IT Security
-
The Health Insurance Portability and Accountability Act
The Health Insurance Portability and Accountability Act (HIPAA): is a regulation that mandates national standards and procedures for the storage,…
Read More » -
ACL: Access Control Lists
Access Control Lists: Related to permissions is the concept of the access control lists (ACL). An ACL is literally a…
Read More » -
Malicious Insider Threats
Malicious Insider Threats: One of the most dangerous threats to any network is an insider who is intent on doing…
Read More » -
Managing Spam to Avoid Viruses
Managing Spam to Avoid Viruses: Although spam is not truly a virus or a hoax, it is one of the…
Read More » -
How Viruses Work
How Viruses Work: A virus, in most cases, tries to accomplish one of two things: render your system inoperable or…
Read More » -
Finding the IP address of a Website
Finding the IP Address of a Website: This exercise will show you how to obtain the information about a website…
Read More » -
Intrusion Prevention and Intrusion Detection Systems
Intrusion prevention & Intrusion detection systems: Intrusion prevention system (IPSs) and intrusion detection systems (IDSs) are important considerations for any…
Read More » -
Hacking: Generic Example of Cyber Crime
Generic Examples of Cyber Crime: Hacking is by no means a new phenomenon; it has existed in one form or…
Read More »