Tuesday , December 18 2018
Home / IT Security / Security+ (page 4)

Security+

Services and Ports of Interest

Services and Ports of Interest

Services and Ports of Interest: As we wade into the enumeration phase, let’s make sure you understand more details about ports. You should expect during your scanning phase to uncover a number of ports, some of which may be useful to you for enumeration and other less so. Here are …

Read More »

Understanding the Steps of Ethical Hacking

Understanding the Steps of Ethical Hacking

Understanding the Steps of Ethical Hacking: For an overview of the process, let’s look at the steps of ethical hacking to see where Footprinting fits in as well as what future phases hold. Phase 1: Footprinting Footprinting is the first phase of the ethical hacking process and is the subject …

Read More »

So, What is an Ethical Hacker?

So, What is an Ethical Hacker?

What is an Ethical Hacker: When you explore this blog and the tools it has to offer, you are learning the skills of the hacker. But we can’t leave it at that, because you need to be an ethical hacker, so let’s explore what that means. Ethical hackers are employed …

Read More »

Competitive Analysis

Competitive Analysis

Competitive Analysis: We have covered some great tools so far, but there is another way of gathering useful data that may not seem as obvious; Competitive Analysis. The report created through competitive analysis provides information such as product information, project data, financial status, and in some cases intellectual property. Good …

Read More »

Complying with Privacy and Security Regulations

Complying with Privacy and Security Regulations

Complying with Privacy and Security Regulations: An organization’s security management policies don’t exist in a vacuum. Regulatory and governmental agencies are key components of a security management policy. These agencies have made large improvements over the last several years to ensure the privacy of information; several laws have been passed …

Read More »

Typo Squatting and URL Hijacking

Typo Squatting and URL Hijacking

Typo Squatting and URL Hijacking: Typo squatting (also spelled typosquatting) and URL hijacking are the one and the same. Difficult to describe as an attack, this is the act of registering domain that are similar to those for known entity but based on a misspelling or typographical error. As an …

Read More »

Government and Military Classification

Government and Military Classification

Government and Military Classification: The U.S government and the military have slightly different types of concerns relating to information classification. Government agencies are concerned about privacy and national security. Because of this, a unique system of classification and access controls has been implemented to protect information.   The following is …

Read More »

Hardening Email Servers

Hardening Email Server: Email servers provide the communications backbone for many businesses they typically run either as an additional service on an existing server or as dedicated systems. Putting an active virus scanner on email servers can reduce the number of viruses introduced into your network and prevent viruses from …

Read More »

Securing the Network

Securing the Network

Securing the Network: Obviously, network security is broad topic, and it will be addressed throughout these articles However, there are some essential concepts identified on the CompTIA Security + exam that are discussed in this section: MAC Limiting and Filtering: Limit access to the network to MAC addresses that are …

Read More »

Noteworthy HTTP Status Codes

Noteworthy HTTP Status Codes

HTTP Status Codes: As web server responses are received by your browser, they will include a status code to signal what type of response it is. There are over 50 numerical HTTP responses codes grouped into five families that provide similar type of status codes. Knowing what each type of …

Read More »