Uncategorized

>Six Phases of Incident Response

Cybersecurity is a field that is important to pretty much every industry. A good cybersecurity system can help businesses stay safe from cybercrimes such as phishing attacks, malware attacks, and ransomware. Any organization that is serious about its cybersecurity should start with a good incident response plan. A cyber incident response plan tell a company’s …

>Six Phases of Incident Response Read More »

>How Does Malware Work?

The term malware refers to harmful software that may disrupt or manipulate a computer’s normal operations. Malware can infect any device that has computing capabilities; phones, tablets, personal PCs, company equipment, etc. How does it work? Malware typically infects a machine by tricking a user to click into and/or install a program they shouldn’t have …

>How Does Malware Work? Read More »

>Three-Way Handshake (TCP/IP)

I previously blogged about the OSI model, which characterizes computing functions into a universal set of rules and requirements in order to support interoperability between different products and software. TCP (Transmission Control Protocol) is another rule used in computer networking. The protocol is similar to the OSI model and consists of four layers: Application Transport …

>Three-Way Handshake (TCP/IP) Read More »

>LAN

Local Area Network (LAN) Topologies Star topology – In a star topology, devices are individually connected via a central networking device, i.e. a switch or hub. It is the most commonly found topology due to its reliability and scalability. Information sent to a device in a star topology is sent via the central device to …

>LAN Read More »

>IDS vs. IPS

Intrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS) are both parts of the network infrastructure. IDS/IPS compare network packets to a cyberthreat database containing known signatures of cyberattack – and flag any matching packets. IDS is a monitoring system IPS is a control system What’s the Difference? IDS does not alter the network packets …

>IDS vs. IPS Read More »

>OSI Model

The OSI Model (Open Systems Interconnection Model) is a conceptual framework used to describe the functions of a networking system. It characterizes computing functions into a universal set of rules and requirements in order to support interoperability between different products and software. The 7 Layers of the OSI Model Physical Layer -Concerned with electrically or …

>OSI Model Read More »