CyberSecurity

Wireless Networks Security

2020-07-16T07:20:44+00:00Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , |

Wireless Networks Security IEEE proposed the 802.11 standards for wireless communications. Various versions have been developed in wireless networking hardware: WLAN Security Techniques and Protocols Security techniques and protocols for wireless communication include: Service Set Identifier (SSID): It is a name that identifies a wireless network. Each wireless network must have a SSID. [...]

Implications of Multilayer Protocols

2020-07-16T07:04:43+00:00Tags: , , , , , , , , , , , , , , , |

Implications of Multilayer Protocols TCP/IP consists of dozens of individual protocols spread across various protocol stack layers, and in fact, is a multilayer protocol. This feature gives TCP/IP significant advantages: Benefits of Multilayer Protocols: Encryption can be integrated at various layers. A wide range of protocols can be used at higher layers. Supports flexibility [...]

TCP/IP Model

2020-07-16T07:19:01+00:00Tags: , , , , , , , , , , , |

TCP/IP Model In this part of this tutorial, we'll take a look at TCP-IP model to help you understand the different aspects of requirements for TCP-IP model.  The Transmission Control Protocol/Internet Protocol (TCP/IP) Model is similar to the OSI Reference Model but consists of only four layers: Application Transport Internet Link The designers of [...]

Communication & Network Security Domain

2020-07-16T08:04:07+00:00Tags: , , , , , , , , , , , |

Communication & Network Security Domain The Communication and Network Security domain deals with topics related to network components such as network models, network devices and protocols; specifically, how they function and how they are relevant to security. This domain discusses the OSI model as a guiding principle in networking, cabling, wireless connectivity, TCP/IP and [...]

Site & Facility Design Principles & Security Controls- Part 2

2020-07-15T14:03:23+00:00Tags: , , , , , , , , , , , , , , , , , , , , , , , , |

Site & Facility Design Principles & Security Controls- Part 2 Utilities and Heating, Ventilation, and Air Conditioning (HVAC) We come to the part where we talk about physical site & facility controls. The heating and air-conditioning systems are necessary for maintaining a safe and acceptable operating environment for computers and personnel. Computing equipment and [...]

Site & Facility Design Principles & Security Controls- Part 1

2020-07-15T14:00:35+00:00Tags: , , , , , , , , , , , , , , , , , , , , , , , , |

Site & Facility Design Principles & Security Controls- Part 1 One of the most important topics in CISSP course is physical site & facility controls. Some of the principles are provided by Crime Prevention through Environmental Design (CPTED) which are widely adopted all over the world by the security professionals to design public and [...]

Cryptography- Part 2

2020-07-15T13:29:55+00:00Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , |

Cryptography- Part 2 Asymmetric Cryptography / Public Key Cryptography In this method, two keys are used: Private Key: This key is only known by the owner itself. Public key: This key is issued by using Public Key Infrastructure (PKI) where a trusted Certification Authority (CA) certifies the ownership of key pairs. Only the private [...]

Cryptography- Part 1

2020-07-15T13:19:32+00:00Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , |

Cryptography- Part 1 This page we discuss cryptography, concepts, algorithms, attacks, and management. The sensitivity of assets is determined by confidentiality and integrity requirements and the impact of compromise on the corporation. Cryptography is the science of encrypting and decrypting communications to make them unintelligible for all but the intended recipient. Cryptography used to [...]

Assessing & Mitigating Vulnerabilities of Embedded Devices

2020-07-16T07:49:58+00:00Tags: , , , , , , , , , , , , , , |

Assessing & Mitigating Vulnerabilities of Embedded Devices Embedded devices or embedded computer systems are the computing system specially designed for a dedicated purpose with the mechanical and electrical system. These embedded systems may have internet connectivity. An example of the embedded system commonly used for general purposes are: Digital Watches Automobiles and other vehicles [...]

Go to Top