Tag Archive

An Introduction to Unified Threat Management in Network Security

By Rajesh K

In this article, we have a look at a broad range of network security threats that concerns an enterprise user, what is Unified Threat Management (UTM) and why it is required, the types of UTM - hardware based, software based and distributed model, and the advantages and limitations of UTM based network security solutions. »

An overview of socially engineered deceptive internet threats

By Rajesh K

Threats arising due to internet usage are quite wide. We will look at a few of them, especially the ones where cyber criminals use deception as the main tool to trick the net users and either plant malicious software in the computers which might later act as botnets, spyware etc. or make them come... »

Details about the Denial of Service attack that disabled Twitter access

By Rajesh K

Recently, the micro-blogging platform Twitter was down for more than two hours, thereby denying access to many users across the world for that time. The culprit was found to be a Denial of Service attack launched by multiple zombies sitting on networked computers (Also called as Distributed Denial of Service attacks). We give... »

Host Integrity Check for Endpoint and Network Security

By Rajesh K

This article gives an introduction to Host Integrity Check mechanism that enables enterprises to enforce the connectivity of their endpoints (Laptops/Desktops) only if they comply to the security policies of the network (Like latest patches, signature updates etc), the components of such a solution, host integrity check for managed, unmanaged and unmanageable endpoints,... »

Types of DoS attacks and how they are mitigated

By Rajesh K

This article looks at the main types of Denial Of Service attacks like Previously known DoS attacks (Juno etc.), Unknown DoS flooding attacks, SYN floods, connection limit attacks etc. in an enterprise network and the ways in which IPS systems mitigate those attacks. »

Why is URL Filtering required and how it is accomplished

By Rajesh K

This article provides an introduction to what is URL Filtering, why it is needed and how it is done at enterprise level. We also have a look at the various factors involved in categorizing the websites and updating them. The advantages and dis-advantages of URL filtering are also discussed. »

Securing and Monitoring portable USB based devices

By Rajesh K

This article attempts to see if bulk enterprise security policies can be applied to portable devices like USB pen drives, mp3 players, cellphone connecting through USB, CD/DVD media, Digital Cameras etc, if they can be managed from a central software application, and the features offered by such an application for Data Leakage Prevention. »

What is a Phishing threat and how users can be safeguarded

By Rajesh K

This article explains what are Phishing attacks, why it is a network security threat, how emails are used to gain confidential information, what else the phishers can do other than directing to a fradulent website, how such Phishing attacks are mitigated by enterprise companies. There is also a small introduction to a related threat... »

What are: Packet filtering, Circuit level, Application Level and Stateful Multilayer inspection Firewalls

By Rajesh K

This article examines the different types of Firewall technologies. The four common types of firewalls are: 1. Packet Filtering Firewalls 2. Circuit level gateway Firewalls 3. Application level gateway Firewalls 4. Stateful multi-layer inspection Firewalls »

An introduction and overview of enterprise network security

By Rajesh K

This article covers an overview of the products and technologies that help maintain network security. We would see small introduction to firewalls, anti-virus, anti-spam, content filtering in email, URL web filtering, Intrusion Prevention Systems (IPS) and UTM (Unified Threat Management). »

Get email updates when new articles are published

Enter your email address:

Delivered by FeedBurner

Network equipment

Follow me in Twitter!

Contact Me

Use the Contact Form to contact me regarding feedback, topics you'd like to read here, suggestions, etc.