Blog Credit: Trupti Thakur Image Courtesy: Google Challenge Response Authentication Mechanism (CRAM) In computer security, challenge-response authentication is a set of protocols used to protect digital assets and services from unauthorized users, programs or activities. While challenge-response authentication can be as simple as a password, it can also be as dynamic as a randomly generated request. […]
Blog Credit: Trupti Thakur Image Courtesy: Google Server Name Indication What is Server Name Indication (SNI)? This article will provide a detailed explanation of the topic called Server Name Indication (SNI). Before moving on to the main topic, let us understand the server name. What is Server Name? A server name is just a computer’s […]
Blog Credit: Trupti Thakur Image Courtesy: Google Operation of Blue & Red Teaming Security is a multifaceted field with multiple roles for carrying out diverse operations. In this article, we demystify the concept of the red and blue teams in security. First, why do we need to bifurcate security roles for two teams on Penetration […]
Blog Credit: Trupti Thakur Image Courtesy: Google Autonomous System What is Autonomous System? An autonomous system (AS) consists of several connected Internet Protocol routing prefixes. One or more network operators manage all these routing prefixes in place of a single administrative entity or organization. These IP prefixes have a clearly defined routing policy that states […]
Blog Credit: Trupti Thakur Image Courtesy: Google Onion Routing Onion routing is a technique for anonymous communication over a computer network. In an onion network, messages are encapsulated in layers of encryption, analogous to layers of an onion. There is a large set of precautionary measures and best practices to make web browsing safer […]
Blog Credit: Trupti Thakur Image Courtesy: Google Software Defined Networking (SDN) Introduction Software-defined networking (SDN) is a new networking paradigm that separates the network’s control and data planes. The traditional networking architecture has a tightly coupled relationship between the data and control planes. This means that network devices, such as routers and switches, are responsible for […]
The Delhi police using Automated Facial Recognition Technology to screen crowds Indian legislation enforcement is beginning to significantly impact facial recognition expertise. Facial recognition Technology is an automated process of comparing two images of faces to determine whether they represent the same individual. The Delhi Police trial of a facial recognition system commissioned by the […]
Blog Credit: Trupti Thakur Image Courtesy: Google Blue Smack Attack in Wireless Networks Blue smacking is one of the older types of attacks against the protocol. In our investigation of this attack, you’ll find that it’s a variant of a common attack called denial of service against networks, devices, and applications. In short, when we […]
Cyber attacks are like earthquakes. There is the immediate shockwave when an incident occurs, as you hurry to identify the source of the breach, plug the vulnerability and fulfil your regulatory requirements. Then come the secondary waves that produce new problems. For example, how have essential operations been affected, and what are you doing to […]
Network Neutrality Blog Credit: Trupti Thakur Image Courtesy: Google Network Neutrality Introduction The Internet has become an indispensable tool for users around the globe and a fundamental facilitator of innovation and economic growth. Demand for Internet connections with greater bandwidth is unlikely to subside. Even now, some network operators must use congestion-management and traffic-shaping techniques […]
Cybersecurity is the protection of internet-connected systems such as hardware, software and data from cyberthreats. The practice is used by individuals and enterprises to protect against unauthorized access to data centers and other computerized systems. A strong cybersecurity strategy can provide a good security posture against malicious attacks designed to access, alter, delete, destroy or extort an […]
Synchronous Optical Network (SONET) Blog Credit: Trupti Thakur Image Courtesy: Google Synchronous Optical Network (SONET) Synchronous Optical Network, or SONET. A communication protocol called SONET was created by Bellcore and is used to send a lot of data over relatively long distances using optical fibre. Multiple digital data streams are transmitted simultaneously over the […]