Differences Between Wireless And Wired LANs

Differences Between Wireless And Wired LANs

August 18, 2022 Adeniyi Salau 0

WLANs use Radio Frequencies (RF) instead of cables at the physical layer and MAC sublayer of the data link layer. WLANs share a similar origin with Ethernet LANs. The IEEE has adopted the 802 LAN/MAN portfolio of computer network architecture standards. The two dominant 802 working groups are 802.3 Ethernet, […]

Some Facts To Know Virtual LANs Generally

Some Facts To Know Virtual LANs Generally

August 1, 2022 Adeniyi Salau 0

  Within a switched internetwork, VLANs provide segmentation and organizational flexibility. VLANs provide a way to group devices within a LAN. A group of devices within a VLAN communicate as if they were connected to the same network segment. VLANs are based on logical connections, instead of physical connections.   […]

Ways Of Using Digital Signatures In Cybersecurity

Digital Signatures In Cybersecurity: How To Use It

June 25, 2022 Adeniyi Salau 0

  Digital signatures in cybersecurity are a mathematical techniques used to provide authenticity, integrity, and nonrepudiation. Digital signatures have specific properties that enable entity authentication and data integrity. In addition, digital signatures provide nonrepudiation of the transaction. In other words, the digital signature serves as legal proof that the data […]

No Image

Analysing Applications And Its Impact On Cryptography

June 25, 2022 Adeniyi Salau 0

  In my previous article, I have talked about all that you need to know about network security. In this article, I will be talking about applications and their impacts on cryptography. Where can PKI be used by an enterprise? The following provides a shortlist of common uses of PKIs: […]

Understanding Antimalware Protection In Cybersecurity

Antimalware Protection In Cybersecurity: Facts To Note

June 25, 2022 Adeniyi Salau 0

  The term “endpoint” is defined in various ways. For the purpose of this course, we can define endpoints as hosts on the network that can access or be accessed by other hosts on the network. This obviously includes computers and servers, however many other devices can also access the […]

Understanding Network Profiling In Cybersecurity

Network Profiling In Cybersecurity: Facts To Note

June 25, 2022 Adeniyi Salau 0

  In order to detect serious security incidents, it is important to understand, characterize, and analyze information about normal network functioning. Networks, servers, and hosts all exhibit typical behaviour for a given point in time. Network and device understanding network profiling in cybersecurity Care must be taken when capturing baseline […]

7 Types Of Security Data In Cybersecurity

7 Types Of Security Data In Cybersecurity

June 25, 2022 Adeniyi Salau 0

Alert data consists of messages generated by intrusion prevention systems (IPSs) or intrusion detection systems (IDSs) in response to traffic that violates a rule or matches the signature of a known exploit. A network IDS (NIDS), such as Snort, comes configured with rules for known exploits. Alerts are generated by […]

6 Types Of End Device Logs In Cybersecurity

End Device Logs In Cybersecurity: The Various Types

June 25, 2022 Adeniyi Salau 0

As previously discussed, host-based intrusion detection systems (HIDS) run on individual hosts. HIDS not only detects intrusions but in the form of host-based firewalls, which can also prevent intrusion. This software creates logs and stores them on the host. This can make it difficult to get a view of what […]

Elastic Data Core Components In Cybersecurity

June 24, 2022 Adeniyi Salau 0

  A typical network has a multitude of different logs to keep track of and most of those logs are in different formats. With huge amounts of disparate data, how is it possible to get an overview of network operations while also getting a sense of subtle anomalies or changes […]

Understanding Packet Filtering Firewalls In Network Security

Understanding Packet Filtering Firewalls In Network Security

February 11, 2021 Adeniyi Salau 0

As networks begin to grow and interconnect, it became important to control the flow of traffics to networks. This initially took the form of packet filtering firewalls that examines the source and destination address of data, protocols. Firewall rules use these to define which packet to permit or deny. When […]

All You Need To Know About Wi-fi Technologies

All You Need To Know About Wi-fi Technologies

February 11, 2021 Adeniyi Salau 0

Wifi is the technology6355444543 for wireless LAN. It is built based on the IEEE 802.11 standard. It started small but it has becomes the major standard for connecting endless devices without using cables. One major problem with Wi-fi is that anyone listening can actually discover what is being communicated. At […]

Facts About Endpoint Security Architecture

Facts About Endpoint Security Architecture

February 10, 2021 Adeniyi Salau 0

  An endpoint security architecture in the past means any personal device used by an end-user. It includes laptop desktop and other devices now it includes smartphones, IoT and other devices connected to a network. Endpoints need to be secured because they are easy to point of entry into a […]

Comprehensive Guide On Use Of SD-WAN

Comprehensive Guide On Use Of SD-WAN

February 8, 2021 Adeniyi Salau 1

In my previous article, I have discussed some of the facts that you need to know about Cloud Computing. In this article, I want to talk about what you need to know about the use of SD-WAN. Follow me as we are going to be looking at that in this […]

Comprehensive Guide About Cloud Computing

Comprehensive Guide About Cloud Computing

February 8, 2021 Adeniyi Salau 0

In my previous article, I have talked about all that you need to know about Cyber Attacks. In this article, I will be presenting a comprehensive guide about Cloud Computing. Follow me as we will look at this together in this article.  Only a few people understand what cloud computing […]

Understanding Insider Threat In Network Security

Understanding Insider Threat In Network Security

February 8, 2021 Adeniyi Salau 0

  In my previous article, I have talked about a phishing attack in network security. In this article, I want to talk about all that you need to know about Insider Threats in Network Security. Follow me as we are going to look at this together in this article.  Now, […]

13 Ways To Avoid Cyber Security Threats

13 Ways To Avoid Cyber Security Threats

February 8, 2021 Adeniyi Salau 0

In my previous article, I have discussed some of the facts that you need to know about phishing and Business Email Compromise generally. In this article, I want to look at some of the facts that you need to put into consideration in order to avoid cyber security threats. Follow […]

14 Steps To Avoid Network Vulnerabilities

February 2, 2021 Adeniyi Salau 0

Here are some of the steps that you need to take to avoid the vulnerabilities of your mobile devices.     #1 Avoid joining Free Wi-fi First and foremost, you should be wary of free wifi, Some of these free wi-fi is set up in order to steal personal data. […]

An Insight Into The Activity Of Cybercriminals

February 2, 2021 Adeniyi Salau 0

In my previous article, I have mentioned that cybercriminals are motivated by money and they want to do all that they could do steal your personal data, most especially your card information. In this article, I want to highlight the major facts that you need to know about the activities […]

Understanding Attack Surface In Computer Security

January 30, 2021 Adeniyi Salau 0

Information security is important to people of all ages, We all have a role to make cyberspace secure for ourselves and others. Whenever you are online, you are vulnerable, that is why you have to be cyber vigilant. You can outsmart attackers with security awareness. It is called Human Firewalls. […]

How To Find Out If Children Are At Risk Online

January 28, 2021 Adeniyi Salau 0

There was a film that I watched of a Teenage who was chatting with a stranger online. Because the girl was so inquisitive to know who the stranger was, she decided to arrange a meeting with the stranger. At the end of it all, She was almost physically molested by […]