Year: 2019

Cyber Security September 12, 2019

Common Threats to End Users and Internet Services

Innovators and visionaries are two types of cybersecurity experts. These experts build different cyber domains of the Internet. They have the capability to find the power of data and bind it. They provide cybersecurity services and build special organizations for these services. These organizations provide protection services to people from cyber attacks. These professionals must...
Asad Ijaz Read More
Cyber Security September 12, 2019

Thwarting Cybercriminals – Exclusive Explanation

Thwarting cybercriminals is not an easy task. However, companies, governments, and organizations have started to take parallel action to limit and discourage cybercriminals. The following are actions thwarting cybercriminals. The following are the measures for thwarting cybercriminals and a brief explanation of each. Vulnerability Database The National Common Vulnerabilities and Exposure (CVE) was developed as...
Asad Ijaz Read More
Cyber Security September 12, 2019

Who Are Cybercriminals?

The typical cybercriminals in the cyber world in the early days were youngsters or hobbyists. Their attacks were generally limited to pranks and vandalism. But now, cybercriminals have become very dangerous. The attackers are individuals or groups. They try to make use of the vulnerabilities for their mission. These criminals are interested in credit cards,...
Asad Ijaz Read More
Cyber Security September 12, 2019

Types of Vulnerabilities to Network- Exclusive Explanation

Weaknesses of the network which is intrinsic in every network and its device which included routers, switches, servers, desktops and even security devices e.g. firewall etc. Usually, the endpoints, such as servers and desktop computers, are under attack. Defending the privacy of information, securing from unauthorized access and shielding the network against attacks is the...
Asad Ijaz Read More
Cyber Security September 12, 2019

Cyber Security Threats and Defense

Security Threats to network are an emergent problem for the individual as well as organizations in the whole world, and the security threats become worse and multiply day by day. Computer networks are necessary for everyday activities and both Individuals and organizations depend on their computers and networks. Intrusion to these computers by an illegal...
Asad Ijaz Read More
CCNA September 11, 2019

How to Configure Standard ACL to Secure a VTY Port

All Cisco routers and switches cannot be accessed remotely via a terminal program like PuTTy and Tera Term by default. There are two methods of remote connectivity, either vty connection or SSH connection. The SSH provides encrypted connectivity, and Cisco recommends it for remote administration. But, if your router’s Cisco IOS does not support SSH,...
Asad Ijaz Read More
CCNA September 10, 2019

ACL Statistics – Exclusive Explanation

After ACL has configured and applied to an interface and block some traffic then we can check the ACL statistics using the show access-lists command. The command will show ACL statistics for each statement that has been matched. The figure below illustrates some configured ACL statistics. Examine that some match has been found. So when traffic is...
Asad Ijaz Read More
An illustration of a person working on a laptop with a screen displaying commands for editing standard ACLs, titled "How to Edit Standard ACLs."
CCNA September 10, 2019

How to Edit Standard ACLs

Network administrators sometimes want to edit standard ACLs. As you know, each new entry you add to the Access Control List (ACL) appears at the bottom of the list, and the router assigns a sequence number to that entry automatically. Standard ACL statements are added to running-config files, but there is no built-in way to...
Asad Ijaz Read More
Diagram illustrating standard ACL configuration with a router blocking traffic from host 192.168.2.2 to network 192.168.4.0/24.
CCNA September 9, 2019

How to Configure standard ACLs

Standard ACLs permit or deny traffic based on source addresses. They differentiate routes on a network using the IP address. The port and destination of the packet are not evaluated. Standard ACLs only contain a list of addresses or address ranges and a statement as to whether access to or from that address is permitted...
Asad Ijaz Read More
Diagram of TCP three-way handshake process showing SYN, SYN-ACK, and ACK exchanges between two hosts for connection establishment.
CCNA September 2, 2019

Understanding TCP Three-Way Handshake: A Comprehensive Guide (Updated 2025)

In networking, the TCP three-way handshake (often called a “TCP conversation”) establishes reliable connections, which is crucial for Access Control Lists (ACLs) to filter traffic effectively. ACLs manage inbound and outbound traffic based on IP addresses, ports, and TCP flags. This article explains TCP fundamentals before diving into ACL integration, helping CCNA students grasp transport...
Asad Ijaz Read More
Forum