Home / Computer

Computer

Types of Cybersecurity Threats

Types of Cybersecurity Threats

Threats to cybersecurity originate from three sources: (1) local threats, (2) national threats, and (3) international threats. According to the Department of Homeland Security (DHS), a cyberthreat “refers to persons who attempt unauthorized access to a control system device and/or network using a data communications pathway.” Cyber threats originate mainly from …

Read More »

What Is A Computer Worm & How Does It Work?

What Is A Computer Worm, And How Does It Work?

A computer worm “is a self-replicating virus that does not alter files but resides in active memory and duplicates itself.” Worms live and replicate within the operating system that is invisible to the computer user. Users typically encounter the worms when their computer starts to slow down substantially due to the …

Read More »

What is Cyberbullying? Types & Examples

What is Cyberbullying? Types & Examples

Cyberbullying is defined as “intentional, aggressive behavior toward another person that is performed through electronic means (i.e., computers, cell phones, PDAs).”  Cyberbullying, similar to traditional bullying, takes place within a larger group or community. Often, students are victimized in front of their entire class or school. Cyberbullying has similar negative …

Read More »

What Is Encryption & How Does It Work?

What Is Encryption & How Does It Work

Encryption is the obfuscation that is fast when you know the secret but very slow when you don’t. Encryption of data is still the most effective way to protect it from being stolen. It is also called cryptography. Even though the NSA has the capability to crack encrypted data, it is …

Read More »

What is a Computer Virus? Types & Risks

What is a Computer Virus? Types & Risks

A virus is a “small software program designed to spread from one computer to another and to interfere with computer operation.” A virus is a code that will duplicate itself into a host program when it is activated. Every company has at least one employee who will click on anything and …

Read More »

Secure Remote Access and Network Protection

Secure Remote Access and Network Protection

Introduction This lesson will cover remote access and how to better secure data transmissions. Remote access methods describe how a client connects to the local area network (LAN) remotely. In order for the client to access the LAN, they have to be authenticated through a remote access server. Network protection …

Read More »

IP Address Management & Subnetting- CompTIA Network+

IP Address Management & Subnetting- CompTIA Network+

Introduction This lesson will cover IP address management and a topic everybody loves, subnetting. There will be information in this lesson that will help identify network and host portions of an IP address. Lastly, this lesson will explain how to calculate the number of host and subnets needed on a …

Read More »

How to Install and Configure Routers and Switches

How to Install and Configure Routers and Switches

Introduction In this lesson you will learn about aspects of routing and switching when configuring a network. The options and features discussed provide for effective management of a local area network (LAN). Lesson Objectives By the end of this lesson, you will be able to: Identifying the steps involved with …

Read More »

Wireless Security Vulnerabilities and Mitigation

Wireless Security Vulnerabilities and Mitigations

Wireless Security and Vulnerabilities There are several encryption protocols that are used to protect network access: Wired Equivalency Privacy (WEP), WI – FI Protected Access (WPA), and Wireless Protected Access 2 (WPA2). 1. Wired Equivalency Privacy (WEP) is an encryption protocol the uses a 64 0r 128 bit encryption key …

Read More »

Wide Area Network (WAN) Technologies- CompTIA Network+

Wide Area Network (WAN) Technologies- CompTIA Network+

Introduction In this lesson you will learn about Wide-Area Network (WAN) technology, digital vs. analog signal transmission, circuit-switched and packet-switched networks. You will also be introduced to multiprotocol label switching and its application in a networked environment. Lesson Objectives By the end of this lesson, you will be able to: …

Read More »

What is Network Security- CompTIA Network+

What is Network Security- CompTIA Network+

Introduction In this lesson you will learn about how to secure networks from unauthorized individuals. Several different methods for achieving security will be discussed. A network administrator should be concerned whether or not the “right” people have access to the network. Lesson Objectives By the end of this lesson, you …

Read More »

Host to Host Communication- CompTIA Network+

Host to Host Communication- CompTIA Network+

Introduction This article will introduce how computers and other hosts communicate internally and externally. A discussion of how data travels from the host, to the media will introduce dependent topics which should give an in-depth view of host communication. Lesson Objectives By the end of this lesson, you will be …

Read More »

Network Cable Types and Connectors

Network Cable Types and Connectors

Introduction This lesson will examine the different media types, standards, and wire distributions involved in a networked environment. Lesson Objectives By the end of this lesson, you will be able to: Categorize standard media types and connectors. Identify components of wiring distribution. Compare and contrast different Local Area Network (LAN) …

Read More »

Network Security Firewall- CompTIA Network+

Network Security Firewall- CompTIA Network+

Firewalls are responsible for either “blocking” or “allowing” data traffic to an internal network. By default, firewalls use what is called “implicit deny;” until a network administrator explicitly allows a certain type of traffic, it is blocked. The data traffic that a network administrator blocks or allows is part of …

Read More »

What is Network Management?

What is Network Management?

Introduction In this lesson you will be introduced to tools and software used to manage a network. Often a need will arise to identify when a cable goes bad or a router/switch is not functioning as it should. A network administrator will use these tools and software to determine where …

Read More »