Blog Posts - Network Security
IP Traffic Will be Tripled by 2020?

IP Traffic Will be Tripled by 2020?As we already know, devices like smart phones, computers and many more using IP is increasing daily. So, how the IP traffic will be tripled by 2020?Base on Cisco Press Release:Growth Driven by More Than One Billion...
by Network Security Notes on Aug 20, 2016
Cisco Launches $10 Million Global Cybersecurity Scholarship to Increase Talent Pool; Introduces New and Updated Certifications

Cisco Launches $10 Million Global Cybersecurity Scholarship to Increase Talent Pool; Introduces New and Updated Certifications Cisco Press Release:Company Bolsters Ongoing Efforts to Equip IT Security Industry with Needed Technical Talent to Keep Org...
by Network Security Notes on Aug 20, 2016
Cisco Prepares Networking Industry for Transformation to Digital-Ready Networks

Cisco Prepares Networking Industry for Transformation to Digital-Ready NetworksThe Cisco Press Release:Company also improves threat visibility and enforcement capabilities with new security technology embedded into the networkJULY 11, 2016LAS VEGAS,...
by Network Security Notes on Aug 20, 2016
Cisco Closes ‘Security Effectiveness Gap’ with New Services and Integrated Cloud-Based Solutions

Cisco Closes ‘Security Effectiveness Gap’ with New Services and Integrated Cloud-Based SolutionsThe Cisco Press Release:Cisco’s architectural approach makes security more effective and simple for customersJULY 11, 2016LAS VEGAS, NV –&nbs...
by Network Security Notes on Aug 20, 2016
Cisco Advises Simple Steps to Protect Business Environments

Cisco Advises Simple Steps to Protect Business EnvironmentsCisco’s Talos researchers have observed that organizations that take just a few simple yet significant steps can greatly enhance the security of their operations, including:Improve ne...
by Network Security Notes on Aug 20, 2016
How to Protect Your Computer from intrusion

How to Protect Your Computer from intrusionEveryone may have own computer to access and connecting to Internet. Talking about Internet, Internet is a big network. So, computer is an element or a part of a network. To have a network with security...
by Network Security Notes on Aug 14, 2016
Safe Online Surfing for Your Children

Safe Online Surfing for Your ChildrenBased on FBI(Federal Bureau of Investigation): The FBI Safe Online Surfing (FBI-SOS) program is a nationwide initiative designed to educate children in grades 3 to 8 about the dangers they face on the Internet and...
by Network Security Notes on Aug 14, 2016
IGNOU MCTE-021 Network Security 2015 Question Paper

Indira Gandhi National Open University (IGNOU) Question Paper 2015 MASTER OF BUSINESS ADMINISTRATION (MBACT) Term-End Examination June, 2015 MCTE-021 : NETWORK SECURITY Time : 3 hours Maximum Marks : 100 Note : Attempt any five questions. All questio...
by University Question Papers on Jul 28, 2016
Security Hardening Checklist for Cisco Routers/Switches in 10 Steps

Network infrastructure devices (routers, switches, load balancers, firewalls etc) are among the assets of an enterprise that play an important role in security and thus need to be protected and configured accordingly. Many enterprises focus on protec...
by Cisco Tips on Jul 15, 2016
CS6701 cryptography and Network Security Question Bank

Anna University Chennai DEPARTMENT OF INFORMATION AND TECHNOLOGY QUESTION BANK SUBJECT : CS6701 CRYPTOGRAPHY AND NETWORK SECURITY SEM / YEAR : VII/ IVyear B.TECH Download Link => https://goo.gl/9Bqxlo...
by University Question Papers on Jul 10, 2016
CS6701 Cryptography and Network Security Question Bank

Anna University , Chennai Department of B.E-Computer Science and Engineering Final Year Seventh Semester CS6701 Cryptography and Network Security Solved Question Bank - 2016 Edition (Regulation 2013) Attachment: https://goo.gl/yVTmyJ...
by University Question Papers on Jul 8, 2016
Learn BGP Protocol: First Basic About BGP You Should Know

Learn BGP Protocol: First Basic About BGP You Should KnowBorder Gateway Protocol (BGP) is a standardized exterior gateway protocol designed to exchange routing and reachability information among autonomous systems (AS) on the Internet. Border Gateway...
by Network Security Notes on Jun 3, 2016
ANU B.Tech CS IT Network Security April 2016 Question Paper

ANU Question Paper Previous Years [Total No. of Questions : 09] CS/IT 321 (CR) III/IV B.Tech Degree Examinations, March April 2016 Second Semester CS/IT Network Security Time : 3 hours Maximum Marks : 70 Answer question No.1 Compulsory Answer ONE qu...
by University Question Papers on May 5, 2016
How to scan an IP Range with NMAP

This tutorial marks the beginning of a series of network security and penetration testing articles that I will be posting on this website. The purpose of this article is to describe how to perform a simple NMAP scan of an IP range/subnet on a network...
by Cisco Tips on Apr 26, 2016
5 Ways to protect your server from network attacks

We live in a time of almost constant vulnerability of the network. Unfortunately, our dependence on online resources also happens to be our greatest weakness, which means that there is nothing more important than for IT security and Internet technolo...
by OriginBuzz - Reviews and Tips on Jan 22, 2016
Network Security Fundamentals with APNIC

Network Security Fundamentals with APNIC Asia Pacific Network Information Centre (APNIC), is the not-for-profit regional Internet registry for the Asia Pacific region. APNIC provides number resource allocation and registration services that su...
by Network Security Notes on Sep 5, 2015
Why You Should Consider SMB Network Security As A Service

Original Article by TechSling Weblog: Despite what you may believe it is not just the Big Business targets that hackers are after; your small or medium sized business is also at risk. Consider the amounts of data that you transmit digitally eve...
by TechSling on Sep 1, 2015
Trending, Informative & Inspiring Techbiz IT Seminars 2015

Hello Monday! I’m looking forward for Friday. There are so many reasons to be happy beacuse we are going to have a long weekend, Merdeka holiday plus Malaysia IT Fair is starting 28th till 31st August at Mid Valley Convention Center. This year IT F...
by Sunshine Kelly on Aug 24, 2015
Security Jobs: Network Security Architect, Phoenix, AZ, Relocation Paid

Network Security ArchitectHeavy Cisco SkillsLocation: Phoenix, AZCompensation: $115,000 - $120,000+, Strong BonusRelocation: YesEducation: BA/BSCertification: CISSP, MCSE, MCSA, CCSP…CCIE and/or other Cisco Certifications Highly Desired ...
by SecurityRecruiter.com Security Recruiter Blog on May 19, 2015
Analog cameras vs. IP cameras: 12-point comparison

If you’re considering switching to an IP camera security system, consider these 12 points. First, an analog camera is a traditional camera used in CCTV systems. It sends video over cable to VCRs or DVRs. IP cameras are all digital cameras that...
by Inside the Box: The BBOX Blog on Mar 5, 2015