Network Security
Home > 
Network Security
< back
Result: Item(s)
Internet Content Filtering
Some websites contain indecent or obscene content and are clearly not suitable for children and young persons. There are software tools available that can help filter out websites that are not suitable for children, monitor your children's online activities, and limit the amount of time your child spends online.
Protecting Children from Online Threats
When children go online, they face new dangers and need more protection. Examples of the risks are: privacy of software and music, disclosure of personal information, spyware, illegal downloads, spam emails and so on.
Securing Web Application
Web applications can provide convenience and efficiency, there are also a number of new security threats, which could potentially pose significant risks to an organisation's information technology infrastructure if not handled properly.
Patch Management
As more and more software vulnerabilities are discovered and therefore need updates and patches, it is essential that system administrators manage the patching process in a systematic and controlled way. Successful patch management requires a robust and systematic process.
Protecting Your Website
If you have an e-commerce website, you face the following risks
VPN Security
Virutal Private Network (VPN) security is an increasing demand nowadays to connect to internal networks from distant locations. Employees often need to connect to internal private networks over the Internet (which is by nature insecure) from home, hotels, airports or from other external networks.
Preventing Data Theft
At any time of day or night, a huge amount of data is being stored, retrieved and transferred in the average company or organisation. As a responsible user, you must know how to protect your data and prevent data theft from mobile devices.
Securing Company Network
The office network provides the core services to the company. Everyone utilises this shared medium to do productive work, including file sharing, printing, emailing and web browsing.
Defending against DDoS Attack
DDoS attack attempts to consume both network bandwidth and server resources of the targeted organisation. Large scale DDoS attack is often performed by botnets which can co-opt numerous infected computers, which usually spreading across different points around the world, to unwittingly participate in the attack.
Wireless Network Security
Low deployment costs make wireless networks attractive to both organisations and end users. However, the easy availability of inexpensive equipment also gives attackers the tools to launch attacks on the network. New security risks come with the benefits of adopting wireless networks.
IPv6 Security
IPv6 is the next generation of Internet protocol standard that is going to replace IPv4, the current standard of the Internet but is exhausting with its available address space.
Security of DNS
DNS has no built-in security feature and DNS data could be tampered. If the DNS response is tampered, a user might be redirected to a malicious website. To protect from falling victim to DNS threats, measures at different levels could be adopted.
Deploying of Corporate Wireless Network
To help organisations understand at what point in their wireless network deployments a recommended security best practice might be relevant, we outline here a five-phase lifecycle model for network deployment and point out security issues that need special attention.
Surfing the Web and e-Shopping
All kinds of things can now be done online, from shopping, banking to studying and research.
Playing Online Games Safely
Many computer and console video games can be played online against other players over the Internet. Players are allowed to communicate sometimes using text messages typed into the computer and sometimes using a microphone.
Securing Your Wireless Network
Before you make connection to the wireless Network, it is important to make sure that your device is being logically protected. A mobile device can connect to your wireless network wherever it is within range of the signal strength from your wireless router.
Tips on Using Public Wi-Fi
Free Wi-Fi facilities are available at various local and overseas public areas such as shopping malls, coffee shops, hotels, airports or government premises. Users should pay attention to the security risks when using Wi-Fi services.
Installing and Enabling Firewall
A firewall is a tool that can either be hardware or software. Its purpose is to protect computers against threats from intruders breaking into your computer or network via the Internet.
Security of Remote Working
Below are some tips for all parties including organisations and individuals to maintain a safe and secure remote working or learning environment.
Cyber Threats on DNS Servers
DNS-based attacks are becoming highly sophisticated and volumetric. Attackers are increasingly adopting multifaceted techniques to exploit different DNS components.
DoS / DDoS Attacks
Denial of service (DoS) and distributed denial of service (DDoS) attacks are among the most common cyber threats on the Internet.