Home / IT Security / Security+ (page 10)

Security+

How Viruses Work

How Viruses Work

How Viruses Work: A virus, in most cases, tries to accomplish one of two things: render your system inoperable or spread to other systems. Many viruses will spread to other systems given the chance and then render your system unusable. This is common with many of the newer viruses. If …

Read More »

Finding the IP address of a Website

Finding the IP address of a Website

Finding the IP Address of a Website: This exercise will show you how to obtain the information about a website by using the ping and tracert.   On a Windows system, open the command prompt and enter the following command: ping jahasoft.com   Note the IP address that is returned, …

Read More »

Hacking: Fun or Criminal Activity?

Hacking: Fun or Criminal Activity?

Hacking Fun or Criminal Activity: As stated earlier, hacking is by no means a new phenomenon; it has existed in one form or another since the 1960s. For only a portion of the time since then has hacking been viewed as a crime and a situation that needs to be …

Read More »

The Evolution and Growth of Hacking

The Evolution and Growth of Hacking

The Evolution and Growth of Hacking: As you will see that attacks and strategies have improved and evolved over the years in ways you may not be aware of. Attackers have constantly sought up their game with new tactics and strategies to include various types of malware such as worms, …

Read More »

Safety Topics

Safety Topics

Safety Topics: Security is a priority for every administrator, but it cannot be the only priority: security cannot forsake all others. One of the other priorities that CompTIA wants you to be familiar with for this exam is safety. Most of the topics that fall beneath their definition of safety …

Read More »

Penetration Testing

Penetration Testing

Penetration Testing: It is becoming more common for companies to hire penetration testers to test their system’s defense. Essentially, a penetration tester will use the same techniques a hacker would use to find any flaws in your system’s security.   NOTE: Hacking and penetration testing are areas that seem quite …

Read More »

Security and the Cloud

Security and the Cloud

Security and the cloud: Since this is a certification exam on security and not just on memorization of cloud-based terminology, it is important to recognize the security issues associated with cloud computing. Two you should know for the exam are multitenancy and laws and regulations:   Multitenancy: One of the …

Read More »

Databases and Technology

Databases and Technology

Databases & Technology: One key reason why computers are installed is for their ability to store, access, and modify data. The primary tool for data management is the database. Databases have become increasingly sophisticated, and their capabilities have grown dramatically over the last 10 years. This growth has created opportunities …

Read More »