Skip to content
crmnuggets

CRMNUGGETS

RELIGION. DIGITAL MARKETING. PROJECT MANAGEMENT. ITIL 4 AND MORE

  • Home
  • ABOUT
  • CRM
    • SCRUM
    • ITIL 4
  • STC 30
  • PROJECT MANAGEMENT
  • RCCG SOD
    • RCCG SUNDAY SCHOOL TEACHERS
    • RCCG SUNDAY SCHOOL MANUAL
  • MORE
    • COMPUTER SECURITY
    • DIGITAL MARKETING
    • CYBER SECURITY
    • MFM 70 DAYS FASTING
    • BUSINESS ANALYSIS
    • BUSINESS CONTINUITY MANAGEMENT
    • KEDI HEALTHCARE
  • TERMS
  • PRIVACY
  • HIRE ME

Category: COMPUTER SECURITY

How To Obtain Email Digital Signature
COMPUTER SECURITY

How To Obtain Email Digital Signature

      In my previous article, I have talked about some of the ways that you can secure email accounts, In this article, I want to provide a clear…

Adeniyi SalauSeptember 16, 2022October 2, 2023
Using Firewall And Anti-Virus For Device Protection
COMPUTER SECURITY

Using Firewall And Anti-Virus For Device Protection

A firewall is a part of the computer system or network that is designed to block unauthorised access from devices. In this article, I want to talk about some of…

Adeniyi SalauSeptember 16, 2022October 2, 2023
2 Major Benefits Of Online Banking Platform
COMPUTER SECURITY

2 Major Benefits Of Online Banking Platform

  Online banking has become commonplace, although some people are still afraid of using it online banking. There is no need for you to fear. You just need to take…

Adeniyi SalauSeptember 16, 2022October 2, 2023
8 Types Of Credit Card Frauds To Know
COMPUTER SECURITY

8 Types Of Credit Card Frauds To Know

In my previous article, I talked about why we need to embrace online payments as an option. In this article, I want to talk about eight major types of credit…

Adeniyi SalauSeptember 16, 2022October 2, 2023
14 Major Online Transaction Security Checklists
COMPUTER SECURITY

14 Major Online Transaction Security Checklists

 In many of my previous articles, I have talked about how you can carry out a proper online transaction with your card and other payment alternatives. In this article, I…

Adeniyi SalauSeptember 16, 2022October 2, 2023
How To Avoid Email Inbox Spamming
COMPUTER SECURITY

How To Avoid Email Inbox Spamming

If there is one thing that has become so annoying to me as a person, it is this process of receiving unwanted emails in my inbox. I do not know…

Adeniyi SalauSeptember 16, 2022October 2, 2023
Differences Between A Hacker And A Threat Actor
COMPUTER SECURITY

Differences Between A Hacker And A Threat Actor

  We are under attack and attackers want access to our assets. Assets are anything of value to an organization, such as data and other intellectual property, servers, computers, smartphones,…

Adeniyi SalauAugust 18, 2022October 2, 2023
Use Of Access Control List In Networking
COMPUTER SECURITY

Use Of Access Control List In Networking

  An Access Control List in networking is a series of commands that control whether a device forwards or drops packets based on information found in the packet header. When…

Adeniyi SalauAugust 18, 2022October 2, 2023
Differences Between Wireless And Wired LANs
COMPUTER SECURITY

Differences Between Wireless And Wired LANs

WLANs use Radio Frequencies (RF) instead of cables at the physical layer and MAC sublayer of the data link layer. WLANs share a similar origin with Ethernet LANs. The IEEE…

Adeniyi SalauAugust 18, 2022October 2, 2023
Some Facts To Know Virtual LANs Generally
COMPUTER SECURITY

Some Facts To Know Virtual LANs Generally

  Within a switched internetwork, VLANs provide segmentation and organizational flexibility. VLANs provide a way to group devices within a LAN. A group of devices within a VLAN communicate as…

Adeniyi SalauAugust 1, 2022October 2, 2023
Digital Signatures In Cybersecurity: How To Use It
COMPUTER SECURITY

Digital Signatures In Cybersecurity: How To Use It

  Digital signatures in cybersecurity are a mathematical techniques used to provide authenticity, integrity, and nonrepudiation. Digital signatures have specific properties that enable entity authentication and data integrity. In addition,…

Adeniyi SalauJune 25, 2022October 2, 2023
COMPUTER SECURITY

Analysing Applications And Its Impact On Cryptography

  In my previous article, I have talked about all that you need to know about network security. In this article, I will be talking about applications and their impacts…

Adeniyi SalauJune 25, 2022October 2, 2023
Antimalware Protection In Cybersecurity: Facts To Note
COMPUTER SECURITY

Antimalware Protection In Cybersecurity: Facts To Note

  The term “endpoint” is defined in various ways. For the purpose of this course, we can define endpoints as hosts on the network that can access or be accessed…

Adeniyi SalauJune 25, 2022October 2, 2023
Network Profiling In Cybersecurity: Facts To Note
COMPUTER SECURITY

Network Profiling In Cybersecurity: Facts To Note

  In order to detect serious security incidents, it is important to understand, characterize, and analyze information about normal network functioning. Networks, servers, and hosts all exhibit typical behaviour for…

Adeniyi SalauJune 25, 2022October 2, 2023
7 Types Of Security Data In Cybersecurity
COMPUTER SECURITY

7 Types Of Security Data In Cybersecurity

Alert data consists of messages generated by intrusion prevention systems (IPSs) or intrusion detection systems (IDSs) in response to traffic that violates a rule or matches the signature of a…

Adeniyi SalauJune 25, 2022October 2, 2023
End Device Logs In Cybersecurity: The Various Types
COMPUTER SECURITY

End Device Logs In Cybersecurity: The Various Types

As previously discussed, host-based intrusion detection systems (HIDS) run on individual hosts. HIDS not only detects intrusions but in the form of host-based firewalls, which can also prevent intrusion. This…

Adeniyi SalauJune 25, 2022October 2, 2023
COMPUTER SECURITY

Elastic Data Core Components In Cybersecurity

  A typical network has a multitude of different logs to keep track of and most of those logs are in different formats. With huge amounts of disparate data, how…

Adeniyi SalauJune 24, 2022October 2, 2023
Understanding Packet Filtering Firewalls In Network Security
COMPUTER SECURITY

Understanding Packet Filtering Firewalls In Network Security

As networks begin to grow and interconnect, it became important to control the flow of traffics to networks. This initially took the form of packet filtering firewalls that examines the…

Adeniyi SalauFebruary 11, 2021October 3, 2023
All You Need To Know About Wi-fi Technologies
COMPUTER SECURITY

All You Need To Know About Wi-fi Technologies

Wifi is the technology6355444543 for wireless LAN. It is built based on the IEEE 802.11 standard. It started small but it has becomes the major standard for connecting endless devices…

Adeniyi SalauFebruary 11, 2021July 2, 2025
Facts About Endpoint Security Architecture
COMPUTER SECURITY

Facts About Endpoint Security Architecture

  An endpoint security architecture in the past means any personal device used by an end-user. It includes laptop desktop and other devices now it includes smartphones, IoT and other…

Adeniyi SalauFebruary 10, 2021July 2, 2025

Posts pagination

Previous 1 … 3 4 5 Next

SEARCH THROUGH OUR BLOG

new

NAVIGATE HERE

CHECK THIS

Copyright © 2025 CRMNUGGETS