Networking and Security
11 views | +0 today
Follow
Your new post is loading...
Your new post is loading...
Scooped by Toby Needs
Scoop.it!

What is a Computer Network?

What is a Computer Network? | Networking and Security | Scoop.it

A computer network is a group of computer systems and other computing hardware devices that are linked together through communication channels to facilitate communication and resource-sharing among a wide range of users. Networks are commonly categorized based on their characteristics.

more...
No comment yet.
Scooped by Toby Needs
Scoop.it!

The Importance of Network Security

The purpose of network security is essentially to prevent loss, through misuse of data. There are a number of potential pitfalls that may arise if network security is not implemented properly. Some of these are:

 

1. Breaches of confidentiality: Each business will identify with the need to keep certain critical information private from competitor eyes.

 

2.Data destruction: Data is a very valuable commodity for individuals and enterprises alike. It is a testament to its importance when the proliferation of backup technology available today is considered.

Destruction of data can severely cripple the victim concerned.

 

3.Data manipulation: A system break-in may be easily detectable, as some hackers tend to leave tokens of their accomplishment. However, data manipulation is a more insidious threat than that. Data values can be changed and, while that may not seem to be a serious concern, the significance becomes immediately apparent when financial information is in question.

 

more...
No comment yet.
Rescooped by Toby Needs from DigitAG& journal
Scoop.it!

Top Hacker at TED talk shows how everyday items are evolving into small PC's and are becoming less secure and hackable.

You think your wireless and other technology is safe? From Blue Tooth to automobile remotes, PCs, and "secure" credit cards, Hacker extraordinaire shows how vulnerable everyday electronics are to simple hacks."


Via Andrea Graziano
more...
No comment yet.
Rescooped by Toby Needs from Networking and system security
Scoop.it!

Network security threats explained: WiFi

http://www.sophos.com/en-us/lp/network-threats Sophos security expert James Lyne explains how hackers can take advantage of the mistakes that are commonly made by home and business WiFi users. 


Via David Tyler
more...
No comment yet.
Scooped by Toby Needs
Scoop.it!

What is Network Security?

What is Network Security? | Networking and Security | Scoop.it

Network security is an over-arching term that describes that the policies and procedures implemented by a network administrator to avoid and keep track of unauthorized access, exploitation, modification, or denial of the network and network resources.

This means that a well-implemented network security blocks viruses, malware, spyware hackers, etc. from accessing or altering secure information.

more...
No comment yet.
Scooped by Toby Needs
Scoop.it!

10 things you can do to improve network and PC security for Businesses.

Securing your network and PCs is a never-ending battle. Here are some effective strategies to add to your arsenal.

 

1: Use Linux

2: Block users from installing software

3: Upgrade your antivirus

4: Use Firefox / Chrome

5: Disable add-ons

6: Deploy a hardware-based firewall

7: Enforce strict password policies

8: Do not share networked folders with "Everyone"

9: Use network access control, like PacketFence

10: Use content filtering to protect from malware

more...
No comment yet.
Rescooped by Toby Needs from Networking and system security
Scoop.it!

Famous former computer hacker shares his expertise on cyber security

Canada and other NATO countries are ramping up the fight against cyber attacks. To do this, it is bringing in the best IT specialists to gain maximum protection.


Via David Tyler
more...
No comment yet.
Scooped by Toby Needs
Scoop.it!

Introduction to Public-Key Cryptography

Introduction to Public-Key Cryptography | Networking and Security | Scoop.it
Public-key cryptography and related standards and techniques underlie security features of many Red Hat products, including signed and encrypted email, form signing, object signing, single sign-on, and the Secure Sockets Layer (SSL) protocol. This document introduces the basic concepts of public-key cryptography.
Toby Needs's insight:

Your Computer has a Public key and a private key. when a computer wants to communicate securely they use the Public / Private key method of encryption. When a message is sent the public key encrypts the message using some sort of algorithm sends it through the network as a encrypted data file and when it is received by the other computer it uses their private key to decrypt the message and print the decrypted message onto the screen.  

more...
No comment yet.