Posts

Showing posts from May 20, 2011

Protect your wireless network

Image
Protect your wireless network The wireless network has become the best option in the growing problem of interlocking wire note that the cost of the establishment of a wireless network does not exceed the SR 500 and all what we need (wireless router) and every computer that we want to add to this network should contain (a wireless network card). Wireless development has brought with it new risks, where the network is vulnerable to several things like that someone else is using your net connection or the network is penetrated and tampering Baeidadatha and perhaps access to the files on your computer. These risks we had to do to protect the network and to prevent terrorists from access to information about us and that is being circulated wirelessly. Requirements of the Wireless Network Wireless network card Today you can buy a wireless USB card so that you install it yourself easily . Steps to protect your wireless network Note : The following steps will give you...

Information Security Policies

Information security policies, whether corporate policies, business unit policies, or regional entity policies provide the requirements for the protection of information assets. An information security policy is often based on the guidance provided by a frame work standard, such as ISO 17799/27001 or the National Institutes of Standards and Technology's (NIST) Special Publication (SP) 800 series standards. The Standards are effective in providing requirements for the "what" of protection, the measures to be used, the "who " and "when" requirements tend to be organization-specific and are assembled and agreed based on the stakeholders' needs. Governance, the rules for governing an enterprise are addressed by security-relevant roles and responsibilities defined within the policy. Decision making is a key governance activity performed by individuals acting in roles based on delegated authority for making the decision and oversight to verify the decisi...

Cloud Computing Security

Cloud Computing is a dynamic area that has grown to include applications, information, infrastructure and services that provides resources for computing, networking and storage. It is simple to implement and scale according to your needs. A lovely example is Google Docs. Google Docs give you the resources to generate, edit, change and store documents, presentations, spreadsheets online. It also lets you basically share your documents with other people and have them view or edit these as well. Cloud Computing and Security Admittedly, the scariest thing that most people and businesses must face about cloud computing is the fact that they are going to be losing control for operating the services that they put in to the cloud. It could be a program, a platform, storage, or service; operational control and responsibility are no longer theirs. Going back to the Google Docs example, you can do all the functionalities it offers, but you cannot be positive of its security. Unlike in Micro...

Wireless Security Configuration

More & more people everyday are switching over to wireless know-how. They are using it at home & at work to be able to connect to the web without having the hard work of being connected with a hard line Ethernet cable. There's plenty of advantages to doing this. With the power of laptops getting better everyday & increasingly requirements for being mobile, it is a ideal solution. The issue is, plenty of people set up their router at home & connect without any security enabled. Without the proper protection on your network you can open yourself up to plenty of hazards. The worst outcome being a hacker getting in to your personal computer & stealing your information & possibly your identity. It is essential to have proper protection in the event you are using wireless. First things first, they must alter the SSID & set a powerful password for wireless. In the event you have over 20+ characters there is no way anyone can break in to it by brute force. I...

Multi layered security

It is important to safeguard your net site no matter what its size is. This is where the multi-layered security comes in to play. It would help you keep your net site safe from the cybercriminals & the hackers. Here in this article the technique in which multi-layered security would help you safeguard your net site is described in detail. First & fore most protection ought to be provided to your e mail. This is because e mail is most important device of business communications & therefore it is also used maximum for attacking the sites. Thus you ought to provide antivirus & antispyware program & firewall as well as content filtering technique which would protect your e mail account. Thus the threats of spamming, phishing assaults & other threats are considerably reduced. You ought to put in such security at the mail servers, gateway & also in the laptop computer & the desktop. It would help you mitigate the risk at various levels. The final & th...

Dynamic Website Security

When the page lots, you won't see the PHP code but in lieu see the contents of the included file. In the case above, you would see your navigation links etc where they ought to be. At a most basic level, PHP can be used to simplify the navigation of a web-site by using the include function. This, added to each page of the web-site can be used to include a html file that contains the sites navigation links. The main advantage of this is that the webmaster can basically adjust that file, in lieu of every single page on the site. Obviously if your site has thousands of pages, this is going to save you some time! The include() function fundamentally tells the server your web-site is hosted on, to take what is in the included file & put it in to the code of your page. Typical use of the include function is as follows: There's lots of things a typical user can do which may cause you irritation, or in the case of a purchase form, cause you to never receive the order, e.g. mist...