Secure-IT Knowledge Base
Basic Terminology
The OSI Model
The TCP/IP Model
Common Ports
Ports and Protocols
Troubleshooting
Call Center
Social Engineering
Network Threats
Malware Types
IPconfig Commands
CIDR Notation
Setting up Email
Welcome!
We should have what you are looking for. If not, email us...
These are some of the first words you will need to know when learning about networking. They will come up often. You should memorize them. Most people already already know these terms as common sense. If You are unfamiliar with any of them now would be a good time to learn about them. Click here >> to read more.
The Open Systems Interconnection (OSI) model is a theoretical way to classify and explain the complex process of sending data on a network. The OSI model is the most widely used method for network communications. Remember that it is only a theoretical model that defines standards for programmers and network administrators. It is not a model of actual physical layers.
The Internet protocol suite, commonly known as TCP/IP, is the set of communication protocols used in the Internet and similar computer networks. The current foundational protocols in the suite are the Transmission Control Protocol and the Internet Protocol, as well as the User Datagram Protocol. Click Here >> to read more.
Network ports are logical connections provided by the Transmission Control Protocol (TCP) or User Datagram Protocol (UDP) protocols at the Transport layer. They are used by protocols in the upper layers of the Open Systems Interconnection (OSI) model. Click Here >> to read more.
The TCP/IP (frequently referred to as the internet protocol suite) is the most widely used protocol suite. It was developed to work independently of the physical network architecture. You can use a wide variety of architectures with the TCP/IP protocol suite. Click Here >> to read more.
Good troubleshooting behaviors combine experience and knowledge with a logical and organized approach. Using the following process will not only lead you to the source of the problem, but it may also reduce the time it takes to repair the issues within the network.
These are some of the first questions you should ask when you first pick up the phone call. They can help you try to determine the root cause of the issue. Getting to the source of the issue can be difficult if you do not ask the right questions. Sometimes the caller will tell you the symptoms of the problems not the cause. Click here >> to read more.
Social engineering is an attack that exploits human nature by convincing someone to disclose information or perform an activity. There are two forms of social engineering.
-
Passive social engineering takes advantage of the unintentional actions of others to gather information or gain access to a secure facility.
-
Active social engineering involves direct interaction with users, asking them to disclose information or take action. Attackers use the following active social engineering methods:
-
Assuming a position of authority (boss or network administrator)
-
Bribery
-
Forgery
-
Flattery
-
A disguise
-
A critical timeframe on an action
-
What Is a Network Attack?
A network attack is an attempt to gain unauthorized access to an organization’s network, with the objective of stealing data or perform other malicious activity. There are two main types of network attacks:
Passive: Attackers gain access to a network and can monitor or steal sensitive information, but without making any change to the data, leaving it intact.
Active: Attackers not only gain unauthorized access but also modify data, either deleting, encrypting or otherwise harming it.
What Is a Malware?
-
Malware is intrusive software that is designed to damage and destroy computers and computer systems. Malware is a contraction for “malicious software.” Examples of common malware includes viruses, worms, Trojan viruses, spyware, adware, and ransomware.
-
Malware can infect networks and devices and is designed to harm those devices, networks and/or their users in some way.
-
Depending on the type of malware and its goal, this harm may present itself differently to the user or endpoint. In some cases, the effect malware has is relatively mild and benign, and in others, it can be disastrous.
-
No matter the method, all types of malware are designed to exploit devices at the expense of the user and to the benefit of the hacker -- the person who has designed and/or deployed the malware.
What is ipconfig function?
Internet Protocol Configuration (ipconfig) is a Windows console application that has the ability to gather all data regarding current Transmission Control Protocol/Internet Protocol (TCP/IP) configuration values and then display this data on a screen. Ipconfig also refreshes the Domain Name System (DNS) and Dynamic Host Configuration Protocol (DHCP) settings each time it is invoked. When invoked without additional parameters, ipconfig simply displays the IP address, default gateway and subnet mask for all available adapters
Classless inter-domain routing (CIDR) is a set of Internet protocol (IP) standards that is used to create unique identifiers for networks and individual devices. The IP addresses allow particular information packets to be sent to specific computers. Shortly after the introduction of CIDR, technicians found it difficult to track and label IP addresses, so a notation system was developed to make the process more efficient and standardized. That system is known as CIDR notation.