Network

What Is Access Control?

https://informationsecurityasia.com/what-is-an-information-security-management-system-isms/

Access control for IT systems is designed to ensure that only authorized persons or computers have access to IT. Unauthorized use is prevented. Identification and authentication are central elements of access control. Access control is used to prevent unauthorized use of IT systems. It ensures that a computer system communicates only with authorized users or …

What Is Access Control? Read More »

How Mobile Connect Works?

How Mobile Connect Works

Logging in by username and password is considered cumbersome and outdated. With Mobile Connect, the world’s largest mobile communications organization, the GSM Association (GSMA), has developed an alternative that uses the cell phone as proof of identity. In Germany, the major mobile network operators have already announced that they will introduce the procedure in the …

How Mobile Connect Works? Read More »

Virus Scan with Microsoft Process Explorer

Virus Scan with Microsoft Process Explorer

Process Explorer from Microsoft Sysinternals can also be used to scan Windows servers and workstations for viruses. In addition to system utilization, attackers can also be detected and combated. Virus scan with Microsoft Process Explorer The free Sysinternals Process Explorer can display the running processes on Windows computers and helps with analysis. This also makes …

Virus Scan with Microsoft Process Explorer Read More »

5 Steps to A Secure Active Directory Environment

Secure Active Directory Environment

Active Directory is used as a central element for authentication in many companies. Therefore, domain controllers are also the focus of attackers. If these systems are compromised, the entire network is often at risk. However, security can be significantly increased with on-board tools. 5 Steps to a secure Active Directory environment Especially accounts with elevated …

5 Steps to A Secure Active Directory Environment Read More »

What is WireGuard?

What is WireGuard

WireGuard is a still very young technology to realize secure and powerful virtual private networks (VPNs) with little effort. It is an open-source protocol and software that is intended to provide an alternative to established VPN solutions such as OpenVPN or IPsec. WireGuard was developed with the goal of making VPNs easier and providing an …

What is WireGuard? Read More »

What Is a Proxy?

What is a proxy

A proxy is a software instance or a server that acts as an intermediary in a network. It receives requests and forwards them by proxy. Proxies can be used, for example, to obfuscate communication between local end devices and web servers, to speed it up, or to secure it. What is a proxy? A proxy …

What Is a Proxy? Read More »

A Breath of Fresh Air in The VPN Industry Thanks to Wire Guard

A Breath of Fresh Air in The VPN Industry Thanks to Wire Guard

Simple and easy to use. Cryptographically sound and a minimal attack surface. High performance, well-defined and thoroughly considered. That’s how WireGuard’s developer describes the virtual private network (VPN) solution on the official WireGuard website. But here, too, the shiny medal has a reverse side. A virtual private network (VPN) allows access to private or local …

A Breath of Fresh Air in The VPN Industry Thanks to Wire Guard Read More »

What is SAE (Simultaneous Authentication of Equals)?

What is SAE (Simultaneous Authentication of Equals)?

Simultaneous Authentication of Equals (SAE) is based on the Dragonfly handshake protocol and enables the secure exchange of keys of password-based authentication methods. In WPA3, SAE replaces the previous methods of negotiating session keys using pre-shared keys and is also used in WLAN mesh implementations. What is SAE (Simultaneous Authentication of Equals)? The acronym SAE …

What is SAE (Simultaneous Authentication of Equals)? Read More »

What Is VdS 10000?

What Is VdS 10000?

The guideline VdS 10000 contains specifications and offers concrete assistance for the implementation of an information security management system, especially for small and medium-sized enterprises (SMEs). It also describes concrete measures that can be used to secure the IT infrastructures of these companies in order to achieve an appropriate level of protection. VdS 10000 replaces …

What Is VdS 10000? Read More »

What Is a Handshake?

What Is a Handshake?

The handshake procedure is often used in the network and security area. It enables the establishment of secure connections by sender and receiver confirming their messages to each other when establishing a connection. Transport Layer Security uses the handshake procedure for secure TLS connections. What is a handshake? It is a procedure used in networking, …

What Is a Handshake? Read More »

What Is Threat Analysis?

What Is Threat Analysis?

Threat analysis is a subarea of risk management and risk analysis. With the help of threat analysis, the various threats to IT systems and IT processes can be systematically recorded, structured, and evaluated. It is not a one-time process, but a recurring one. What is threat analysis? Threat analysis captures threats that pose a risk …

What Is Threat Analysis? Read More »