1.4 - Network Security
1.4.2 - Identifying and Preventing Vulnerabilities

In the previous section, 1.4.1 - Threats to Computer Systems and Networks, we looked at a fairly comprehensive rundown of the most common and prevalent attacks that exist to compromise system security, steal data and gain access to computers. This section focuses more on preventative measures - how can we ensure that computer systems are […]

Read more
1.4 - Network Security
1.4.1 - Threats to Computer Systems and Networks

As the number of network connected devices increases, so does the proportion of poorly designed and insecure devices. Many people do not understand the significance of poor security, whether that is in devices they own or their own personal security such as selecting weak passwords that are easy to guess or compromise. Any device which […]

Read more