General

Wireless Security Best Practices For End-Users

There are several best practices that the end user can use in order to ensure that the data in the portable devices that they use access wireless network such as mobile phones, iPads, tables and laptops are secure. This portable devices access network through hot spot connections. Some of the best practices include: the deployment […]

General

Spanning Tree Protocol (STP)

Introduction             Spanning Tree Protocol (STP) is described as a Layer 2 link management protocol which provides path redundancy while preventing loops in the network. In order for a Layer 2 Ethernet network to function effectively, there must be only one active path existing between any two stations (Balchunas, 2014). Many active paths at the

General

Radio Frequency Identification (RFID)

RFID technology is described as an automatic identification technology which is a non-contact using radio signals to detect, sort, track and identify different objects such as goods, vehicles, people as well as assets that do not need direct line of sight contacts such as bar code or those which does not need direct contact such

General

Trunking – Information Technology

Trunk is a computer terminology that is used to describe the communication line conveying multiple signal simultaneously thus facilitating the network access between two points. In simple terms trunk facilitate a connection in the switching center in a communication system (Garimella, et al., 2007). The signal that which is convey can be any type of

General

Change Management at Nokia Inc

The changing customer preferences, increased competition, changes in technology and the impact of economic downturn had made change an inevitable process for organization (Cameron & Green, 2015). When organizations respond to consumer needs, it may require redesigning of product attributes, which may need change in production systems. Similarly, increased competition and new innovations can lead

General

Daytime Robberies Investigative Plan

An investigative plan is important in ensuring that the investigation is focused, stays on track and effectively utilizes the available resources (Bruce, Hick, & Cooper, 2004). The following investigative plan will look at how to deal with multiple daytime robberies in City X by identifying and describing the investigative steps to take, the technological assistance

General

Catcher in the Rye – Holden’s State of Mind

In the article “The C world in the Hallways,” Ann Quindlen elaborates that adolescent murder is awful; however, it can be avoided. Quindlen substantiates her claim by providing comprehensive details and definite statistics. The author aims to pass the message about murder so that many parents would understand what their children go through at school.

General

Ways of Securing Personal Information when Surfing the Web and Transferring Data Online

There are several methods that can be used to secure personal information when surfing the Web and transferring online. Some of the methods include securing internal network and cloud services, developing strong password policies, securing and encrypting Wi-Fi, encrypting sensitive personal data, regularly updating all applications, setting a safe web browsing rules, securing remote access

General

Secure Overlays, Self-certifying Addresses and Spoofed Packet

Denial of service attack can be defended using different defense mechanism at various locations in the network (Abliz, 2011). The defense mechanism is aimed at preventing the attack from causing damage on the network. The most common defense mechanism include secure overlays, self-certifying addresses and spoofed packet. Read also Network Security and Modern Day Computer

Scroll to Top