Network Security

Home/Tag:Network Security

Basics of Network Security

2020-08-14T07:15:24+00:00Categories: Network Security|Tags: , , , , , , , , , , , , , , , , , , , , , , |

It is essential for all organizations to protect their networks. With hackers increasing and becoming smarter day by day, the need to utilize network security tool becomes more and more impotent. Network security is any activity designed to protect the usability and integrity of network and data. In fact, network security is a term used [...]

Brute Force Attack

2020-08-14T07:31:06+00:00Categories: Network Security|Tags: , , , , , , , , , , , , , , , , , , , , , , |

A brute force attack (exhaustive search) is a cryptographic hack that relies on guessing possible combinations of a targeted password until the correct password is discovered. This attack uses trial-and-error to guess login info, encryption keys, or find a hidden web page. Brute force attacks don’t employ an intellectual strategy. These attacks simply try using [...]

TOR Project

2020-09-02T05:37:44+00:00Categories: Computer & Network Concepts|Tags: , , , , , , , , |

We recently had a post about the dark web that mentioned the Tor project.  Tor is free and open-source software for enabling anonymous communication. The name derived from the acronym for the original software project name "The Onion Router". Tor was originally developed by the US Navy in the mid-1990s. Today, most of the funding [...]

About Hashing And Its Applications

2020-09-26T06:31:03+00:00Categories: Network Security|Tags: , , , , , , , , , , , , , , , , , |

We have already mentioned hashing in some posts, for example, in this post. We want to talk more about hashing now. Hashing data is a common practice in computer science and is used for several different purposes. Hashing is the practice of taking a string or input key, a variable created for storing narrative data, [...]

NIST SP 800-50

2020-09-26T06:33:11+00:00Categories: Network Administration, Network Security, Standards and Agreements|Tags: , , , , , , , , , , , , , , , , |

The National Institute of Standards and Technology (NIST) is a non-regulatory agency of the United States Department of Commerce. This Institute develops technology, metrics, and standards to drive innovation and economic competitiveness at U.S.-based organizations in the science and technology industry. For example, one of NIST’s roles is to develop guidelines on how companies can [...]

NIST SP 800-145 (Cloud Computing Definitions)

2020-09-02T05:39:50+00:00Categories: Network Administration, Network Security, Standards and Agreements|Tags: , , , , , , , , , , , , , , , |

Recent our posts were about NIST SP 800-137 and NIST SP 800-53A. In this post, we are going to review NIST SP 800-145. The title of this article is: Evaluation of Cloud Computing Services. This publication published in 2010. The PDF file of this publication consists of 32 pages and 7 chapters. These chapters are: Chapter [...]

NIST SP 800–53A

2020-09-02T05:40:04+00:00Categories: Network Administration, Network Security, Standards and Agreements|Tags: , , , , , , , |

Our previous post was about NIST SP 800-137. In this post, we are going to review NIST SP 800-53A. NIST SP 800-53 is shorthand for the National Institute of Standards and Technology Special Publication 800-53, Security and Privacy Controls for Federal Information Systems and Organization. NIST SP 800-53 is a set of standards and guidelines [...]

What’s ISCM? (NIST SP 800-137)

2020-09-02T05:40:16+00:00Categories: Network Administration, Network Security, Standards and Agreements|Tags: , , , , , , , , , , , |

First of all, it's better to talk about what NIST is and why the content published by NIST is important. The National Institute of Standards and Technology (NIST) is a non-regulatory agency of the United States Department of Commerce. This Institute develops technology, metrics, and standards to drive innovation and economic competitiveness at U.S.-based organizations [...]

OS Fingerprinting

2020-07-25T12:57:16+00:00Categories: Network Security|Tags: , , , , , , , , , , , , |

If a hacker can determine what type of operating system a targeted computer is running, he or she can work to exploit the vulnerabilities present in that operating system. OS Fingerprinting is used by security professionals and hackers for mapping remote networks and determining which vulnerabilities might be present to exploit. In fact, it is [...]

Go to Top