📚 Seth MB

Search

Search IconIcon to open search

Network Security

Last updated Jun 24, 2023 Edit

# Why is computer security important?

# Network Managers

# Threats to networks

# Malware

# Examples of malware
# Virus
# Worms
# Virus vs Worms
# Trojans
# Malware: Preventative Measures
# Phishing

# Denial of Service (DoS)

# Data interception and theft

# Brute force attack

# Preventative measures

# SQL injection

# Pharming

# Preventative measures

# Unpatched software

# Shoulder Surfing

# Blagging

# Buffer overflow attack

# Preventing Network Threats

“One single vulnerability is all an attacker needs. - Window Snyder”

# Penetration Testing

# Firewalls

# Packet filtering or static filtering

# Stateful inspection or dynamic filtering

# Limitations of firewalls

# Proxy server

# Authentication

# Biometric Authentication

# Security protocols


# Encryption

# Symmetric vs Asymmetric Ciphers

# Keys

# Private keys
# Public keys

# Encryption using keys

# Digital signatures

# MAC Address Filtering

Networking