Author: admin

  • Artificial Intelligence in Cyber Risk Assessment: Effective or Just Hype?

    Artificial Intelligence in Cyber Risk Assessment: Effective or Just Hype?

    Increasing cyber-attacks and their evolving forms affect everyone, from businesses to government offices and individuals. Cyber criminals will stop at nothing to defeat security systems and inflict damage to properties, finances, and reputations. Accenture’s 2019 Cost of Cybercrime study reports that security breaches have increased by 67% over the last five years, with the average…

  • 4 Ways Every Business Can Benefit from Using A Robust Content Delivery Network

    4 Ways Every Business Can Benefit from Using A Robust Content Delivery Network

    Content delivery expectations today have reached a whole new level. Consumers expect businesses to act and respond with the same speed, personalization, and efficiency as humans do. This has put enormous pressure on brands to deliver exceptional customer experiences to meet rising demands. In the world of digitization, the Internet is where users like to…

  • 10 Wrap Up

    It has been said that building the Internet solved the world’s most complex engineering problem to date. The design and engineering of the Internet started well over 50 years ago. It has been continuously improving and evolving over the past 50 years and will continue to evolve in the future. The Internet now connects billions…

  • 9. The OSI Model

    So far we have spent all of our time describing the four-layer model used to design and implement the TCP/IP protocols and applications that make up the Internet. However, the TCP/IP model is not the only model we can use to help us understand how networks work. The other model commonly used to make sense…

  • 8.7 Glossary-Chapter 8

    asymmetric key: An approach to encryption where one (public) key is used to encrypt data prior to transmission and a different (private) key is used to decrypt data once it is received. certificate authority: An organization that digitally signs public keys after verifying that the name listed in the public key is actually the person…

  • 8.8 Questions-Chapter 8

    You can take this quiz online at http://www.net-intro.com/quiz/ How do we indicate that we want a secure connection when using a web browser? a) Use https:// in the URL b) Use a secure web browser c) Open an incognito windowd) Manually encode the address of the server using SHA1 Why is a shared-secret approach not…

  • 8.6 Summary-Chapter 8

    Since the Internet was nearly 20 years old before we needed broadly deployed security, we had to find a way to add security to the already existing four-layer model. The perfect place to add security was as an option in the Transport layer. This is why we call secure connections on the Internet “Secure Sockets…

  • 8.5 Certificates and Certificate Authorities

    While public/private key encryption works to allow the distribution of encryption keys across insecure networks and the use of those keys to encrypt transmissions, there is still a problem of knowing if the public key that you have received when you connected to a server is really from the organization it claims to be from.…

  • 8.4 Encrypting Web Browser Traffic

    Since web browsers and web servers operate at the application layer, we barely notice whether we are using encrypted or unencrypted connections. Web browsers use the URL convention of replacing “http:” with “https:” to indicate that the browser is to communicate with the web server using the Secure Transport Layer instead of the unencrypted Transport…

  • 8.3 Secure Sockets Layer (SSL)

    Since network engineers decided to add security nearly 20 years after the Internet protocols were developed, it was important not to break any existing Internet protocols or architecture. Their solution was to add an optional partial layer between the Transport layer and the Application layer. They called this partial layer the Secure Sockets Layer (SSL)…

  • 8.2 Two Kinds of Secrets

    The traditional way to encrypt transmissions is using a shared secret (a password, a sentence, a number) that only the sending and receiving parties know. With the secret, it is easy to decrypt the received data, but if you received the data without possessing the secret, it would be effectively impossible to decrypt the message.…

  • 8.1 Encrypting and Decrypting Data

    The concept of protecting information so it cannot be read while it is being transported over an insecure medium is thousands of years old. The leaders in Roman armies sent coded messages to each other using a code called the “Caesar Cipher”. The simplest version of this approach is to take each of the characters…

  • 8 Secure Transport Layer

    In the early days of the Internet, networks were small and all of the routers were in secure locations. As long as each computer connected to the Internet protected itself from unwanted incoming connections, it was felt that there was no need to protect data from prying eyes while it was crossing the network. So…

  • 7.9 Questions-Chapter 7

    You can take this quiz online at http://www.net-intro.com/quiz/ Which layer is right below the Application layer? a) Transport b) Internetworking c) Link Layer d) Obtuse layer What kind of document is used to describe widely used Application layer protocols?86 a) DHCP b) RFC c) APPDOC d) ISO 9000 Which of these is an idea that…

  • 7.8 Glossary-Chapter 7

    HTML: HyperText Markup Language. A textual format that marks up text using tags surrounded by less-than and greater-than characters. Example HTML looks like: <p> This is <strong>nice</strong></p> HTTP: HyperText Transport Protocol. An Application layer protocol that allows web browsers to retrieve web documents from web servers. IMAP: Internet Message Access Protocol. A protocol that allows…