TDoS Attack

2021-01-30T09:10:30+00:00Categories: Network Security|Tags: , , , , , , , , , , , , , |

In this post, we are going to talk about TDoS attack. First of all, we recommend that you read our other post, in which we describe the DoS and DDoS attacks: DoS and DDoS Attacks In its annual report "Internet Crime Report" for 2019, the U.S. Federal Bureau of Investigation (FBI) estimated that TDoS attack [...]

The Best of NetFlow Tools

2021-01-11T18:15:02+00:00Categories: Network Monitoring|Tags: , , , , , , , , , , , , , , , , , , , , , , |

NetFlow is a network protocol that collects information about your network’s IP traffic and monitors network traffic activity. In this blog, we are going to review a number of NetFlow tools. We have already posted a blog about NetFlow on this site, which we recommend you read before continuing to read this post: NetFlow NetFlow [...]

DoS and DDoS Attacks

2020-10-06T11:21:11+00:00Categories: Network Security|Tags: , , , , , , , , , , |

A denial-of-service attack (DoS attack) is a cyber-attack in which the perpetrator seeks to make a machine or network resource unavailable to its intended users by temporarily or indefinitely disrupting services of a host connected to the network or Internet. Also, a Distributed Denial of Service (DDoS) attack is an attempt to make an online [...]

Hacking & Hackers

2020-08-15T14:25:12+00:00Categories: Certified Ethical Hacker, Network Security|Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , |

Hacking refers to activities that seek to compromise digital devices, such as computers, smartphones, tablets, and even entire networks. In other words, hacking is identifying weakness in computer systems or networks to exploit its weaknesses to gain access. Businesses need to protect themselves against such attacks. Hacking is typically technical but hackers can also use [...]

Dark Web

2020-09-02T05:29:51+00:00Categories: Computer & Network Concepts|Tags: , , , , , , , , , , , , , , , , , |

The dark web is a part of the internet (or a small part of the deep web) that isn't indexed by search engines. The dark web contains a large amount of illegal and criminal content (from various aspects). Online marketplaces for drugs, exchanges for stolen data, and other illegal activities get most of the attention. [...]

Securely Transfer Files

2020-09-24T06:45:04+00:00Categories: Network Security|Tags: , , , , , , , , , , , , , , , , , , , , , , , |

We, as individuals or organizations, often need to securely transfer files over the Internet to another person or organization on the Internet. In this post, we will try to get acquainted with the common solutions for this purpose and examine these file transfer methods from a security point of view. Sending a file over the [...]

IPS and IDS

2020-11-04T10:51:12+00:00Categories: Network Security|Tags: , , , , , , , , , , , , , , , , , , , , , , , |

Intrusion detection is the process of monitoring the events occurring in network and analyzing them for signs of possible incidents, violations, or imminent threats to security policies. These security measures are available as intrusion detection systems (IDS) and intrusion prevention systems (IPS). At result, IDS and IPS are both parts of the network infrastructure. IDS and [...]

Information Security Concepts

2020-09-23T13:54:03+00:00Categories: Network Security|Tags: , , , , , , , , , , , , , , , |

This post provides some information on the concept of security, the concept of security in the network, the concept of security threats and their types.     Security Risk  A computer security risk is the potential for loss, damage or destruction of an asset as a result of a threat exploiting a vulnerability. In other [...]

Assessing & Mitigating Vulnerabilities of Web Systems

2020-07-15T13:06:11+00:00Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , |

Assessing & Mitigating Vulnerabilities of Web Systems Web Servers are the programs that are used for hosting websites. Web servers may be deployed on a separate web server hardware or installed on a host as a program. One of the most important aspects of cyber security is the ability to secure web systems. This [...]

Go to Top