Security

ALL POSTS FROM CATEGORY / PAGE 2


Difference between Computer Security and Network Security
February 1, 2016

Difference between Computer Security and Network Security

You left out ‘cyber security’. Thanks for playing, please see Carol Merrill for your lovely parting gift. Snarky reply #2: Marketing! I’ll be here all week, tip your bartender or waitress, please. Computer Security is an older term, replaced by Information Security at least 5–10 years ago. Information Security is a very broad term that covers roughly eight domains…

Computer Network Security Tutorial
February 26, 2017

Computer Network Security Tutorial

Network Security deals with all aspects related to the protection of the sensitive information assets existing on the network. It covers various mechanisms developed to provide fundamental security services for data communication. This tutorial introduces you to several types of network vulnerabilities and attacks followed by the description of security measures…

Security Type for wireless Network
September 5, 2016

Security Type for wireless Network

How do I check what encryption type my Wi-Fi network is using? Many of you have been asking us how to find out your Wi-Fi network encryption type when installing the Gogogate 2 for the first time. Therefore, we consider it can be helpful to make a post about this. In the “beginning installation” process, Gogogate 2 will ask you for your Wi-Fi’s network encryption…

Wireless Network Security Projects
May 15, 2014

Wireless Network Security Projects

This project addresses how to improve existing and upcoming mobile security technologies (USIM, ISIM, GBA, …) in order to enhance mobile user security experience, and also to increase trust in mobile social network providers aiming to become identity providers. Yucheng Wu, Master Thesis worker explains how it works: Background Social networks are well established…

Network Security Issues in Cloud computing
September 23, 2016

Network Security Issues in Cloud computing

Enterprises are no longer sitting on their hands, wondering if they should risk migrating applications and data to the cloud. They re doing it - but security remains a serious concern. The first step in minimizing risk in the cloud is to identify the top security threats. As the RSA Conference last week, the CSA (Cloud Security Alliance) listed the “Treacherous…

1
2