2023-03-10 01:25:42
The Transport Layer of the OSI Model is where protocols such as UDP and TCP interact. We assign port numbers here as well. In this stage of the OSI Model, we deal with segments.
We now have a mechanism to determine i...
2023-03-08 20:31:00
The session layer of the OSI Model is where sessions get managed. Being able to keep track of what data belongs to what process is a crucial part of being able to manage multiple sessions at the same time.
Authentica...
2023-03-07 22:39:07
In the OSI Model, the Presentation Layer is where we format, compress, or encrypt, ensuring that the applications involved can use the data. This process ensures that the applications involved can use the data received....
2023-03-06 22:06:59
The Application layer is where Network Traffic Begins and Ends. When we initiate network traffic, we utilize an application to process network data to send.
In this stage of packet generation, we refer to what's gett...
2023-03-05 20:45:54
Availability is the final part of the CIA Triad. It is as crucial that we keep information available as it would be to keep it in the hands of only those authorized or that it hasn’t been corrupted or modified.
Hav...
2023-03-04 21:10:31
Integrity is the second aspect of cybersecurity. Integrity means we can prove that data is intact and is not corrupt or modified.
Not every case of data corruption is due to a threat actor. Other scenarios can be a f...
2023-03-03 18:58:54
Confidentiality in the CIA triad is the ability to keep information in the hands of only authorized users. We achieve this through mechanisms such as access controls and encryption.
One way we could achieve confi...
2023-03-02 23:19:28
Hello! I am Jeremiah Wenzel. I graduated from Kirkwood Community College with an associate degree in LAN Administration and PC Technician. I finished with a computer security certificate in 2014. This blog will cover va...