• Welcome to Professional A2DGC Business
  • 011-43061583
  • info@a2dgc.com

Blogs

08

Jul

Challenge Response Authentication Mechanism (CRAM)

  • Jul 08, 2023

Blog Credit: Trupti Thakur Image Courtesy: Google Challenge Response Authentication Mechanism (CRAM) In computer security, challenge-response authentication is a set of protocols used to protect digital assets and services from unauthorized users, programs or activities. While challenge-response authentication can be as simple as a password, it can also be as dynamic as a randomly generated request. […]

07

Jul

Server Name Indication (SNI)

  • Jul 07, 2023

Blog Credit: Trupti Thakur Image Courtesy: Google Server Name Indication What is Server Name Indication (SNI)? This article will provide a detailed explanation of the topic called Server Name Indication (SNI). Before moving on to the main topic, let us understand the server name. What is Server Name? A server name is just a computer’s […]

06

Jul

Operations of Blue & Red Teaming

  • Jul 06, 2023

Blog Credit: Trupti Thakur Image Courtesy: Google Operation of Blue & Red Teaming Security is a multifaceted field with multiple roles for carrying out diverse operations. In this article, we demystify the concept of the red and blue teams in security. First, why do we need to bifurcate security roles for two teams on Penetration […]

04

Jul

Autonomous System

  • Jul 04, 2023

Blog Credit: Trupti Thakur Image Courtesy: Google Autonomous System What is Autonomous System? An autonomous system (AS) consists of several connected Internet Protocol routing prefixes. One or more network operators manage all these routing prefixes in place of a single administrative entity or organization. These IP prefixes have a clearly defined routing policy that states […]

03

Jul

Onion Routing

  • Jul 03, 2023

Blog Credit: Trupti Thakur Image Courtesy: Google Onion Routing   Onion routing is a technique for anonymous communication over a computer network. In an onion network, messages are encapsulated in layers of encryption, analogous to layers of an onion. There is a large set of precautionary measures and best practices to make web browsing safer […]

01

Jul

Software Defined Networking (SDN)

  • Jul 01, 2023

Blog Credit: Trupti Thakur Image Courtesy: Google Software Defined Networking (SDN) Introduction Software-defined networking (SDN) is a new networking paradigm that separates the network’s control and data planes. The traditional networking architecture has a tightly coupled relationship between the data and control planes. This means that network devices, such as routers and switches, are responsible for […]

30

Jun

New Delhi is using Facial Recognition! For Good or Bad is the Question

  • Jun 30, 2023

The Delhi police using Automated Facial Recognition Technology to screen crowds Indian legislation enforcement is beginning to significantly impact facial recognition expertise. Facial recognition Technology is an automated process of comparing two images of faces to determine whether they represent the same individual. The Delhi Police trial of a facial recognition system commissioned by the […]

30

Jun

Blue Smacking

  • Jun 30, 2023

Blog Credit: Trupti Thakur Image Courtesy: Google   Blue Smack Attack in Wireless Networks Blue smacking is one of the older types of attacks against the protocol. In our investigation of this attack, you’ll find that it’s a variant of a common attack called denial of service against networks, devices, and applications. In short, when we […]

28

Jun

“Rebuilding After a Cyber Attack: Steps for Recovery and Resilience”

  • Jun 28, 2023

Cyber attacks are like earthquakes. There is the immediate shockwave when an incident occurs, as you hurry to identify the source of the breach, plug the vulnerability and fulfil your regulatory requirements. Then come the secondary waves that produce new problems. For example, how have essential operations been affected, and what are you doing to […]

28

Jun

Network Neutrality

  • Jun 28, 2023

Network Neutrality Blog Credit: Trupti Thakur Image Courtesy: Google Network Neutrality Introduction The Internet has become an indispensable tool for users around the globe and a fundamental facilitator of innovation and economic growth. Demand for Internet connections with greater bandwidth is unlikely to subside. Even now, some network operators must use congestion-management and traffic-shaping techniques […]

27

Jun

What is cybersecurity?

  • Jun 27, 2023

Cybersecurity is the protection of internet-connected systems such as hardware, software and data from cyberthreats. The practice is used by individuals and enterprises to protect against unauthorized access to data centers and other computerized systems. A strong cybersecurity strategy can provide a good security posture against malicious attacks designed to access, alter, delete, destroy or extort an […]

27

Jun

Synchronous Optical Network (SONET)

  • Jun 27, 2023

Synchronous Optical Network (SONET) Blog Credit: Trupti Thakur Image Courtesy: Google   Synchronous Optical Network (SONET) Synchronous Optical Network, or SONET. A communication protocol called SONET was created by Bellcore and is used to send a lot of data over relatively long distances using optical fibre. Multiple digital data streams are transmitted simultaneously over the […]