Network Security

TCP/UDP Ports

2020-09-24T07:17:33+00:00Categories: Computer & Network Concepts, Network Security|Tags: , , , , , , , , , , , |

This post is dedicated to TCP/UDP ports. But what's port? In computer networking, a port is a communication endpoint. A computer port is a type of electronic, software (or programming) related docking point through which information flows from a program on your computer or to your computer from the Internet or another computer in a [...]

Authentication Methods

2020-09-02T05:32:17+00:00Categories: Computer & Network Concepts, Network Security|Tags: , , , , , , , , , , , , , , , , , , , , , , , , , |

Authentication is the process of verifying the identity of a person or device. In fact, Authentication technology provides access control for systems by checking to see if a user's credentials match the credentials in a database of authorized users or in a data authentication server. The authentication process always runs at the start of the [...]

Biometric Authentication Methods

2020-09-20T05:04:56+00:00Categories: Computer & Network Concepts, Network Security|Tags: , , , , , , , , , , , , |

In recent years, issues such as Multi-Factor Authentication (MFA) and Biometric Authentication have become more common due to problems in traditional authentication methods. In fact, biometric methods can be considered a subset of  MFA. In this post, we take a look at the most common methods used in biometric authentication. There are a number of [...]

HIPAA Compliance

2020-09-24T06:51:10+00:00Categories: Network Compliances, Network Security|Tags: , , , , , , , , , , |

The Health Insurance Portability And Accountability Act (HIPAA) a legislation which provides security provisions and data privacy, in order to keep patients’ medical information safe. The law has emerged into greater prominence in recent years with the proliferation of health data breaches caused by cyberattacks and ransomware attacks on health insurers and providers. It's good [...]

E-mail Encryption

2020-07-13T11:49:23+00:00Categories: Network Security|Tags: , , , , , |

E-mail encryption is one of the most important aspects of security in organizational networks, personal use, and the Internet. By default, email messages are not secure. They are sent across the Internet in plain text. Hackers who gain unauthorized access to an email account can access attachments, content, and even hijack your entire email account. [...]

Securely Transfer Files

2020-09-24T06:45:04+00:00Categories: Network Security|Tags: , , , , , , , , , , , , , , , , , , , , , , , |

We, as individuals or organizations, often need to securely transfer files over the Internet to another person or organization on the Internet. In this post, we will try to get acquainted with the common solutions for this purpose and examine these file transfer methods from a security point of view. Sending a file over the [...]

What’s GDPR?

2020-09-09T07:11:31+00:00Categories: Network Compliances, Network Security|Tags: , , , , |

General Data Protection Regulation (GDPR) is a regulation that requires businesses to protect the personal data and privacy of EU citizens for transactions that occur within EU member states. This regulation aims to simplify the regulatory environment for business so both citizens and businesses in the European Union can fully benefit from the digital economy. [...]

Data Encryption

2020-09-24T06:39:21+00:00Categories: Network Security|Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , |

Data encryption translates data into another form, or code, so that only people with access to a decryption key or password can read it. Today, encryption is widely used on the internal networks and internet to ensure the sanctity of user information (such as payment data or personal information) that's sent between a browser and a [...]

IPS and IDS

2020-11-04T10:51:12+00:00Categories: Network Security|Tags: , , , , , , , , , , , , , , , , , , , , , , , |

Intrusion detection is the process of monitoring the events occurring in network and analyzing them for signs of possible incidents, violations, or imminent threats to security policies. These security measures are available as intrusion detection systems (IDS) and intrusion prevention systems (IPS). At result, IDS and IPS are both parts of the network infrastructure. IDS and [...]

Go to Top