Posts

The CIA triad in Cryptography

Image
 The CIA triad in Cryptography When talking about network security, the  CIA  triad is one of the most important model which is designed to guide policies for information security within an organization. CIA stands for : Confidentiality Integrity Availability These are the objectives which should be kept in mind while securing a network. Confidentiality : Confidentiality means that only the authorized individuals/systems can view sensitive or classified information. The data being sent over the network should not be accessed by unauthorized individuals. The attacker may try to capture the data using different tools available on the Internet and gain access to your information. A primary way to avoid this is to use encryption techniques to safeguard your data so that even if the attacker gains access to your data, he/she will not be able to decrypt it. Encryption standards include  AES (Advanced Encryption Standard) and  DES  (Data Encryption Standard). Anot...

Unknown facts of Networking

Image
 Unknown facts of Networking Some interesting facts about computer networking are: Internet was invented by  ARPANET  in 1983. Internet is controlled by  75 million  servers. Backbone of internet is made by  550, 000 miles  of underwater cable. About  one billion  computer systems are connected to internet. About  3.2 billion  people use the internet from which  1.7 billion  internet users are Asians. Internet consists of  five billion computing devices  such as computers, phones, modems, switches, routers etc. According to Google, Internet consists of  5 million Terabytes  of data. If the internet goes down for a day, approximately  200 billion emails and 3 billion Google search  would have to wait. Approximately  204 million emails per minute  are send over Internet. 70% of them are spam. 269 billion  emails are sent per day. 30, 000 websites  are hacked every day. 50 mil...

Internet of Everything

Image
 Internet of Everything Internet Of Everything (IoE) has been the one of  the trendiest topic lately and it’s here, IoE is the upcoming most innovative and Ubiquitous technology advancement which is going to make networked connections more relevant and valuable than ever before. Turning information into action that creates new capabilities, richer experiences and unprecedented economic opportunities for businesses, individuals and countries. Technically IoE refers to billions of devices and consumer products connected to the internet in an intelligent networked environment with expanded digital features. It is basically a philosophy in which our technology future is compromised of different types of appliances, devices, and things connected to the global internet. As of now the internet connection is only restricted to Phone’s/Tablet’s, PC’s and a handful of other devices but the idea behind IoE is that in the future, Machines will become more intelligent and cognitive by havi...

Internet and Web programming

Image
 Internet and Web programming The Internet is a vast network of computers, and servers, which communicate with each other. The internet connects with the whole wide world together. How does it actually work at a very low level?  Client-side:  First, when we type a URL like www.google.com, the browser converts it into a file containing:    GET /HTTP/1.1 (where GET means we are requesting some data from the server and HTTP refers to a protocol that we are using, 1.1 refers to the version of the HTTP request) Host: www.google.com And some other information Now this file is converted to binary code by the browser and it is sent down the wires if we are connected through Ethernet and if we are using WiFi, first it converts it to a radio signal which is decoded by a router in a very low level. It is converted to binary and then sent to the servers.  This information or ‘binary codes’ go to the destination and respond if it is received by the sender only because o...

The Internet and the Web

Image
 The Internet and the Web 1. The Internet:   In simplest terms, the Internet is a global network comprised of smaller networks that are interconnected using  standardized  communication protocols. The Internet standards describe a framework known as the Internet protocol suite. This model divides methods into a  layered system of protocols.   These layers are as follows:  Application layer (highest) –  concerned with the data(URL, type, etc.). This is where HTTP, HTTPS, etc., comes in.    Transport layer –  responsible for end-to-end communication over a network.    Network layer –  provides data route.    The Internet provides a variety of information and communication facilities; contains forums, databases, email, hypertext, etc. It consists of private, public, academic, business, and government networks of local to global scope, linked by a broad array of electronic, wireless, and optical networking techn...

Basics of Computer Networking

Image
 Basics of Computer Networking Open system:   A system which is connected to the network and is ready for communication.  Closed system:   A system which is not connected to the network and can’t be communicated with.  Computer Network:  An interconnection of multiple devices, also known as hosts, that are connected using multiple paths for the purpose of sending/receiving data or media. Computer networks can also include multiple devices/mediums which help in the communication between two different devices; these are known as  Network devices  and include things such as routers, switches, hubs, and bridges.    Network Topology:  The layout arrangement of the different devices in a network. Common examples include: Bus, Star, Mesh, Ring, and Daisy chain.    OSI:   OSI stands for  Open Systems Interconnection . It is a reference model that specifies standards for communications protocols and also the functionaliti...

Introduction of Firewall in Computer Network

Image
 Introduction of Firewall in Computer Network A firewall is a network security device, either hardware or software-based, which monitors all incoming and outgoing traffic and based on a defined set of security rules it accepts, rejects or drops that specific traffic. Accept :  allow the traffic Reject :  block the traffic but reply with an “unreachable error” Drop :  block the traffic with no reply A firewall establishes a barrier between secured internal networks and outside untrusted network, such as the Internet. History and Need for Firewall Before Firewalls, network security was performed by Access Control Lists (ACLs) residing on routers. ACLs are rules that determine whether network access should be granted or denied to specific IP address. But ACLs cannot determine the nature of the packet it is blocking. Also, ACL alone does not have the capacity to keep threats out of the network. Hence, the Firewall was introduced. Connectivity to the Internet is no l...