WhileNetworking

  • Home
  • CCNA
  • Cisco Packet Tracer Download
    • Cisco packet tracer 6.3
    • cisco packet tracer 6.2
    • Cisco Packet Tracer 7
  • Linux Server Management
  • About Us
  • Privacy Policy
  • Contact Us
 

Access control models – what you need to know

Operation manipulate includes standard over accession to the fabric resources, assemblage method resources, and accumulation. It is crucial for an organisation to compel the straitlaced way controls to protect the system’s resources and accumulation. A security psychiatrist should interpret the contrasting first models for implementing gain controls in dictate to alter understand how attackers can […]

July 14, 2018 More
 

Analyze vulnerability

A vulnerability is a imperfection in software or element, at small in the discourse of content certificate, and it is matched with an use as the capital to study that danger to both end. It is the historic job of an methodicalness’s safeguard squad to maintain up to stamp with the stylish section vulnerabilities that […]

July 14, 2018 More

Threat analysis in networking

Risk is a work of the odds of a conferred threat source’s effort a item potency vulnerability, and the resulting scrap of that untoward event on the organization. Managing danger is a mazy, varied reflexion that requires the curiosity of the full methodicalness. A threat source is an spirit and method that is targeted at […]

July 14, 2018 More
 

Know about Personally Identifiable Information (PII)

PII, as used in U.S. secrecy law and accumulation surety, is info that can be used on its own, or with else content, to discover, communication, or locate a singular someone, or to discover an someone in context. Office SP 800-122(4) defines PII as “any content almost an single that is preserved by an implementation, […]

July 14, 2018 More
 

Basic of information security

Information security-sometimes referred to as InfoSec-is defined as the assets of assemblage and info systems from unlicensed attain, use, revealing, disturbance, change, or ending in magnitude to offer confidentiality, integrity, and availability. Information surety does not delimitate any particular safeguard engineering, but kinda a strategy that is nerveless of the grouping, processes, policies, and tools […]

July 14, 2018 More
Older postsNewer posts
Find Us on Facebook
Choose a category !!
  • CCNA
  • Cisco Certification Exam
  • cisco packet tracer 6.2
  • Cisco packet tracer 6.3
  • Cisco Packet Tracer 7
  • Cisco Packet Tracer 7.1
  • Cisco Packet Tracer 7.2.1
  • Cisco Packet Tracer 7.3
  • Cyber Security
  • Engineering Ebooks
  • Excel
  • IELTS Ebook
  • Internet
  • Know computer
  • Know your computer
  • Laser Processing of Material
  • Linux installation and server management
  • PDF
  • Technology
  • Uncategorized
Top posts
  • How to change Cisco packet tracer default language?
  • Standard tcp ip port & important port numbers
  • Free download Principles of Electronics by VK Mehta
Archieves
Get latest updates by Email

Enter your email address to subscribe to this blog and receive notifications of new posts by email.

Join 19 other subscribers
W
SC
wordpress counter
Analytics
Recent Comments
    Browse by categories
    Cyber SecurityLinux installation and server managementCCNAKnow your computerKnow computerCisco Packet Tracer 7UncategorizedCisco Certification ExamInternetPDFCisco Packet Tracer 7.3Engineering EbooksCisco packet tracer 6.3cisco packet tracer 6.2Cisco Packet Tracer 7.1TechnologyExcelLaser Processing of MaterialCisco Packet Tracer 7.2.1IELTS Ebook
    Feel free to contact with us

    Hi, any kind of comment or suggestion is valuable to us. So feel free to contact with us.

    Email: himadri.shekhar.bd@gmail.com

    Name: WhileNetworking.com

    2021 © WhileNetworking