems, such as unauthorized data access and data leakage, which highlights the importance of managing these devices. Mobile device management (MDM) is a software application for the administration of mobile devices, such as smartphones, tablet computers and laptops. MDM includes storing essential [...]

By |2020|Network Security|0 Comments


A honeypot is a trap that an IT security professionals lays for a malicious hacker. A honeypot is a decoy computer system for trapping hackers or tracking unconventional or new hacking methods. It's a sacrificial computer system that’s intended to attract cyberattacks, like a decoy. The goal is to deceive [...]

By |2020|Network Security|0 Comments

Basics of Network Security

It is essential for all organizations to protect their networks. With hackers increasing and becoming smarter day by day, the need to utilize network security tool becomes more and more impotent. Network security is any activity designed to protect the usability and integrity of network and data. In fact, network [...]

By |2020|Network Security|0 Comments

Brute Force Attack

A brute force attack (exhaustive search) is a cryptographic hack that relies on guessing possible combinations of a targeted password until the correct password is discovered. This attack uses trial-and-error to guess login info, encryption keys, or find a hidden web page. Brute force attacks don’t employ an intellectual strategy. [...]

By |2020|Network Security|0 Comments

Trusted Platform Module (TPM)

TPM stands for trusted platform module. TPM also called is ISO/IEC 11889. TPM is an international standard for a secure cryptoprocessor, a dedicated microcontroller designed to secure hardware through integrated cryptographic keys. A TPM is actually a microchip on the motherboard of most servers and even today's clients. The main [...]

IPsec Protocol

Internet Protocol Security (IPsec) is a secure network protocol suite that authenticates and encrypts the packets of data to provide secure encrypted communication between two computers/networks. IPsec is usually used to set up VPNs, and it works by encrypting IP packets, along with authenticating the source where the packets come [...]

TOR Project

We recently had a post about the dark web that mentioned the Tor project.  Tor is free and open-source software for enabling anonymous communication. The name derived from the acronym for the original software project name "The Onion Router". Tor was originally developed by the US Navy in the mid-1990s. [...]

About Hashing And Its Applications

We have already mentioned hashing in some posts, for example, in this post. We want to talk more about hashing now. Hashing data is a common practice in computer science and is used for several different purposes. Hashing is the practice of taking a string or input key, a variable [...]

By |2020|Network Security|0 Comments

NIST SP 800-50

The National Institute of Standards and Technology (NIST) is a non-regulatory agency of the United States Department of Commerce. This Institute develops technology, metrics, and standards to drive innovation and economic competitiveness at U.S.-based organizations in the science and technology industry. For example, one of NIST’s roles is to develop [...]

OS Fingerprinting

If a hacker can determine what type of operating system a targeted computer is running, he or she can work to exploit the vulnerabilities present in that operating system. OS Fingerprinting is used by security professionals and hackers for mapping remote networks and determining which vulnerabilities might be present to [...]

By |2020|Network Security|0 Comments

Buffer Overflow Attack

Buffers are memory storage regions that temporarily hold data while it is being transferred from one location to another. These buffers typically live in RAM memory. Most modern hard drives take advantage of buffering to efficiently access data. Buffer is also widely used in online video streaming and buffers are [...]

By |2020|Network Security|0 Comments

Macro Virus

What’s a macro? It’s a small program that runs within a bigger program to automate a task (usually a complex or time-consuming task) on a user’s behalf. Macros are written in a programming language designed to work within their broader environment. So, for example, macros for Microsoft Office are currently [...]

By |2020|Network Security|0 Comments

What’s DLP?

Data loss refers to an event in which important data is lost to the enterprise, such as in a ransomware attack. Data loss prevention (DLP) focuses on preventing illicit transfer of data outside organizational boundaries. Data loss prevention is a set of tools and processes used to ensure that sensitive [...]

By |2020|Network Security|0 Comments

Dark Web

The dark web is a part of the internet (or a small part of the deep web) that isn't indexed by search engines. The dark web contains a large amount of illegal and criminal content (from various aspects). Online marketplaces for drugs, exchanges for stolen data, and other illegal activities [...]

Amazon VPC

Amazon Virtual Private Cloud (VPC) is a commercial cloud computing service that provides a virtual private cloud, by provisioning a logically isolated section of Amazon Web Services (AWS) Cloud. This service enables customer to launches AWS resources into a virtual network that he/she/it has defined. So, a customer has complete [...]


NetFlow is a feature that was introduced on Cisco routers around 1996 that provides the ability to collect IP network traffic as it enters or exits an interface. For example, NetFlow captures the timestamp of a flow’s first and last packets (and hence its duration), the total number of bytes [...]

By |2020|Network Security|0 Comments

Measuring Network Performance Tools

In this post, we'll take a look at measuring network performance to help you understand the different aspects of network performance. Network performance measurement is done by examining the values of several important factors. These factors include: Bandwidth and Throughput Delay Packet loss TTL Jitter Interference Network performance measurement is [...]

ITIL Framework

The IT Infrastructure Library (ITIL) is a library of volumes describing a framework of best practices for delivering IT services. ITIL’s systematic approach to IT service management can help businesses manage risk, strengthen customer relations, establish cost-effective practices, and build a stable IT environment that allows for growth, scale and [...]

By |2020|Network Security|0 Comments

Rapid7 Products

Rapid7 Nexpose is a vulnerability scanner which aims to support the entire vulnerability management lifecycle, including discovery, detection, verification, risk classification, impact analysis, reporting and mitigation. RAPID7 plays a very important and effective role in the penetration testing, and most pentesters use RAPID7. This paragraph is abbreviated from The [...]

By |2020|Network Security|0 Comments

Metasploit Framework

A kind of penetration testing aid is the Metasploit Project. This open-source framework allows testing via command line alterations or GUI. The Metasploit Framework is a Ruby-based, modular penetration testing platform that enables a pentester (hacker) to writes, tests, and executes exploit code. In other words, the Metasploit framework is a [...]

By |2020|Network Security|0 Comments

Penetration Testing

A penetration test (pen test or pentest and or ethical hacking) is a simulated cyber-attack against a computer system to check for exploitable vulnerabilities. You should not be confused it with a vulnerability assessment. Source: In fact, this test simulates a real-world attack to determine how any defenses will [...]

By |2020|Network Security|0 Comments

Broadcast Storm

A broadcast storm is also known as a network storm. It is an abnormally high number of broadcast packets within a short period of time. The broadcast storm is one of the major deficiencies in computer network systems and it can shut down entire network in seconds. When different nodes [...]

By |2020|Network Security|0 Comments


Wireshark is a network packet analyzer. This software one of the best packet analyzers available today and is available for free, and it is open source. This software, formerly known as Ethereal but the project was renamed Wireshark in May 2006 due to trademark issues. Sources:   and Wireshark [...]


In this post, we'll take a look at SSL protocol and TLS protocol to help you understand the different aspects of these protocols. One of the most important topics in Cyber-security course is web secure.     What’s SSL?  SSL (Secure Sockets Layer) is a protocol for establishing authenticated and [...]


Remote Authentication Dial-In User Service (RADIUS) is a networking protocol, operating on ports UDP 1645 and UDP 1812 that provides centralized AAA (Authentication, Authorization, and Accounting) management for users who connect and use a NAS (network access server  such as VPN concentrator, router, switch). This protocol is a client/server protocol [...]

Wireless Security Protocols

Wireless security is the prevention of unauthorized access or damage to computers or data using wireless networks, which include Wi-Fi networks. In this post, we'll take a look at wireless security protocols to help you understand the different aspects of these protocols. Source: There are several types of wireless [...]

By |2020|Network Security|0 Comments


Syslog stands for “System Logging Protocol,” Syslog used for system management and security auditing as well as general informational, analysis, and debugging messages. Syslog is a way for network devices to send event messages to a logging server. This protocol can be used to log different types of events. For [...]

pfSense Firewall

We have already published posts about firewalls and also hardware firewalls. In this post, we'll take a look at pfsense firewalls to help you understand the different aspects of pfsense firewalls. pfSense is an open source firewall/router computer software distribution based on FreeBSD. This firewall developed by Rubicon Communications, LLC [...]

Windows Task Manager Window

Monitoring system resources is a necessary part of troubleshooting. Resources include memory, mass storage, network access, processor power, and so on. Computer hardware and software resources must be managed. Proper management is not possible without resources monitoring. In this post, we'll take a look at resources monitoring and also task [...]

By |2020|Microsoft, Network Security|0 Comments

Windows Task Manager’s Processes

The subject of this post is to examine the processes in the process tab in the windows task manager in Microsoft windows (Windows workstation family and windows server family). There are many processes, and as a result, we will discuss the most common ones. The Processes tab (in windows task [...]

By |2020|Microsoft|0 Comments

What’s Cryptojacking?

Cryptojacking is an online threat that hides on a computer or mobile device and uses the machine’s resources to “mine” forms of online money known as cryptocurrencies. Cryptojacking also called malicious cryptomining. In fact, the core idea behind cryptojacking is that hackers use business and personal computer and device resources [...]

By |2020|Network Security|0 Comments

SonicWall Firewalls

We have already published posts about firewalls and also hardware firewalls. In this post, we'll take a look at sonicwall firewalls to help you understand the different aspects of sonicwall firewalls. SonicWall next-generation firewalls (NGFW) provide the security, control and visibility you need to maintain an effective cybersecurity posture. SonicWall [...]


In this post, we'll take a look at Robocallers to help you understand the all different aspects of robocallers. what's robocall? A robocall is an automated phone call that uses a computerized autodialer to deliver a pre-recorded message, as if from a robot. Some robocalls use personalized audio messages to [...]

By |2020|Network Security|0 Comments

Cryptolocker Attack

The CryptoLocker ransomware attack was a cyberattack using the CryptoLocker ransomware that occurred from 5 September 2013 to late May 2014. It is believed that the operators of CryptoLocker successfully extorted a total of around $3 million from victims of the trojan. It propagated via infected email attachments, and via [...]

By |2020|Network Security|0 Comments


Blackmail is an act of coercion using the threat of revealing or publicizing either substantially true or false information about a person or people unless certain demands are met. Blackmail is characterized as a crime and committing black mail can carry significant criminal and civil consequences. In this post, we'll [...]

By |2020|Network Security|0 Comments


These days, one of the most important aspects of cyber security is network monitoring. We have already published a detailed post on the importance and how to monitor the network. We suggest you read it. In this post, we'll take a look at Datadog Network performance monitor to help you [...]


PRTG Network Monitor is an agentless network monitoring software. This network monitor tool consists of two main system parts: Core server and Probe. ------------------------------------------------------------------------------------------------------------------------------------------------- These days, one of the most important aspects of cyber security is network monitoring. We have already published a detailed post on the importance and how [...]

GLBA Compliance

GLBA provides limited privacy protections against the sale of your private financial information. Additionally, the GLBA codifies protections against pretexting, the practice of obtaining personal information through false pretenses. The primary concern of GLBA is to ensure the confidentiality of customers' personally identifiable information (PII) and financial information by following [...]

Network Monitoring

Monitoring is one of the key components of network security. A network monitoring system (NMS) monitors the network for problems caused by overloaded or crashed servers, network connections or other devices. Network monitoring is a critical IT process where all networking components like routers, switches, firewalls, servers, and VMs are monitored [...]


This post is dedicated to TCP/UDP ports. But what's port? In computer networking, a port is a communication endpoint. A computer port is a type of electronic, software (or programming) related docking point through which information flows from a program on your computer or to your computer from the Internet [...]

HIPAA Compliance

The Health Insurance Portability And Accountability Act (HIPAA) a legislation which provides security provisions and data privacy, in order to keep patients’ medical information safe. The law has emerged into greater prominence in recent years with the proliferation of health data breaches caused by cyberattacks and ransomware attacks on health [...]

E-mail Encryption

E-mail encryption is one of the most important aspects of security in organizational networks, personal use, and the Internet. By default, email messages are not secure. They are sent across the Internet in plain text. Hackers who gain unauthorized access to an email account can access attachments, content, and even [...]

By |2020|Network Security|0 Comments

Securely Transfer Files

We, as individuals or organizations, often need to securely transfer files over the Internet to another person or organization on the Internet. In this post, we will try to get acquainted with the common solutions for this purpose and examine these file transfer methods from a security point of view. [...]

By |2020|Network Security|0 Comments

What’s GDPR?

General Data Protection Regulation (GDPR) is a regulation that requires businesses to protect the personal data and privacy of EU citizens for transactions that occur within EU member states. This regulation aims to simplify the regulatory environment for business so both citizens and businesses in the European Union can fully [...]

Data Encryption

Data encryption translates data into another form, or code, so that only people with access to a decryption key or password can read it. Today, encryption is widely used on the internal networks and internet to ensure the sanctity of user information (such as payment data or personal information) that's sent [...]

By |2020|Network Security|0 Comments

What’s VDI?

Virtual desktop infrastructure (VDI) is defined as the hosting of desktop environments on a central server. In fact, VDI is a desktop virtualization technology wherein a desktop operating system (OS) - typically Microsoft Windows - runs and is managed in an on-premises or cloud data center. The virtual desktop image [...]


Intrusion detection is the process of monitoring the events occurring in network and analyzing them for signs of possible incidents, violations, or imminent threats to security policies. These security measures are available as intrusion detection systems (IDS) and intrusion prevention systems (IPS). At result, IDS and IPS are both parts [...]

By |2020|Network Security|0 Comments

Offsite Backup

No matter how efficient a computer system appears to be, there is always the possibility of a malfunction wiping out valuable data. For this reason, many companies have set up backup systems, designed to recover lost data. It is very important that an organization have at least two backup. a [...]

Cloud Backup Solutions

In this post, we'll talk a little bit about cloud backup solution. About how cloud backup works? How to restore data from cloud backup? What methods can cloud backup be used for? What are the benefits of using cloud backup? Also we'll talk a little bit about cloud backup solutions. [...]

By |2020|Backup|0 Comments

Spoofing Attacks

Spoofing attacks are deliberately falsified to mislead and appear to be from a legitimate source. For example, spoofed phone numbers making mass robo-calls; spoofed emails sending mass spam; forged websites used to mislead and gather personal information. Spoofing can be used to gain access to a target’s personal information, spread [...]

By |2020|Network Security|0 Comments

Hardware Firewalls

Previously; We wrote an article as “All Things about Firewalls" earlier. Now, we want to discuss more about hardware firewalls. A hardware firewall is a physical device similar to a server that filters traffic to a computer. Hardware firewall has processor, memory, and sophisticated software, powerful networking components (hardware and [...]

What’s PCI DSS?

The Payment Card Industry Data Security Standard (PCI DSS) is a set of security standards for organizations that handle branded credit cards. The PCI DSS applies to ANY organization that accepts, transmits or stores any cardholder data. The PCI Standard is administered by the Payment Card Industry Security Standards Council. This [...]

Server virtualization

Computer network administrators usually dedicate each server to a specific application or task. In most cases each application / task needs its own dedicated machine. There are a couple of problems with this approach, though. One is that it doesn't take advantage of modern server computers' processing power. Many of these [...]

Microsoft 365

First of all, it should be noted that in preparing this article, we have used a lot of contents from the website. Sometimes we have copied and pasted the contents, in most cases we have summarized the contents, and sometimes, of course, we have written our own interpretation of [...]

By |2020|Microsoft|0 Comments

Veeam Backup & Replication

First of all, it should be noted that in preparing this post, we have used a lot of contents from the veeam website help center. Sometimes we have copied and pasted the article, in most cases we have summarized the article, and sometimes, of course, we have written our own [...]

By |2020|Backup|0 Comments

Social Engineering Attacks

Social engineering attacks are more prevalent than most people think. The reason for their prevalence is that they are relatively easy to implement. Social engineering is the term used for a broad range of malicious activities accomplished through human interactions. People are weakest link in the security chain, and in [...]

By |2020|Network Security|0 Comments

Information Security Concepts

This post provides some information on the concept of security, the concept of security in the network, the concept of security threats and their types.     Security Risk  A computer security risk is the potential for loss, damage or destruction of an asset as a result of a threat [...]

By |2020|Network Security|0 Comments

Phishing Attacks

Phishing is a type of social engineering attack often used to steal user data, including login credentials and credit card numbers. There is another definition for this attack. We can say Phishing is the fraudulent use of electronic communications to deceive and take advantage of users. Phishing attacks attempt to gain sensitive, [...]

By |2020|Network Security|0 Comments

Cyber Security

Cyber security is the practice of protecting systems, networks, and programs from digital attacks. It's also known as information technology security or electronic information security. Cyber-attacks are often aimed at accessing, changing, or destroying sensitive information. Final goal of these attacks is extorting money from users, or interrupting normal business [...]

BEC Attacks

In this post, we try to talk about one of the most common and destructive network attacks in recent years, known as the "Business Email Compromise (BEC)". This attack focuses on email scams. Example invoice scams and spear phishing spoof attacks. The first and most obvious result of this attack is [...]

By |2020|Network Security|0 Comments
Go to Top