Email Alerts
-
OSI: Securing the Stack, Layer 8 -- Social engineering and security policy
Network security is essential at every layer of the OSI model, including the mythical eighth layer, where users interact with technology. Since hackers can use social engineering to exploit people, it is important to train your users and implement go... Tip
-
OSI: Securing the Stack, Layer 7 -- Applications
Domain Name System (DNS) wasn't designed to handle today's security threats, making it a prime target at Layer 7 -- the application layer -- of the OSI model. In this tip, learn how DNS works and some of the ways hackers attack it, including exploiti... Tip
-
OSI: Securing the Stack, Layer 6 -- Encryption
SSL or TLS encryption takes place at the presentation layer, Layer 6 of the OSI model. In this tip, learn why encryption is so important and how certain hacker attacks can still circumvent SSL or TLS and threaten your networks. Tip
-
OSI: Securing the Stack, Layer 4 -- Fingerprinting
At Layer 4 of the OSI model, the transport layer, a major security threat is fingerprinting. Learn how active and passive fingerprinting can endanger your network -- and what you can do to prevent fingerprinting -- in this tip, part of our "Securing ... Tip
-
OSI: Securing the Stack, Layer 3 -- The role of ICMP
Michael Gregg examines the security vulnerabilities of Internet Control Message Protocol (ICMP) and how to help secure OSI Layer 3, the network layer. Tip
-
OSI: Securing the stack, Layer 2 -- Understanding the role of ARP
Security expert Michael Gregg continues his layer-by-layer discussion of OSI model network security with this tip on the vulnerabilities present in Layer 2, the Data Link Layer, and specifically addresses the Address Resolution Protocol. Tip
-
OSI: Securing the stack, Layer 1 -- Physical security threats
Security expert Michael Gregg kicks off his layer-by-layer discussion of OSI model network security with this tip on securing Layer 1 against physical security threats. Tip
-
OSI: Securing the Stack, Layer 5 -- session hijacking
To help secure your systems against session hijacking, this tip walks you through the steps hackers use to hijack active sessions and take over your network. You'll also learn how to detect and prevent session hijacking attacks, a major security conc... Tip
-
PKI still tricky to implement, but showing up in new forms
PKI still tricky to implement, but showing up in new forms. Tip
Network Management Strategies for the CIO