Network Security

What’s ISCM? (NIST SP 800-137)

2020-09-02T05:40:16+00:00Categories: Network Administration, Network Security, Standards and Agreements|Tags: , , , , , , , , , , , |

First of all, it's better to talk about what NIST is and why the content published by NIST is important. The National Institute of Standards and Technology (NIST) is a non-regulatory agency of the United States Department of Commerce. This Institute develops technology, metrics, and standards to drive innovation and economic competitiveness at U.S.-based organizations [...]

OS Fingerprinting

2020-07-25T12:57:16+00:00Categories: Network Security|Tags: , , , , , , , , , , , , |

If a hacker can determine what type of operating system a targeted computer is running, he or she can work to exploit the vulnerabilities present in that operating system. OS Fingerprinting is used by security professionals and hackers for mapping remote networks and determining which vulnerabilities might be present to exploit. In fact, it is [...]

Buffer Overflow Attack

2020-07-25T12:58:52+00:00Categories: Network Security|Tags: , , , , , , , , , , , , , , , , |

Buffers are memory storage regions that temporarily hold data while it is being transferred from one location to another. These buffers typically live in RAM memory. Most modern hard drives take advantage of buffering to efficiently access data. Buffer is also widely used in online video streaming and buffers are frequently used in online video [...]

Macro Virus

2020-09-26T06:36:35+00:00Categories: Network Security|Tags: , , , , , , , , , , , , , |

What’s a macro? It’s a small program that runs within a bigger program to automate a task (usually a complex or time-consuming task) on a user’s behalf. Macros are written in a programming language designed to work within their broader environment. So, for example, macros for Microsoft Office are currently written in Visual Basic for [...]

What’s DLP?

2020-08-24T08:51:40+00:00Categories: Network Security|Tags: , , , , , , , , , , , , , , , |

Data loss refers to an event in which important data is lost to the enterprise, such as in a ransomware attack. Data loss prevention (DLP) focuses on preventing illicit transfer of data outside organizational boundaries. Data loss prevention is a set of tools and processes used to ensure that sensitive data is not lost, misused, [...]

NetFlow

2020-07-15T08:30:05+00:00Categories: Network Security|Tags: , , , , , , , , , , , , , , , , |

NetFlow is a feature that was introduced on Cisco routers around 1996 that provides the ability to collect IP network traffic as it enters or exits an interface. For example, NetFlow captures the timestamp of a flow’s first and last packets (and hence its duration), the total number of bytes and packets exchanged, a summary [...]

Measuring Network Performance Tools

2020-09-26T06:39:33+00:00Categories: Microsoft, Network Monitoring, Network Security|Tags: , , , , , , , , |

In this post, we'll take a look at measuring network performance to help you understand the different aspects of network performance. Network performance measurement is done by examining the values of several important factors. These factors include: Bandwidth and Throughput Delay Packet loss TTL Jitter Interference Network performance measurement is defined as the overall set [...]

ITIL Framework

2020-07-13T17:31:14+00:00Categories: Network Security|Tags: , , , , , , , , , , , , , , , , , , , , , |

The IT Infrastructure Library (ITIL) is a library of volumes describing a framework of best practices for delivering IT services. ITIL’s systematic approach to IT service management can help businesses manage risk, strengthen customer relations, establish cost-effective practices, and build a stable IT environment that allows for growth, scale and change. In fact, ITIL describes [...]

Rapid7 Products

2020-07-13T06:32:30+00:00Categories: Network Security|Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , |

Rapid7 Nexpose is a vulnerability scanner which aims to support the entire vulnerability management lifecycle, including discovery, detection, verification, risk classification, impact analysis, reporting and mitigation. RAPID7 plays a very important and effective role in the penetration testing, and most pentesters use RAPID7. This paragraph is abbreviated from www.rapid7.com The following figure shows some of [...]

Go to Top