Recently Updated Pages
ext4
Fourth Extended File Table: an advanced Linux file system. Features: everything from ext2 and ex...
Physical Security Policy
A document that defines restricted areas within company premises, identifies which employees are ...
Implementing Switch Security
Learn what to look out for when hardening a switch.
Address Resolution Protocol
A Layer 2 protocol that enables hosts to map IP addresses to MAC addresses in their local network...
On Path Attack
A type of web server attack where the attacker intercepts comms between two devices and modifies ...
Virtual LAN
A logical network segment configured on a managed network switch. VLAN membership is configured b...
Virtual Private Network
A type of network that uses encryption to forward IP traffic over a TCP/IP network. Tunneling pr...
Internet Protocol Security
A network protocol suite used to secure data through authentication and encryption as the data tr...
Proxy Servers
A server that mediates the communications between a client and another server. Proxies often have...
P. Drippy
8========q
NAC Process
A terribly complicated four-step process that requires forethought when implementing network acce...
NAC Agents
How can devices connect to a network that has a robust access control configuration? NAC doesn't...
12.5.2 Mobile Device Management
Learn how organizations manage their mobile devices. Mobile device management is how corporate ne...
Identity Services Engine
A Cisco-owned NAC solution that uses policy-driven decision making to authenticate and authorize ...
Zero Trust Architecture
i can't trust any of you. all of you are fake. except you. i trust this one person. nobody else. ...
Simultaneous Authentication of Equals
A password-based authentication and password-authenticated key agreement method. SAE is a variant...
Windows Software Update Services
A patch management tool that allows client on a network to download software updates from an inte...
Access Control Methods
now how exactly should i go about ensuring that employee's can't see the 15 terabytes of data i'v...
User Access Control
A Windows 10 feature that requests credentials for tasks that require privilege elevation from th...
Network Federation
The notion that a network needs to be accessible to more than just a well-defined group of employ...