Skip to content
crmnuggets
Menu
  • Home
  • CRM
    • SCRUM
    • ITIL 4
  • ABOUT
  • RCCG SOD
  • DEVOTION
  • PROJECT MANAGEMENT
  • MORE
    • RCCG SUNDAY SCHOOL TEACHERS
    • RCCG SUNDAY SCHOOL MANUAL
    • COMPUTER SECURITY
    • DIGITAL MARKETING
    • CYBER SECURITY
    • MFM 70 DAYS FASTING
    • BUSINESS ANALYSIS
    • BUSINESS CONTINUITY MANAGEMENT
    • KEDI HEALTHCARE
  • TERMS
  • PRIVACY
  • HIRE ME
Menu

COMPUTER SECURITY

How To Obtain Email Digital Signature

How To Obtain Email Digital Signature

Posted on September 16, 2022October 2, 2023 by Adeniyi Salau

      In my previous article, I have talked about some of the ways that you can secure email accounts, In this article, I want to provide a clear guide on how you can secure your email account by using an email digital signature. Follow me as we are going to look at some…

Sharing Is Caring. If you enjoy this article, help us share with others.
Read more
Using Firewall And Anti-Virus For Device Protection

Using Firewall And Anti-Virus For Device Protection

Posted on September 16, 2022October 2, 2023 by Adeniyi Salau

A firewall is a part of the computer system or network that is designed to block unauthorised access from devices. In this article, I want to talk about some of the ways to use firewalls and virus for device protection. Follow me as we are going to look at that together in this article.   …

Sharing Is Caring. If you enjoy this article, help us share with others.
Read more
Video: What You Never Knew About Cybersecurity

2 Major Benefits Of Online Banking Platform

Posted on September 16, 2022October 2, 2023 by Adeniyi Salau

  Online banking has become commonplace, although some people are still afraid of using it online banking. There is no need for you to fear. You just need to take all the necessary precautions in order to be safe when you are carrying out online banking transactions. In this article, I want to talk about…

Sharing Is Caring. If you enjoy this article, help us share with others.
Read more
Credit Card Frauds To Know

8 Types Of Credit Card Frauds To Know

Posted on September 16, 2022October 2, 2023 by Adeniyi Salau

In my previous article, I talked about why we need to embrace online payments as an option. In this article, I want to talk about eight major types of credit card fraud that we should know when it comes to making payments online. Follow me as we are going to look at that together in…

Sharing Is Caring. If you enjoy this article, help us share with others.
Read more
14 Major Online Transaction Security Checklists

14 Major Online Transaction Security Checklists

Posted on September 16, 2022October 2, 2023 by Adeniyi Salau

 In many of my previous articles, I have talked about how you can carry out a proper online transaction with your card and other payment alternatives. In this article, I want to tell you some of the major online transaction checklists that you need to consider when it comes to making transactions online. Follow me…

Sharing Is Caring. If you enjoy this article, help us share with others.
Read more
How To Avoid Email Inbox Spamming

How To Avoid Email Inbox Spamming

Posted on September 16, 2022October 2, 2023 by Adeniyi Salau

If there is one thing that has become so annoying to me as a person, it is this process of receiving unwanted emails in my inbox. I do not know about you. I do receive these emails every day. They are so annoying. At times, I do wonder how these people got my email address….

Sharing Is Caring. If you enjoy this article, help us share with others.
Read more
Differences Between A Hacker And A Threat Actor

Differences Between A Hacker And A Threat Actor

Posted on August 18, 2022October 2, 2023 by Adeniyi Salau

  We are under attack and attackers want access to our assets. Assets are anything of value to an organization, such as data and other intellectual property, servers, computers, smartphones, tablets, and more. In this article, we are going to be looking at the differences between a hacker and a threat actor. Follow me as…

Sharing Is Caring. If you enjoy this article, help us share with others.
Read more
Use Of Access Control List In Networking

Use Of Access Control List In Networking

Posted on August 18, 2022October 2, 2023 by Adeniyi Salau

  An Access Control List in networking is a series of commands that control whether a device forwards or drops packets based on information found in the packet header. When configured, ACLs perform the following tasks: They limit network traffic to increase network performance. For example, if a corporate policy does not allow video traffic…

Sharing Is Caring. If you enjoy this article, help us share with others.
Read more
Differences Between Wireless And Wired LANs

Differences Between Wireless And Wired LANs

Posted on August 18, 2022October 2, 2023 by Adeniyi Salau

WLANs use Radio Frequencies (RF) instead of cables at the physical layer and MAC sublayer of the data link layer. WLANs share a similar origin with Ethernet LANs. The IEEE has adopted the 802 LAN/MAN portfolio of computer network architecture standards. The two dominant 802 working groups are 802.3 Ethernet, which defined Ethernet for wired…

Sharing Is Caring. If you enjoy this article, help us share with others.
Read more
Some Facts To Know Virtual LANs Generally

Some Facts To Know Virtual LANs Generally

Posted on August 1, 2022October 2, 2023 by Adeniyi Salau

  Within a switched internetwork, VLANs provide segmentation and organizational flexibility. VLANs provide a way to group devices within a LAN. A group of devices within a VLAN communicate as if they were connected to the same network segment. VLANs are based on logical connections, instead of physical connections.   The figure shows a 3-floor…

Sharing Is Caring. If you enjoy this article, help us share with others.
Read more
Ways Of Using Digital Signatures In Cybersecurity

Digital Signatures In Cybersecurity: How To Use It

Posted on June 25, 2022October 2, 2023 by Adeniyi Salau

  Digital signatures in cybersecurity are a mathematical techniques used to provide authenticity, integrity, and nonrepudiation. Digital signatures have specific properties that enable entity authentication and data integrity. In addition, digital signatures provide nonrepudiation of the transaction. In other words, the digital signature serves as legal proof that the data exchange did take place. Digital…

Sharing Is Caring. If you enjoy this article, help us share with others.
Read more

Analysing Applications And Its Impact On Cryptography

Posted on June 25, 2022October 2, 2023 by Adeniyi Salau

  In my previous article, I have talked about all that you need to know about network security. In this article, I will be talking about applications and their impacts on cryptography. Where can PKI be used by an enterprise? The following provides a shortlist of common uses of PKIs: SSL/TLS certificate-based peer authentication Secure…

Sharing Is Caring. If you enjoy this article, help us share with others.
Read more
Understanding Antimalware Protection In Cybersecurity

Antimalware Protection In Cybersecurity: Facts To Note

Posted on June 25, 2022October 2, 2023 by Adeniyi Salau

  The term “endpoint” is defined in various ways. For the purpose of this course, we can define endpoints as hosts on the network that can access or be accessed by other hosts on the network. This obviously includes computers and servers, however many other devices can also access the network. With the rapid growth…

Sharing Is Caring. If you enjoy this article, help us share with others.
Read more
Understanding Network Profiling In Cybersecurity

Network Profiling In Cybersecurity: Facts To Note

Posted on June 25, 2022October 2, 2023 by Adeniyi Salau

  In order to detect serious security incidents, it is important to understand, characterize, and analyze information about normal network functioning. Networks, servers, and hosts all exhibit typical behaviour for a given point in time. Network and device understanding network profiling in cybersecurity Care must be taken when capturing baseline data so that all normal…

Sharing Is Caring. If you enjoy this article, help us share with others.
Read more
7 Types Of Security Data In Cybersecurity

7 Types Of Security Data In Cybersecurity

Posted on June 25, 2022October 2, 2023 by Adeniyi Salau

Alert data consists of messages generated by intrusion prevention systems (IPSs) or intrusion detection systems (IDSs) in response to traffic that violates a rule or matches the signature of a known exploit. A network IDS (NIDS), such as Snort, comes configured with rules for known exploits. Alerts are generated by Snort and are made readable…

Sharing Is Caring. If you enjoy this article, help us share with others.
Read more
6 Types Of End Device Logs In Cybersecurity

End Device Logs In Cybersecurity: The Various Types

Posted on June 25, 2022October 2, 2023 by Adeniyi Salau

As previously discussed, host-based intrusion detection systems (HIDS) run on individual hosts. HIDS not only detects intrusions but in the form of host-based firewalls, which can also prevent intrusion. This software creates logs and stores them on the host. This can make it difficult to get a view of what is happening on hosts in…

Sharing Is Caring. If you enjoy this article, help us share with others.
Read more

Elastic Data Core Components In Cybersecurity

Posted on June 24, 2022October 2, 2023 by Adeniyi Salau

  A typical network has a multitude of different logs to keep track of and most of those logs are in different formats. With huge amounts of disparate data, how is it possible to get an overview of network operations while also getting a sense of subtle anomalies or changes in the network? This article…

Sharing Is Caring. If you enjoy this article, help us share with others.
Read more
Understanding Packet Filtering Firewalls In Network Security

Understanding Packet Filtering Firewalls In Network Security

Posted on February 11, 2021October 3, 2023 by Adeniyi Salau

As networks begin to grow and interconnect, it became important to control the flow of traffics to networks. This initially took the form of packet filtering firewalls that examines the source and destination address of data, protocols. Firewall rules use these to define which packet to permit or deny. When a packet is coming in…

Sharing Is Caring. If you enjoy this article, help us share with others.
Read more
All You Need To Know About Wi-fi Technologies

All You Need To Know About Wi-fi Technologies

Posted on February 11, 2021July 2, 2025 by Adeniyi Salau

Wifi is the technology6355444543 for wireless LAN. It is built based on the IEEE 802.11 standard. It started small but it has becomes the major standard for connecting endless devices without using cables.   One major problem with Wi-fi is that anyone listening can actually discover what is being communicated.   At the onset, the…

Sharing Is Caring. If you enjoy this article, help us share with others.
Read more
Facts About Endpoint Security Architecture

Facts About Endpoint Security Architecture

Posted on February 10, 2021July 2, 2025 by Adeniyi Salau

  An endpoint security architecture in the past means any personal device used by an end-user. It includes laptop desktop and other devices now it includes smartphones, IoT and other devices connected to a network.   Endpoints need to be secured because they are easy to point of entry into a network. This is because…

Sharing Is Caring. If you enjoy this article, help us share with others.
Read more
  • Previous
  • 1
  • 2
  • 3
  • 4
  • 5
  • Next

SEARCH THROUGH OUR BLOG

NAVIGATE HERE

CHECK THIS

© 2025 CRMNUGGETS | Powered by Minimalist Blog WordPress Theme