Misc Network Security

Last Updated on 19 April 2017, Total: 247 Articles and Tutorials

  1. Minimizing the effect of DOS attacks and overflows on your DNS servers

    This whitepaper will focus on strategies used when minimizing downtime caused by DOS attacks, aimed at DNS servers. To achieve high potency intruders focus their efforts on machines that have a high impact on the network, Windows 2000 networks rely a great deal on DNS. Intruders know this, and your focus should be turned to securing the organizations DNS server... Read More

  2. Minimizing Security Incidents

    One of the most pertinent strategies you can implement is one of minimizing the number and of course the severity of Security incidents. One of the biggest issues that I see when looking at security infrastructure is the fact that there is not a great deal of effort put into the possibility that there may even be a problem. In... Read More

  3. Make an Incident Response Plan

    Incident Response is when a problem occurs, it is identified and then you need to respond to it. Responding to such an incident would be deemed “Incident Response” and you need to know the underlying concepts to Incident Response for be able to run your network efficiently. In this article, we will look at all the underpinnings of Incident Response,... Read More

  4. Denial of Service 101

    A denial of service (DoS) attack is an incident in which a user or organization is deprived of the services of a resource they would normally expect to have. Typically, the loss of service is the inability of a particular network service, such as e-mail, to be available or the temporary loss of all network connectivity and services. In this... Read More

  5. Risk Assessment and Threat Identification

    Although you’ve gathered a considerable amount of data to this point, you will need to analyze this information to determine the probability of a risk occurring, what is affected, and the costs involved with each risk. Once you’ve identified the risks that can pose a probable threat to your company, and determined how much loss can be expected from an... Read More

  6. Network Security recommendations that will enhance your windows network

    Securing your network should be treated with the utmost priority. Knowing that your network is being attacked is a great advantage that will serve as a powerful tool. If your network security strategy is employed correctly you should not have a major challenge with intruders... Read More

  7. Port Scanning ISA Server

    When I wrote my series on how to secure your ISA Server installation, I had it in mind that ISA Server administrators could use the information to confirm whether or not their ISA Server installations we’re secure. We got some good feedback on the series, but you wanted more! Specifically, you wanted to know how you could test (via port... Read More