Tech
-
World Cybersecurity Forum (1st Quarterly Clubhouse Edition)
We held the first World Cybersecurity Forum this past week and it was a great success! The World Cybersecurity Forum was a 24-hour event held for the first time this year on Clubhouse! The event featured cyber experts from around the world, and was an event open to all with the mission of demystifying cyber, creating awareness and answering the public’s questions. The World Cybersecurity Forum believes that cybersecurity is EVERYONE’S responsibility. Organized by Jacqueline Jayne, Security Awareness Advocate at KnowBe4, Jacqueline or, JJ, for short, can be found on LinkedIn. The session aimed to bring the best minds together from around the world to talk about all things cyber.…
-
IP Addresses, Subnet Masks, Subnetting, and Calculating Hosts
IPv4 IP addresses are a 32-bit (binary digit) value. IP addresses are just strings of 32 binary digits (bits!). ex: 11000000101010000000010000000010 Broken down into 4 groups of 8, separated by dots (periods/decimals). ex: 11000000.10101000.000001.00000010 Now each 8-bit value, octet, is converted to a decimal number between 0 and 255 (for a total a 256 options). So the above would translate to: ex: 192.168.4.2 This is “dotted decimal notation” aka “the dotted octet numbering system”. Tip: You should memorize that 0=00000000 and 255=11111111. You’ll find knowing this very helpful. Note: By definition, all computers on the same network have the same subnet mask and network ID. /24 is limited to IP…
-
What is Access Control?
Traditional computer security revolves around access control. “It is where security engineering meets computer science.” —Ross Anderson, Security Engineering Access control is to control whom or who, has access to which resources in a system. Access control works at a number of levels from Hardware at the base, up through the Operating System, then Middleware, and up to the Application level. “As we work up from the hardware through the operating system and middleware to the application layer, the controls become progressively more complex and less reliable.” —Ross Anderson, Security Engineering Complexity tends to be at opposites with security. “Now now of the biggest challenges in computer security is preventing…
-
News & Notes: Kaseya Suffers Massive REvil Ransomware Attack Over Weekend
Over the holiday July 4th weekend some big news hit. There was a massive REvil ransomare attack on Kaseya, an American software company. Reported to us by SANS Daily StormCenter Podcast, news is still developing here, here, and here about the extent of the damage, which is not fully known but expected to be significant. Kaseya provides IT management software to MSPs (Managed Service Providers) and IT teams to improve efficiency and security, and allowing small to medium-sized businesses to manage their IT assets, service desk and more. Biblio: SANS Storm Center Podcast
-
What is Border Gateway Protocol (BGP)?
Border Gateway Protocol is one of those foundational, core infrastructure protocols used by Internet users everyday but not top of mind for the average consumer or end-user. Border Gateway Protocol, or BGP, is a routing protocol. BGP is the primary protocol for the Internet, and is a Layer 4 Transport protocol that sits on top of TCP [2]. It’s purpose is to keep the various systems on the Internet up to date with the information needed to send and receive data traffic correctly. So, real quick in a nutshell, when information is sent around the Internet, that info is broken up into chunks of data called ‘packets’. Packets sent on…
-
What is Softwarization?
Softwarization is appearing under the form of diverse technologies and models (Cloud Computing, Edge-Fog Computing, SDN, NFV) sharing the same common denominator: all network and service functions can be virtualized and dynamically allocated onto logical resources hosted onto an underneath physical infrastructure, fully decoupled. It concerns to develop in software any functions, logics, and methods capable of processing huge amounts of data by executed on (low cost) powerful hardware. via Softwarization: A Shift of Paradigm
-
What is Moore’s Law, Gilder’s Law and Metcalfe’s Law: 3 Laws to Know…
Three laws to know: Moore’s Law: Moore’s Law states that the processing power of chipset is doubling every 24 months (likewise the cost halves for the same level of processing power). Gilder’s Law: Gilder’s Law states that the bandwidth of communication systems triples every 12 months (likewise costs decrease). Bandwidth grows at least 3 times faster than computer power. (If compute power doubles every 18 months, as per Moore’s Law, then communications power doubles every 6 months.) Metcalfe’s Law: Metcalfe’s Law (the network effect) states that the value of a network is proportional to the square of the number of nodes (likewise the cost of getting connected decrease, but the…
-
What is a Ragnar Locker Ransomware Attack?
Ragnar Locker is ransomware that affect devices running Microsoft Windows operating systems. The Ragnar Locker method was first observed in December 2019 as part of a series of attacks against compromised networks. Biblio: Ragnar locker malware: what it is, how it works and how to prevent it–Infosec Institute
-
4). Intro to Hypervisor, Docker & Container Basics–(VMs) Virtual Machines [VIDEO]
There’s a great series of videos on YouTube giving a quick intro to telecommunication cloud basics. The videos feature Vikas Shokeen and are available in short 4-video series. The fourth one is below with some basic notes. 4). Intro to Hypervisor, Docker & Container Basics–(VMs) Virtual Machines [VIDEO] Docker Architecture See also: 1). Intro to Telco (Telecommunications Company) Cloud Basics, NFV, SDN, Architecture of Cloud Networks [VIDEO] 2). Intro to NFV (Network Function Virtualization) Basics–NFV Architecture, ETSI, NFV ManO [VIDEO] 3). Intro to SDN (Software Defined Networking) Basics–SDN & Openflow Architecture [VIDEO] Biblio: [1] vCloud NFV Reference Architecture [2] Tech Tutorial–Introduction to NFV: Network Function Virtualization [3] Introduction to Network…
-
3). Intro to SDN (Software Defined Networking) Basics–SDN & Openflow Architecture [VIDEO]
Software defined networking (SDN) SDN (software defined networking) is highly correlated with NFV. SDN is a big deal in IT and Telecom. NFV is all about building up virtual platforms. SDN is about making IP networks more flexible, more customizable, more programmable so that packet routing is possible with lots of flexibility and agility. Imagine a router, a physical piece of hardware, specifically designed and manufactured for implementing software functions that allow us control over the delivery of our data packets at its core. SDN now allows us to extract the software function from the actual piece of hardware. Now, we can take this extracted software function and apply it…