Security issues associated with the cloud

Cloud computing and storage solutions provide users and enterprises with various capabilities to store and process their data in third-party data centers. Organizations use the Cloud in a variety of different service models (SaaS, PaaS, and IaaS) and deployment models (Private, Public, Hybrid, and Community). There are a number of security concerns associated with cloud computing. These issues fall into two…

Cloud computing

Cloud Computing is a kind of Internet-based computing that provides shared processing resources and data to computers and other devices on demand. It is a model for enabling ubiquitous, on-demand access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications and services), which can be rapidly provisioned and released with minimal management…

ISDN – What is the ISDN?

Integrated Services Digital Network is a telephone system network. It is a wide area network becoming widely available. Prior to the ISDN, the phone system was viewed as a way to transport voice, with some special services available for data. The key feature of the ISDN is that it integrates speech and data on the…

Virtual Private Network (VPN)

A VPN is a private connection between two machines or networks over a shared or public network. VPN technology lets an organization securely extend its network services over the Internet to remote users, branch offices, and partner companies. VPN turn the Internet into a simulated private WAN.

Basic Requirements of Network Security

The main objective of the network is to share information among its users situated locally or remotely. Therefore, it is possible that undesired user can hack the network and can prove to be harmful for the health of the network or user. There are few basic points which must be followed by network administrator to…

What is Network security?

Network security is a broad topic with multi layered approach. It can be addressed at the data link layer, network layer and application layer. The issues concerned are: packet intrusion and encryption, IP packets and routing tables with their update version, and host-level bugs occurred at data link layer, network layer and application, respectively. The TCP/IP protocols…

What’s VOIP?

VOIP is “Voice over Internet Protocol”. It is a general term for a family of transmission technologies for delivery of voice communications over IP networks such as the Internet or other packet-switched networks. VOIP can be a benefit for reducing communication and infrastructure costs. In another way, it is very easy to use VOIP to…

VLAN Design Strategies – One-VLAN-per-Switch

Disclaimer This post only discusses end-user switch VLAN’s, not core infrastructure VLAN’s, and not management VLAN’s.  We have special VLAN’s assigned based on jack physical-location/data-sensitivity security assessments, but those are also outside the scope of this post.   I am also not recommending the one-VLAN-per-switch design  as a best practice for Cisco switches, just sharing with…

Design Best Practices for VLANs (3.3.2)

Because VLANs are a common security target, designing VLANs with security in mind is being proactive. Here are some best practices to use before you create the first VLAN on a switch. VLAN Design Guidelines (3.3.2.1) Cisco switches have a factory configuration in which default VLANs are preconfigured to support various media and protocol types….

Dynamic IP Addresses and DHCP

IP addresses may be static or dynamic. Static means that the address assigned to a machine generally does not change. Dynamic means that an IP address is assigned to a computer on demand, for a fixed lease period.  The computer may be assigned a different address each time it demands one. Dynamic addresses are acceptable…

How to Enable Readability Statistics-MS Word 2013

Enabling the display of readability statistics after a spelling and grammar check can help you improve your writing for your target audience. Note: – All of the How To procedures for this lesson are available as checklists from the Checklist tile on the LogicalCHOSE Course screen. Enable Readability Statistics To enable the display of readability statistics:…