What Is VdS 10000?

What Is VdS 10000?

The guideline VdS 10000 contains specifications and offers concrete assistance for the implementation of an information security management system, especially for small and medium-sized enterprises (SMEs). It also describes concrete measures that can be used to secure the IT infrastructures of these companies in order to achieve an appropriate level of protection. VdS 10000 replaces … Read more

What is Remote Code Execution (RCE)?

What is Remote Code Execution RCE

Remote Code Execution makes it possible to execute unwanted program code on a computer remotely. Often, security gaps in the operating system and in applications or poorly secured input options are the reason for this security problem. Attackers use the Internet to penetrate systems via remote code execution, execute malware or take over the systems … Read more

What Is Access Control?

what is access control

Access control is a crucial aspect of cybersecurity and refers to the practice of regulating who can access specific resources or information in a system or network. It is a security technique that restricts unauthorized access to sensitive data, devices, or resources. Access control is a vital aspect of modern-day cybersecurity. With cyber threats increasing, … Read more

What Is Remote Access?

What Is Remote Access

Remote access is access from a local computer to remote computers, servers, networks, or other IT systems. Access can take place via private data networks or the Internet. Typical applications include working at a remote location or remote maintenance of computers and IT systems. Authenticated and encrypted connections are used to secure remote access. Remote … Read more

What Is Physical IT Security?

what is physical security measures

Physical security is an elementary component of IT security. It includes measures to prevent hazards caused by physical impacts on IT systems. Physical security can, for example, protect against water damage, fire, or burglary. What is physical (IT) security? What is physical IT security? IT security is composed of the building blocks of technical security, … Read more

What is the Dark Web?

What is the darknet compared to the open Internet

Unlike the open Internet, whose pages can be found via search engines such as Google, the Darknet or Deep Web is hidden from view. Here a network is created from and between all participants, classical servers do not exist. The internet has become a crucial part of our lives. It has revolutionized how we communicate, … Read more

DNS over HTTPS (DoH)

DNS over HTTPS

According to Google’s own September 2019 transparency report, 94 percent of all HTTP connections are encrypted. DNS queries, however, still travel over the Ether in clear text, as if nothing has changed in the last 30 years. The implications for privacy and data security are undeniable. In today’s world, the internet has become an essential … Read more

What is Cyberwar?

What is Cyberwar

Cyberwar is a warlike confrontation between states in virtual space, which is conducted by means of information technology. The aim of cyberwar is to damage countries, institutions, or society electronically and to disrupt important infrastructures. With the increasing reliance on digital technology and the interconnectedness of the world, cyberwarfare has become a growing concern for … Read more

What Is a Domain Controller?

What Is a Domain Controller?

A domain controller is a central instance of a network domain that manages and controls its objects as well as user rights and roles. It is a server that has been set up as a domain controller by the administrator. Users who want to log in and access objects in a domain contact the controller … Read more

What is Metasploit?

What is Metasploit

Metasploit is an open-source project that provides, among other things, the Metasploit framework. It contains a collection of exploits that can be used to test the security of computer systems. Metasploit can also be misused as a tool for hackers. Metasploit is a powerful and versatile penetration testing framework that has become an essential tool … Read more

What Is Network Encryption?

what-is-network-encryption

Network encryption operates on layer 2 or 3 of the OSI layer model. It ensures the confidentiality and integrity of transmitted data as well as the authenticity of communication partners and is transparent to higher-layer protocols or applications. In today’s digital age, communication over the internet is becoming increasingly prevalent. However, this ease of communication … Read more

What is 802.1X?

What Is 802.1x

The IEEE 802.1X standard operates at layer two of the OSI reference model and allows access control to cable-based or wireless local area networks (LANs and WLANs). It provides a secure authentication procedure and uses protocols and standards such as the Extensible Authentication Protocol (EAP) and RADIUS. In the WLAN environment, access control with this … Read more

What Is Overlay Network?

Overlay networks have become increasingly popular in recent years, as they offer a unique way of connecting computers and devices across multiple networks. An overlay network is a virtual network that is built on top of an existing network, creating a layer of abstraction between the physical network and the applications that use it. This … Read more

What is a VLAN?

What is a VLAN

As computer networks continue to expand in size and complexity, new technologies are being developed to help manage and optimize data communication. One such technology is a VLAN, or Virtual Local Area Network. VLANs allow devices to be grouped together into logical networks, even if they are physically located on different parts of a larger … Read more

What is BSI Standard 200-2?

What is BSI Standard 200-2

In addition to standards 200-1 and 200-3, BSI standard 200-2 is an elementary component of the BSI’s IT-Grundschutz methodology. It defines methods of setting up, reviewing, and expanding an information security management system (ISMS). Various procedures are available for basic, standard, or core protection. The standard is compatible with ISO 27001 certification. In 2017, 200-2 … Read more

What is WPA3 (Wi-Fi Protected Access 3)?

What is WPA3 (Wi-Fi Protected Access 3)?

The WLAN encryption standard WPA3 (Wi-Fi Protected Access 3) was adopted in June 2018 as an addition to the existing standard WPA2. WPA3 brings significant improvements in authentication and encryption. It is also expected to simplify the configuration of WLAN devices and increase security at public hotspots. What is WPA3? In early 2018, the Wi-Fi … Read more

What is Active Directory (AD)?

What is Active Directory AD

Active Directory is a directory service from Microsoft. With the help of the service, objects and resources in a Windows network can be managed centrally and access can be controlled. The structure of a company or an organization can be reproduced logically with an Active Directory. The delimitation of the different areas is realized via … Read more

What is User Management?

What is user management

User management is an important task of the administrator. He or she sets up users and user IDs and assigns or revokes access authorizations for IT systems or applications. User administration can be performed directly locally in the system concerned or via an externally connected, centralized database solution. What is user management? User administration, often … Read more

What is Unified Threat Management (UTM)?

What is Unified Threat Management

Unified Threat Management refers to a security solution that provides multiple security systems and functions in a single appliance. Components of UTM include firewalls, IDS and IPS systems, antivirus protection, gateways, VPNs, spam filters, and content filters. What is Unified Threat Management (UTM)? Security solutions can be differentiated between Specialized Security Appliances (SSA) and Unified … Read more

What is Kali Linux?

What is Kali Linux

Kali Linux is a Linux distribution specialized in security and penetration testing of IT systems. The distribution includes numerous tools and utilities for performing a wide variety of testing methods. What is Kali Linux? The Linux distribution Kali Linux is based on Debian and uses Gnome as a desktop interface. It is specialized in the … Read more