Tablet Tablet computer, or tablet PC is a mobile computing device designed to be held in one or two hands. It is approximately the size of a hardcover book (seven inches or bigger), and resembles a large smartphone. Tablets let you do many of the same things as a traditional computer. They can browse the… Read more »
Monthly Archives:: June 2020
Passively Test Security Controls
Security+ Objectives 1.5 The passive approach uses devices to watch the traffic as it passes by. These devices can be special purpose devices such as a Sniffer or they can be built into other devices such as routers, switches or end node hosts. Administrators can scan specific systems or an entire network. For example, many… Read more »
Penetration Testing Vs Vulnerability Scanning
Security+ Objectives 1.4 Penetration Testing & Vulnerability Scanning, What’s the Difference? What is Penetration Testing? Penetration testing is a way to “stress test” your IT infrastructure security. Penetration techniques are used to evaluate the safety and security of the network in a controlled manner. Operating systems, services, applications, and even the behavior of the end… Read more »