Quantcast
Channel: 365 Computer Security Training
Browsing latest articles
Browse All 20 View Live

What is a Trojan Horse?

A Trojan horse is type of malware (malicious software) like viruses, worms, rootkits, and spyware.  However, unlike viruses and worms a Trojan horse is not able to create copies of itself or in tech...

View Article



Common Types of Spyware

There are a many of types spyware.  Some of them function solely as spyware, while other only contain features of spyware. Some of the frequently observed spyware types and their characteristics are:...

View Article

What is a Remote Administration Trojan?

Remote Administration Trojans (RATs), sometimes called a remote administration tool, uses a Trojan as the delivery mechanism for a malicious  tool, which is used to remotely connect and manage a single...

View Article

Tips to Counter Spyware

In the field of computers and networked communications, spyware has become a menace for lots of computer users and working professionals. Hence, it is essential to take certain precautions to counter...

View Article

What is a Phishing Attack?

Social engineering attacks are designed to trick or deceive victims into disclosing secure or private information.  A simple example of this type of attack is a recently fired information technology...

View Article


How to Avoid Phishing Attacks

The number and sophistication of phishing scams sent to consumers is increasing rapidly. If you do not know what phishing is you can find out HERE. Because phishing uses social engineering to trick...

View Article

What is Cryptography?

Cryptography is an important part of preventing private data from being stolen.  Even if an attacker were to break into your computer or intercept your messages they still will not be able to read the...

View Article

What is a Digital Certificate?

In order to fully understand digital certificates, learning a little about cryptography is helpful.  To learn the basics of cryptography go HERE. Digital certificates rely upon public key cryptography...

View Article


What is a Digital Signature?

Like digital certificates a digital signature is created with asymmetric or public-key cryptography. In the same way as signing your name to a document legally binds the document to you, a digital...

View Article


What is Public Key Infrastructure?

Using the technology of asymmetric or public key cryptography, a digital certificate is used to verify a user’s public key.  In other words, digital certificates ensure that a user is who he says he is...

View Article

What is a Hash?

A hash, also called a digest, is a unique string of data.  A hash is created when a collection of information that you want to protect is run through a hash function.  The process of creating a hash is...

View Article

What is Environmental Security?

Environmental security, from a computer networking standpoint, involves protecting and controlling the facilities where your systems are stored. The benefits of well-constructed environmental security...

View Article

What is Access Control?

Access control involves managing who has access to specific systems and resources at a given time.  The concept of access control revolves around the process comprised of three steps.  These steps are...

View Article


What are Access Control Models?

Access control is the process of deciding who can use specific systems, resources, and applications.  An access control model is a defined set of criteria a system administrator utilizes to define...

View Article

What are Password Attacks?

Everyone is probably familiar with passwords.  Passwords are the most common access control method used by system administers to manage the usage of network resources and applications.   Usernames are...

View Article


What is a Rainbow Table?

A rainbow table is a used to break passwords that have been encrypted into a hash.  Rainbow tables are huge sets of precomputed hashes for nearly every possible combination of special characters,...

View Article

Why Wi-Fi is Vulnerable to Attack

Wi-Fi, also called wireless internet or a Wireless Local Area Network (WLAN), has increased the availability of internet access greatly. Unfortunately, it has also introduced new security concerns that...

View Article


What is a Spoofing Attack?

Spoofing is when an attacker pretends to be someone else in order gain access to restricted resources or steal information. This type of attack can take a variety of different forms; for instance, an...

View Article

What is a DNS Poisoning Attack?

A Domain Name System (DNS) poisoning attack, also called DNS spoofing, is when an attacker is able to redirect a victim to different website than the address that he types into his browser.  For...

View Article

What is ARP Poisoning?

Address Resolution Protocol (ARP) poisoning is a type of attack where the Media Access Control (MAC) address is changed by the attacker.  Also, called an ARP spoofing attacks, it is effective against...

View Article
Browsing latest articles
Browse All 20 View Live




Latest Images