Skip to content

Asad Ijaz

Hey there, I'm Asad Ijaz Khattak, and I'm not your typical writer and blogger – I'm the voice behind the scenes at the renowned website, "networkustad.com." When it comes to the digital realm, I'm all about technology, networking, and cybersecurity. Picture this: I'm not just someone who writes about tech; I'm a certified expert in the field. I proudly hold the titles of Cisco Certified Network Professional (CCNP) and Cisco Certified Network Associate (CCNA). So, when I talk about networking, I'm not just whistling in the dark; I know my stuff! My website is like a treasure trove of knowledge. You'll find a plethora of articles and tutorials covering a wide range of topics related to networking and cybersecurity. It's not just a website; it's a learning hub for anyone who's eager to dive into the world of bits, bytes, and secure connections. And here's a fun fact: I'm not a lone wolf in this journey. I'm a proud member and Editor of Team NetworkUstad. Together, we're on a mission to empower people with the knowledge they need to navigate the digital landscape safely and effectively. So, if you're ready to embark on a tech-savvy adventure, stick around with me, Asad Ijaz Khattak. We're going to unravel the mysteries of technology, one article at a time!"

7 Comments

  1. Zaber
    June 24, 2020 @ 7:23 am

    Hey,
    What do you mean physical security threats.
    Please tell me.

    Reply

    • Shahab Ali
      June 24, 2020 @ 4:47 pm

      Your question’s answers are included in the post. Any dangerous to the hardware is physical security threats. For example any threat for damaging network devices e.g switches, routers and servers. The threat may be from the employees of the organization, from electricity, poor handling of equipment and an environmental threat for example if someone cannot maintain the temperature of the equipment, So any dangerous to the hardware of the network is called physical security threat in cybersecurity.

      Reply

  2. Adeel Khan
    August 22, 2020 @ 11:13 pm

    I really could not agree more with password argument. I have seen grown men with passwords such “Saturday” . Very informative blog. Thanks for the great read!

    Reply

  3. Surge Engineering
    November 14, 2020 @ 7:47 pm

    Thanks for the reminder and for sharing such a definitive article about cybersecurity!

    Reply

  4. Elly Camron
    January 25, 2021 @ 8:35 am

    Thanks for sharing

    Reply

  5. Top 5 Cyber Security Threats | Assistance
    April 4, 2021 @ 2:27 pm

    […] the cybersecurity world, you have several terms, like security event, security threat and security incident, all of […]

    Reply

  6. 10 eCommerce Security Solutions to Protect Your Website » NetworkUstad
    May 31, 2021 @ 5:42 pm

    […] for ways to outwit you and gain a backdoor to your website, it’s important to note that most cyberattacks happen due to human error. Therefore, it would help if you equipped your staff with necessary tips […]

    Reply

Leave a Reply