Network Management and Security

This David Papkin page is about Network Management and Security

Attacks

Attacks are the techniques that attackers use to exploit the vulnerabilities in applications. Attacks are often confused with vulnerabilities, so please try to be sure that the attack you are describing is something that an attacker would do, rather than a weakness in an application.

OWASP Attacks

OWASP Top 10 Attacks 2021

OWASP Vulnerabilities

Authentication

TACACS+ and RADIUS Comparison

RADIUS versus TACACS+

Devices

Network Switch vs Hub- Difference & Comparison Guide

What are Repeaters in Computer Network?

STOP making this mistake with your WiFi Range Extender!

DMZ

Fortinet DMZ

DMZ in networking

Media

Optical fiber Wiki

OSI

OSI Model

Transmission Control Protocol

Understanding TCP/IP

Topologies

Network types and topologies

Transport

Differences between TCP and UDP

Using TCP and UDP Services

Vulnerabilities

A vulnerability is a hole or a weakness in the application, which can be a design flaw or an implementation bug, that allows an attacker to cause harm to the stakeholders of an application. Stakeholders include the application owner, application users, and other entities that rely on the application.

Wireless

IEEE 802.11 Wiki

Download and rename to Static-Default-Route.zip

End of David Papkin page about Network Management and Security