CATEGORY: Network Vulnerabilities
3.4 – Network Vulnerabilities & Types of Attacks
In simple definition, vulnerability is a weakness in any security flaw which allows an attacker to attack an infrastructure and reduce the information security assurance. In the current era of technology, people and organizations use more technology in order to amplify their businesses and relationships with clients and social users. In order to do that, most […]
3.3 – DNS & DHCP Server
Domain Name Server (DNS) provides a name lookup facility that is similar to a standard telephone directory. In telephone directory, the telephone number is bound with the customer name, so whenever I want to find a phone number for a particular person, I have to find the name in the telephone directory, and by this […]
3.2 – IP Address, MAC Address & Ports
Internet Protocol Address (or IP Address) is a unique address that a computing device uses to identify itself and communicates with other devices in the Internet Protocol network. Any device connected to the IP network must have a unique IP address within its network. An IP address is analogous to a street address or telephone number […]
3.1 – Networking Devices, Topologies
Many network devices are available, but just few are very useful in networking and very important for any type of network. Some of the devices are listed below. Hub Switch Router Bridge Repeater Wireless Access point Hub Hub is a network device that is used to connect more than two computers or computing devices with […]
3.0 – Networking Types, ISO Model
A computer network is a set of computers connected together for the purpose of sharing resources. The most common resource shared today is a connection to the Internet. Other shared resources can include a printer or a file server. The Internet itself is considered a computer network. There are various types of network which are required […]






