Thursday , January 24 2019
Home / IT Security (page 10)

IT Security

So, What is an Ethical Hacker?

So, What is an Ethical Hacker?

What is an Ethical Hacker: When you explore this blog and the tools it has to offer, you are learning the skills of the hacker. But we can’t leave it at that, because you need to be an ethical hacker, so let’s explore what that means. Ethical hackers are employed …

Read More »

Competitive Analysis

Competitive Analysis

Competitive Analysis: We have covered some great tools so far, but there is another way of gathering useful data that may not seem as obvious; Competitive Analysis. The report created through competitive analysis provides information such as product information, project data, financial status, and in some cases intellectual property. Good …

Read More »

Complying with Privacy and Security Regulations

Complying with Privacy and Security Regulations

Complying with Privacy and Security Regulations: An organization’s security management policies don’t exist in a vacuum. Regulatory and governmental agencies are key components of a security management policy. These agencies have made large improvements over the last several years to ensure the privacy of information; several laws have been passed …

Read More »

Typo Squatting and URL Hijacking

Typo Squatting and URL Hijacking

Typo Squatting and URL Hijacking: Typo squatting (also spelled typosquatting) and URL hijacking are the one and the same. Difficult to describe as an attack, this is the act of registering domain that are similar to those for known entity but based on a misspelling or typographical error. As an …

Read More »

Government and Military Classification

Government and Military Classification

Government and Military Classification: The U.S government and the military have slightly different types of concerns relating to information classification. Government agencies are concerned about privacy and national security. Because of this, a unique system of classification and access controls has been implemented to protect information.   The following is …

Read More »

Surviving Viruses

Surviving Viruses

Surviving Viruses: A virus is a piece of software designed to infect a computer system. Under the best of circumstances, a virus may do nothing more than reside on the computer, but it may also damage the data on your hard disk (HDD), destroy your operating system, and possibly spread …

Read More »

Antivirus Software

Antivirus Software

Antivirus Software: The primary method of preventing the propagation of malicious code involves the use of antivirus software. Antivirus software is an application that is installed on a system to protect it and to scan for viruses as well as worms and Trojan horses. Most viruses have characteristics that are …

Read More »

Symptoms of a Virus Infection

Symptoms of a Virus Infection

Symptoms of a Virus Infection: Many viruses will announce that you are infected as soon as they gain access to your system. They may take control of your system and flash annoying messages on your screen or destroy your hard disk. When this occurs, you will know that you are …

Read More »

Hardening Email Servers

Hardening Email Server: Email servers provide the communications backbone for many businesses they typically run either as an additional service on an existing server or as dedicated systems. Putting an active virus scanner on email servers can reduce the number of viruses introduced into your network and prevent viruses from …

Read More »

Securing the Network

Securing the Network

Securing the Network: Obviously, network security is broad topic, and it will be addressed throughout these articles However, there are some essential concepts identified on the CompTIA Security + exam that are discussed in this section: MAC Limiting and Filtering: Limit access to the network to MAC addresses that are …

Read More »