Basic Networking

computer Network A network is any collection of independent computers that communicate with one another over a shared network medium. A computer network is a collection of two or more connected computers. When these computers are joined in a network, people can share files and peripherals such as modems, printers, tape backup drives, or CD-ROM … Read more

PENETRATION TESTING VS VULNERABILITY ASSESSMENT

There is often some confusion between penetration testing and vulnerability assessment. The two terms are related but penetration testing has more of an emphasis on gaining as much access as possible while vulnerability assessment places the emphasis on identifying areas that are vulnerable to the attack. An automated vulnerability scanner will often identify possible vulnerabilities … Read more

PENETRATION TESTING APPROACH

Develop a penetration test plan Establishing the test ground rules is a particularly important part of penetration analysis. The rules are captured in the penetration test plan, which defines the test objective, the product configuration, the test environment, test resources, and schedule. It is important that penetration testing use ethical evaluators who are no antagonistic … Read more

TYPES OF PENETRATION TESTS

Testing is about variation—finding the things in the software and its environment that can be varied, varying them, and seeing how the software responds. The goal is to ensure that the software performs reliably and securely under reasonable and even unreasonable production scenarios. So the most fundamental planning a tester can do is to understand … Read more

PENETRATION TESTING

INTRODUCTION AND METHODOLOGY Penetration testing is the process of attempting to gain access to resources without knowledge of usernames, passwords and other normal means of access. If the focus is on computer resources, then examples of a successful penetration would be obtaining or subverting confidential documents, pricelists, databases and other protected information. Near flawless penetration … Read more

VULNERABILITY ASSESSMENTS

THE CHALLENGES OF VULNERABILITY ASSESSMENTS Network vulnerability assessments are widely recognized as a crucial component of network security and a key component of any overall Network Security Assessment Service. Vulnerability Assessments are performed to determine the actual security posture of a network environment. They are designed to explore whether or not a malicious attacker can … Read more

NETWORK INTRUSION

Computer networks that are currently connected to the Internet are vulnerable to a variety of exploits that can compromise their intended operations. Systems can be subject to Denial of Service Attacks that prevents other computers from connecting to them for their provided service (e.g. web server) or prevent them from connecting to other computers on … Read more

MOBILE SAFEGUARDS AND SOLUTIONS

There are some solutions to secure our different types of mobile phones. Since new technologies are coming up we also need to be careful from our side to secure our mobile phones. ANDROID The most important steps you should take to sure your data is secure are: Keeping it private: The easiest way to keep … Read more