Category: Network Vulnerabilities

3.4 – Network Vulnerabilities & Types of Attacks

In simple definition, vulnerability is a weakness in any security flaw which allows an attacker to attack an infrastructure and reduce the information security assurance. In the current era of technology, people and organizations use more technology in order to amplify…
3.3 – DNS & DHCP Server

Domain Name Server (DNS) provides a name lookup facility that is similar to a standard telephone directory. In telephone directory, the telephone number is bound with the customer name, so whenever I want to find a phone number for a…
3.2 – IP Address, MAC Address & Ports

Internet Protocol Address (or IP Address) is a unique address that a computing device uses to identify itself and communicates with other devices in the Internet Protocol network. Any device connected to the IP network must have a unique IP address…
3.1 – Networking Devices, Topologies

Many network devices are available, but just few are very useful in networking and very important for any type of network. Some of the devices are listed below.  Hub  Switch  Router  Bridge  Repeater  Wireless Access point Hub Hub is a…
3.0 – Networking Types, ISO Model

A computer network is a set of computers connected together for the purpose of sharing resources. The most common resource shared today is a connection to the Internet. Other shared resources can include a printer or a file server. The Internet…