Open in app

Sign In

Write

Sign In

tekashi99
tekashi99

Home

About

Dec 22, 2020

STUDYSEC+ {Part6}

Secure Network Administration Concept [Part 6] Ruled-based management Additional secure network administration concepts. Rule-Based management field. Used to create a secure network environment. Rule-Based management should be designed and tested to ensure that the rule function as expected. Firewall rules. Should be configured in such a way that only the required traffic can pass through. Whenever possible, the default rule should…

Networking

3 min read

STUDYSEC+ {Part6}
STUDYSEC+ {Part6}
Networking

3 min read


Dec 22, 2020

STUDYSEC+ {Part5}

Type of Application Attack 1 [PART5] Application attacks defined. Common application attacks. Due to improvement in modern network security, it may not be easy to exploit the network resources. As the improvement in modern network security, attackers have shifted their focus to application attacks. …

Networking

4 min read

STUDYSEC+ {Part5}
STUDYSEC+ {Part5}
Networking

4 min read


Dec 22, 2020

STUDYSEC+ {Part4}

Considerations of integration [PART 4] Risk awareness: Always evaluate the risk when integrating system and data with third parties: Data may reside out of the control of the business. Network transmission may be vulnerable. The other side of integration may not be secure. The party may go out of business. Onboarding and offboarding of business partners. THE ONBOARDING PROCESS: Procedures and systems need…

Networking

3 min read

STUDYSEC+ {Part4}
STUDYSEC+ {Part4}
Networking

3 min read


Dec 21, 2020

STUDYSEC+ {Part3}

INTRODUCTION TO NETWORK DEVICES [PART 3] Spam Filter. Network Devices. spam Filter Spam Define: Defined as unsolicited bulk email (UBE), or junk email. The spammer is hoping that the recipient will buy a product or service: In most cases, receive of spam is not a security threat, but it considered a waste of resources. Filter for spam: it usually put on the SMTP…

Networking

3 min read

STUDYSEC+ {Part3}
STUDYSEC+ {Part3}
Networking

3 min read


Dec 21, 2020

STUDYSEC+ {Part2}

INTRODUCTION TO NETWORK DEVICES [PART 2] Introducing the layered Security Concept. Network devices. Introducing the Layered Security Concept Modern networks are composed with multiple layers of devices and applications, which lead to security issues: Each layer or device can contain its own security methods. This means that if a breach occurs in one area of the network, the rest of the…

Security

3 min read

STUDYSEC+ {Part2}
STUDYSEC+ {Part2}
Security

3 min read


Dec 21, 2020

STUDYSEC+{Part1}

INTRODUCTION TO NETWORK DEVICES [PART 1] Open System Interconnection model Basic Network Devices Open System Interconnection model: Was developed a way to help disparate computing systems communicate with each other. Security can be placed in various layers of the OSI model to create a layered security arrangement that will improve the security of an overall performance OSI LAYER: layer 7 = Application Layer…

Security

4 min read

STUDYSEC+
STUDYSEC+
Security

4 min read

tekashi99

tekashi99

A humble person

Help

Status

Writers

Blog

Careers

Privacy

Terms

About

Text to speech