I would like to know the framework for different network-based security information systems. Any help would be much appreciated.
Answer Question | April 22, 2013 5:55 AM
Network security, Networking
Hello, I am currently a student at the University of Advancing Technology and I am learning about security implementation frameworks this week. I was looking into a framework named Security Knowledge in Practice (SKiP) and I noticed some things about the framework and I wonder if anyone who has implemented it would agree. The Good: [...]
Answer Question | April 17, 2013 5:27 AM
Network security, Security, security framework, SKiP
We have 40 systems in the network all in domain with symantec virus protection installed and updated. from last five days we are facing problem in all systems, one by one all systems data was lost. some thing lost in systmes some where PST file lost some where D Drive data some where all drive [...]
Answer Question | June 16, 2012 6:21 AM
Hi, Please i need someone to tell me what are Non Routable Networks and what are examples? Are there any security risks involved in having them? How Can we mitigate those risks and if there are tools we can use, what are the examples? Thankyou so much.
Answer Question | October 12, 2011 7:28 PM
Network administration, Network routing, Network security, Networking
How can I recover my network password?
Answer Question | March 31, 2012 3:25 AM
Network Password, Network security, Network Security Management, Password recovery
I need a book about network and security… can you recommend a good book where I can read about the network and security … And much like another book too, which I can use as ITSupport. It may very well be a new book (year) …
Answer Question | March 31, 2012 9:23 PM
IT Books, Network management, Network security, Network Security Management
How can we force all users to change their passwords following a network breach? Windows Server 2008 AD.
Answer Question | March 31, 2012 8:54 PM
Active Directory, Network security, Windows Server 2008, Windows Server 2008 Active Directory
hey, I want to create standard acl to allow all network to flow from 172.16.10.0 0.0.0.255 to 172.16.20.0 0.0.0.255 and 172.16.30.0 0.0.0.255 but i don’t want network to flow from 172.16.20.0 0.0.0.255 to 172.16.30.0 0.0.0.255 and vice versa, so I created the following acl, access-list standard 10 permit 172.16.10.0 0.0.0.255 access-list standard 10 deny any. [...]
Answer Question | March 31, 2012 11:15 AM
Access Control List, ACL, ACL Manager, Cisco 2960, Cisco 7206, Network security
How can we create ACLs on the network to block out users from attempting to connect to HR file shares?
Answer Question | July 27, 2011 5:28 PM
Access Control List, ACL, ACL Manager, File Share Permissions, File Shares, Network security, Network Security Management
How can we automatically detect rogue DHCP servers like a user bringing in a wireless router from home and connecting it to our network?
Answer Question | March 31, 2012 3:30 PM
DHCP, DHCP server, DHCP Server Configuration, Network security, Wireless routers
How can the network settings be locked down even to local administrators. We track users based on IP and we don’t want to compromise our results or skew them with people monkeying around.
Answer Question | March 31, 2012 3:29 PM
IP address, Local Administrator Rights, Local Administrators Group, Network security, Network Security Management
Can we ban an IP address from connecting to our network by adding it to a block list in Windows Firewalls? Can that propagate to all systems?
Answer Question | October 31, 2011 8:10 PM
Firewalls, IP address, IP blocking, Network security, Windows firewall
Is it possible to block Google Talk chat and not block other chat applications from the network using a Sonicwall firewall?
Answer Question | October 31, 2011 7:52 PM
Firewalls, Google Talk, Network Policies, Network security, SonicWALL
How can I block CDRW/DVDRW and USB drives from being used in our Windows XP machines across the entire network?
Answer Question | October 14, 2011 7:37 PM
Network security, Network Security Management, Network Security Policies, USB port security, USB security, Windows XP
If I have a NAS device connected to my network can everyone access it? Is there security?
Answer Question | May 26, 2011 6:43 PM
NAS, NAS (network attached storage), NAS devices, Network security, Networking
How can I prevent all instant messaging clients on my network while still allowing our proprietary im/email system to function? We are using a sonicwall and barracuda web filter 300.
Answer Question | September 5, 2011 6:51 PM
Barracuda, Barracuda 300, Instant Messaging, Network security, Networking, SonicWALL, Web filtering
Hi, I could really use some help securing my systems. I have been having some problems with deployment functionality being used to effectively supercede the BUILTIN Administrator accounts in my systems, limiting it’s privileges substantially. About 9 weeks ago, I noticed my Permissions were being taken away whilst logged in as Administrator, and I [...]
Answer Question | October 23, 2011 3:55 AM
Microsoft Security, Network security, Networking, Windows 7, Windows 7 deployment
Can I push out Microsoft Security Essentials to an entire network? How can this be achieved easily and quickly?
Answer Question | April 13, 2011 4:35 PM
Microsoft Security, Microsoft Security Essentials, Network security, Network Security Management
Am looking at implemeting Cyberoam 15i a unified threat management equipment for a small enterprise instead of Microsoft Forefront please i want to know if cyberoam is a good security solution. Thanks
Answer Question | March 1, 2011 5:35 PM
Cyberoam, Microsoft Forefront, Network security, Network Security Management
Hello, I am a student in the Network Security program at the University of Advancing Technology and just read “Plan, Do, Check, Act”. The URL is below. https://buildsecurityin.us-cert.gov/bsi/articles/best-practices/deployment/574-BSI.html Years ago everything was stored in the data center and protected by firewalls, routers, DMZs, IDS/IPS solutions, etc. Recently the “cloud” has become very popular and SaaS [...]
Answer Question | February 28, 2011 1:16 AM
Network security, Network Security Management, Open IT Forum, Security