Browsing category

COMPUTER SECURITY

How To Obtain Email Digital Signature

      In my previous article, I have talked about some of the ways that you can secure email accounts, In this article, I want to provide a clear guide on how you can secure your email account by using an email digital signature. Follow me as we are going to look at some […]

2 Major Benefits Of Online Banking Platform

  Online banking has become commonplace, although some people are still afraid of using it online banking. There is no need for you to fear. You just need to take all the necessary precautions in order to be safe when you are carrying out online banking transactions. In this article, I want to talk about […]

8 Types Of Credit Card Frauds To Know

In my previous article, I talked about why we need to embrace online payments as an option. In this article, I want to talk about eight major types of credit card fraud that we should know when it comes to making payments online. Follow me as we are going to look at that together in […]

14 Major Online Transaction Security Checklists

 In many of my previous articles, I have talked about how you can carry out a proper online transaction with your card and other payment alternatives. In this article, I want to tell you some of the major online transaction checklists that you need to consider when it comes to making transactions online. Follow me […]

How To Avoid Email Inbox Spamming

If there is one thing that has become so annoying to me as a person, it is this process of receiving unwanted emails in my inbox. I do not know about you. I do receive these emails every day. They are so annoying. At times, I do wonder how these people got my email address. […]

Differences Between A Hacker And A Threat Actor

  We are under attack and attackers want access to our assets. Assets are anything of value to an organization, such as data and other intellectual property, servers, computers, smartphones, tablets, and more. In this article, we are going to be looking at the differences between a hacker and a threat actor. Follow me as […]

Use Of Access Control List In Networking

  An Access Control List in networking is a series of commands that control whether a device forwards or drops packets based on information found in the packet header. When configured, ACLs perform the following tasks: They limit network traffic to increase network performance. For example, if a corporate policy does not allow video traffic […]

Differences Between Wireless And Wired LANs

WLANs use Radio Frequencies (RF) instead of cables at the physical layer and MAC sublayer of the data link layer. WLANs share a similar origin with Ethernet LANs. The IEEE has adopted the 802 LAN/MAN portfolio of computer network architecture standards. The two dominant 802 working groups are 802.3 Ethernet, which defined Ethernet for wired […]

Some Facts To Know Virtual LANs Generally

  Within a switched internetwork, VLANs provide segmentation and organizational flexibility. VLANs provide a way to group devices within a LAN. A group of devices within a VLAN communicate as if they were connected to the same network segment. VLANs are based on logical connections, instead of physical connections.   The figure shows a 3-floor […]

Digital Signatures In Cybersecurity: How To Use It

  Digital signatures in cybersecurity are a mathematical techniques used to provide authenticity, integrity, and nonrepudiation. Digital signatures have specific properties that enable entity authentication and data integrity. In addition, digital signatures provide nonrepudiation of the transaction. In other words, the digital signature serves as legal proof that the data exchange did take place. Digital […]

Analysing Applications And Its Impact On Cryptography

  In my previous article, I have talked about all that you need to know about network security. In this article, I will be talking about applications and their impacts on cryptography. Where can PKI be used by an enterprise? The following provides a shortlist of common uses of PKIs: SSL/TLS certificate-based peer authentication Secure […]

Antimalware Protection In Cybersecurity: Facts To Note

  The term “endpoint” is defined in various ways. For the purpose of this course, we can define endpoints as hosts on the network that can access or be accessed by other hosts on the network. This obviously includes computers and servers, however many other devices can also access the network. With the rapid growth […]

Network Profiling In Cybersecurity: Facts To Note

  In order to detect serious security incidents, it is important to understand, characterize, and analyze information about normal network functioning. Networks, servers, and hosts all exhibit typical behaviour for a given point in time. Network and device understanding network profiling in cybersecurity Care must be taken when capturing baseline data so that all normal […]

7 Types Of Security Data In Cybersecurity

Alert data consists of messages generated by intrusion prevention systems (IPSs) or intrusion detection systems (IDSs) in response to traffic that violates a rule or matches the signature of a known exploit. A network IDS (NIDS), such as Snort, comes configured with rules for known exploits. Alerts are generated by Snort and are made readable […]

End Device Logs In Cybersecurity: The Various Types

As previously discussed, host-based intrusion detection systems (HIDS) run on individual hosts. HIDS not only detects intrusions but in the form of host-based firewalls, which can also prevent intrusion. This software creates logs and stores them on the host. This can make it difficult to get a view of what is happening on hosts in […]

Elastic Data Core Components In Cybersecurity

  A typical network has a multitude of different logs to keep track of and most of those logs are in different formats. With huge amounts of disparate data, how is it possible to get an overview of network operations while also getting a sense of subtle anomalies or changes in the network? This article […]

Understanding Packet Filtering Firewalls In Network Security

As networks begin to grow and interconnect, it became important to control the flow of traffics to networks. This initially took the form of packet filtering firewalls that examines the source and destination address of data, protocols. Firewall rules use these to define which packet to permit or deny. When a packet is coming in […]

All You Need To Know About Wi-fi Technologies

Wifi is the technology6355444543 for wireless LAN. It is built based on the IEEE 802.11 standard. It started small but it has becomes the major standard for connecting endless devices without using cables.   One major problem with Wi-fi is that anyone listening can actually discover what is being communicated.   At the onset, the […]

Facts About Endpoint Security Architecture

  An endpoint security architecture in the past means any personal device used by an end-user. It includes laptop desktop and other devices now it includes smartphones, IoT and other devices connected to a network.   Endpoints need to be secured because they are easy to point of entry into a network. This is because […]