Comptia Security Plus | Network Traffic Analysis

Comptia Security Plus | Network Traffic Analysis

How to find out if there is unusual traffic on your computer network. Once way of seeing this traffic is by using protocol analysers. Protocol analysers are also known as network sniffers. Network sniffers could be used to check if there is fragmentation on the network or of there is flooding on the network. You could also use network sniffers to see what protocols are running on the network.

 

A good network sniffers is Wireshark. Wireshark will allow you to layer 2 and layer 3 information.

 

Unified Threat Management (UTM) is an application layer Firewall which work at all layers up to and including the application layer. This devie may offer URL Filtering, Malware protection and Spam filtering. This is known as Network Based Intrusion System. Also there may be an Network Based Preventation Systems. One good solution for Unitified Thread Management  is Checkpoint.




Kaseya Cyber Attack | Kaseya Ransomware Attack

About 200 US businesses have been hit by ransomware attack, according to a cyber-security firm.

Ransomware and The Role of Cryptocurrency

Ransomware and The Role of Cryptocurrency

Guideline for setting secure Password

Guideline for setting secure Password. Choosing the right password

Comptia Security Plus | Network Traffic Analysis

Comptia Security Plus | Network Traffic Analysis

Understanding Ransomware | Defending Against Ransomware

Understanding Ransomware and Defending Against Ransomware

Comptia Security Plus ISO Model

Comptia Security Plus ISO Model, TCTIP Model, Hybird Model

Classification of Cyber Crimes | Cyber Attacks

The cyber criminal could be internal or external to the organization facing the cyber attack

Cyber Security Structure Attacks | Unstructured Attacks

The cyber attacks can also be classified as structure attacks and unstructured attacks based on the level of maturity of the attacker

How does ARP work? | ARP Commands

How does ARP work?, ARP Command

Suggested Cyber Resilience Activity Plan

Suggested Cyber Resilience Activity Plan