Home / IT Security / Security+ (page 4)

Security+

ACL: Access Control Lists

Access Control Lists

Access Control Lists: Related to permissions is the concept of the access control lists (ACL). An ACL is literally a list of who can access what resource and at what level. It can be an internal part of an operating system or application. For example, a custom application might have …

Read More »

Malicious Insider Threats

Malicious Insider Threats

Malicious Insider Threats: One of the most dangerous threats to any network is an insider who is intent on doing harm. By being an insider, they have already gotten past your first defense and they might be motivated by a desire to make someone pay for passing them over for …

Read More »

Managing Spam to Avoid Viruses

Managing Spam to Avoid Viruses

Managing Spam to Avoid Viruses: Although spam is not truly a virus or a hoax, it is one of the most annoying things with which an administrator must contend. Spam is defined as any unwanted, unsolicited email, and not only can the sheer volume of it be irritating, but it …

Read More »

How Viruses Work

How Viruses Work

How Viruses Work: A virus, in most cases, tries to accomplish one of two things: render your system inoperable or spread to other systems. Many viruses will spread to other systems given the chance and then render your system unusable. This is common with many of the newer viruses. If …

Read More »

Finding the IP address of a Website

Finding the IP address of a Website

Finding the IP Address of a Website: This exercise will show you how to obtain the information about a website by using the ping and tracert.   On a Windows system, open the command prompt and enter the following command: ping jahasoft.com   Note the IP address that is returned, …

Read More »

Hacking: Fun or Criminal Activity?

Hacking: Fun or Criminal Activity?

Hacking Fun or Criminal Activity: As stated earlier, hacking is by no means a new phenomenon; it has existed in one form or another since the 1960s. For only a portion of the time since then has hacking been viewed as a crime and a situation that needs to be …

Read More »

The Evolution and Growth of Hacking

The Evolution and Growth of Hacking

The Evolution and Growth of Hacking: As you will see that attacks and strategies have improved and evolved over the years in ways you may not be aware of. Attackers have constantly sought up their game with new tactics and strategies to include various types of malware such as worms, …

Read More »

Safety Topics

Safety Topics

Safety Topics: Security is a priority for every administrator, but it cannot be the only priority: security cannot forsake all others. One of the other priorities that CompTIA wants you to be familiar with for this exam is safety. Most of the topics that fall beneath their definition of safety …

Read More »