Computer Networking
We have been supporting tens of computer networks and businesses during decades of experience in computer networking realm. Our clients range from variety of business sectors, Medical offices, College camps, Factories, Small business and retail stores to enterprise businesses like car rentals and hospitals.
Computer Networking Solutions
ITperfection offers wide variety of solutions for your networking needs, if you have a small business, or your company has several sites and branch offices, covering thousands of client computers; we can help you with your networking needs.
Certifications
We are certified IT professionals with a wide variety of certifications from industry standard companies like, Microsoft, Cisco and …
ITPerfection Blog
Here you can find a wide variety of blogs relating to Computer Networking, IT security, IT Training, Cyber security, Backup and Disaster recovery, Data protection and ….
Trusted Platform Module (TPM)
TPM stands for trusted platform module. TPM also called is ISO/IEC 11889. TPM is an international standard for a secure cryptoprocessor, a dedicated microcontroller designed to secure hardware through integrated cryptographic keys. A TPM is actually a microchip on the motherboard of most servers and even today's clients. The main function of TPM is to protect security-related data. This chip provides hardware-based authentication and tamper detection, so an attacker [...]
IPsec Protocol
Internet Protocol Security (IPsec) is a secure network protocol suite that authenticates and encrypts the packets of data to provide secure encrypted communication between two computers/networks. IPsec is usually used to set up VPNs, and it works by encrypting IP packets, along with authenticating the source where the packets come from. Read more about encryption here. In fact, IPsec describes the framework for providing security at the IP layer, [...]
TOR Project
We recently had a post about the dark web that mentioned the Tor project. Tor is free and open-source software for enabling anonymous communication. The name derived from the acronym for the original software project name "The Onion Router". Tor was originally developed by the US Navy in the mid-1990s. Today, most of the funding for this project is provided by the US Department of Defense, but there are [...]
NIST SP 800-50
The National Institute of Standards and Technology (NIST) is a non-regulatory agency of the United States Department of Commerce. This Institute develops technology, metrics, and standards to drive innovation and economic competitiveness at U.S.-based organizations in the science and technology industry. For example, one of NIST’s roles is to develop guidelines on how companies can align with Federal Information Security Management Act (FISMA).The FISMA guidelines can be applied to [...]
NIST SP 800-145 (Cloud Computing Definitions)
Recent our posts were about NIST SP 800-137 and NIST SP 800-53A. In this post, we are going to review NIST SP 800-145. The title of this article is: Evaluation of Cloud Computing Services. This publication published in 2010. The PDF file of this publication consists of 32 pages and 7 chapters. These chapters are: Chapter 1: Introduction Chapter 2: The NIST Definition of Cloud Computing Chapter 3: Analysis of [...]
NIST SP 800–53A
Our previous post was about NIST SP 800-137. In this post, we are going to review NIST SP 800-53A. NIST SP 800-53 is shorthand for the National Institute of Standards and Technology Special Publication 800-53, Security and Privacy Controls for Federal Information Systems and Organization. NIST SP 800-53 is a set of standards and guidelines to help federal agencies and contractors meet the requirements set by the Federal Information [...]
What’s ISCM? (NIST SP 800-137)
First of all, it's better to talk about what NIST is and why the content published by NIST is important. The National Institute of Standards and Technology (NIST) is a non-regulatory agency of the United States Department of Commerce. This Institute develops technology, metrics, and standards to drive innovation and economic competitiveness at U.S.-based organizations in the science and technology industry. For example, one of NIST’s roles is to [...]
OS Fingerprinting
If a hacker can determine what type of operating system a targeted computer is running, he or she can work to exploit the vulnerabilities present in that operating system. OS Fingerprinting is used by security professionals and hackers for mapping remote networks and determining which vulnerabilities might be present to exploit. In fact, it is a tactic used by cyber-criminals and even ethical hackers to figure out what type [...]