Skip to content
crmnuggets

CRMNUGGETS

RELIGION. DIGITAL MARKETING. PROJECT MANAGEMENT. ITIL 4 AND MORE

  • Home
  • ABOUT
  • CRM
    • SCRUM
    • ITIL 4
  • STC 30
  • PROJECT MANAGEMENT
  • RCCG SOD
    • RCCG SUNDAY SCHOOL TEACHERS
    • RCCG SUNDAY SCHOOL MANUAL
  • MORE
    • COMPUTER SECURITY
    • DIGITAL MARKETING
    • CYBER SECURITY
    • MFM 70 DAYS FASTING
    • BUSINESS ANALYSIS
    • BUSINESS CONTINUITY MANAGEMENT
    • KEDI HEALTHCARE
  • TERMS
  • PRIVACY
  • HIRE ME

Category: CYBER SECURITY

Network Communications Protocols For Cyber Security: The Facts
CYBER SECURITY

Network Communications Protocols For Cyber Security: The Facts

Simply having a wired or wireless physical connection between end devices is not enough to enable communication. For communication to occur, devices must know “how” to communicate. Communication, whether face-to-face…

Adeniyi SalauAugust 18, 2022October 2, 2023
Data Encapsulation In Networking: Highlighting The Facts
CYBER SECURITY

Data Encapsulation In Networking: Highlighting The Facts

Knowing the OSI reference model and the TCP/IP protocol model will come in handy when you learn about how data is encapsulated as it moves across a network. It is…

Adeniyi SalauAugust 18, 2022October 2, 2023
MAC Addresses And IP Addresses: Highlighting The Facts
CYBER SECURITY

MAC Addresses And IP Addresses: Highlighting The Facts

In my previous article, I have talked much about how data travels across the network. In this article, I want to talk more about MAC addresses and IP Addresses. Follow…

Adeniyi SalauAugust 18, 2022October 2, 2023
Address Resolution Protocol: How It Works
CYBER SECURITY

Address Resolution Protocol: How It Works

If your network is using the IPv4 communications protocol, the Address Resolution Protocol, or ARP, is what you need to map IPv4 addresses to MAC addresses. This topic explains how…

Adeniyi SalauAugust 18, 2022October 2, 2023
Examining Transport Layer Characteristics In Networking
CYBER SECURITY

Examining Transport Layer Characteristics In Networking

Application layer programs generate data that must be exchanged between the source and destination hosts. The transport layer is responsible for logical communications between applications running on different hosts. This…

Adeniyi SalauAugust 18, 2022October 2, 2023
Transport Layer Session Establishment: How It Is Done
CYBER SECURITY

Transport Layer Session Establishment: How It Is Done

You already know the fundamentals of TCP. Understanding the role of port numbers will help you to grasp the details of the TCP communication process. In this topic, you will…

Adeniyi SalauAugust 18, 2022October 2, 2023
Understanding Dynamic Host Configuration Protocol
CYBER SECURITY

Understanding Dynamic Host Configuration Protocol

The Dynamic Host Configuration Protocol (DHCP) for IPv4 service automates the assignment of IPv4 addresses, subnet masks, gateways, and other IPv4 networking parameters. This is referred to as dynamic addressing.…

Adeniyi SalauAugust 18, 2022October 2, 2023
The Truth About Domain Name Service
CYBER SECURITY

The Truth About Domain Name Service

The webservers that we so often connect to using names like www⋅cisco⋅com, are actually reached by assigning IP addresses to packets. On the internet, these domain names are much easier…

Adeniyi SalauAugust 18, 2022October 2, 2023
Roles Of  End Devices In The Network Process
CYBER SECURITY

Roles Of End Devices In The Network Process

  The network devices that people are most familiar with are end devices. To distinguish one end device from another, each end device on a network has an address. When…

Adeniyi SalauAugust 18, 2022October 2, 2023
Insight Into Packet Forwarding Decision Process
CYBER SECURITY

Insight Into Packet Forwarding Decision Process

Now that the router has determined the best path for a packet based on the longest match, it must determine how to encapsulate the packet and forward it out to…

Adeniyi SalauAugust 18, 2022October 2, 2023
8 General Security Practices For Home Networking
CYBER SECURITY

8 General Security Practices For Home Networking

When it comes to general security breaches, home networks are the most susceptible to attacks. The reason is that home network users always have the mindset that they have nothing…

Adeniyi SalauAugust 18, 2022October 2, 2023
Understanding IP PDU Details For IPV4 And IPV6
CYBER SECURITY

Understanding IP PDU Details For IPV4 And IPV6

IP was designed as a Layer 3 connectionless protocol. It provides the necessary functions to deliver a packet from a source host to a destination host over an interconnected system…

Adeniyi SalauAugust 18, 2022October 2, 2023
Highlighting Various Network Security Monitoring Tool
CYBER SECURITY

Highlighting Various Network Security Monitoring Tool

  In this article, I want to look at common network security monitoring tools in cybersecurity. Follow me as we look at this together in this article. Common tools that…

Adeniyi SalauAugust 18, 2022October 2, 2023
Analysing Network Security Topology In Cybersecurity
CYBER SECURITY

Analysing Network Security Topology In Cybersecurity

“All networks are targets” is a common adage used to describe the current landscape of network security. Therefore, to mitigate threats, all networks must be secured and protected. This article…

Adeniyi SalauAugust 18, 2022October 2, 2023
Analysing Denial Of Service Attack In Cybersecurity
CYBER SECURITY

Analysing Denial Of Service Attack In Cybersecurity

A Denial of Service (DoS) attack creates some sort of interruption of network services to users, devices, or applications. In this article, I want to discuss all that you need…

Adeniyi SalauAugust 18, 2022October 2, 2023
Reconnaissance Attacks In Networking: How It Works
CYBER SECURITY

Reconnaissance Attacks In Networking: How It Works

  Reconnaissance is information gathering. It is analogous to a thief surveying a neighbourhood by going door-to-door pretending to sell something.   What the thief is actually doing is looking…

Adeniyi SalauAugust 18, 2022October 2, 2023
Understanding The Evolution Of Security Tools
CYBER SECURITY

Understanding The Evolution Of Security Tools

Ethical hacking involves using many different types of tools to test the network and end devices. To validate the security of a network and its systems, many network penetration testing…

Adeniyi SalauAugust 18, 2022October 2, 2023
Guidelines For Ensuring Credit Card Safety
CYBER SECURITY

Guidelines For Ensuring Credit Card Safety

  In my previous article, I talked about how online shopping has made life easy for people making transactions online. Despite the fact that it is very easy to make…

Adeniyi SalauAugust 16, 2022October 2, 2023
Understanding IP Vulnerabilities In Networking
CYBER SECURITY

Understanding IP Vulnerabilities In Networking

  In my previous article, I have talked about some of the facts that you need to know about network security. This article talks about some of the facts that…

Adeniyi SalauJuly 22, 2022October 2, 2023
Understanding Address Resolution Protocol Vulnerabilities
CYBER SECURITY

Understanding Address Resolution Protocol Vulnerabilities

  Hosts broadcast an ARP Request to other hosts on the network segment to determine the MAC address of a host with a particular IP address. All hosts on the…

Adeniyi SalauJuly 9, 2022October 2, 2023

Posts pagination

Previous 1 2 3 4 Next

SEARCH THROUGH OUR BLOG

new

NAVIGATE HERE

CHECK THIS

Copyright © 2025 CRMNUGGETS