Posts

CEH H9 - Zero Trust

Image
https://hakin9.org/security-of-zero-trust/ Security of Zero Trust Introduction In today's digital age, where cyber threats loom large and data breaches make headlines far too often, the need for robust security measures has never been more critical. Organizations worldwide are grappling with the challenge of protecting their sensitive information and critical assets from increasingly sophisticated attacks.[1] Zero Trust, a revolutionary cybersecurity strategy that challenges the conventional notion of network trust, has arrived. Unlike perimeter-based models that assume users and devices are trusted once inside the network, Zero Trust employs a more cautious and proactive approach. It assumes that no user or device should be inherently trusted, regardless of their location or network connection. But what is Zero Trust exactly? Zero Trust is a security framework that adheres to the concept "never trust, always verify". It advocates for the continuous authentication and aut...

CCNP 03 - WANS

Image
WAN Problem Areas Certification Objectives Point-to-Point Protocols Switched Protocols      In this chapter, we will discuss troubleshooting point-to-point and switched protocols. It’s very important to understand the concepts and functionality of each protocol. We will discuss the HDLC and SDLC encapsulation methods, as well as both CHAP and PAP authentications via PPP. We will identify ISDN, Frame Relay, X.25, SMDS, and ATM transmissions and common problems associated with each of them. Point-to-Point Protocol      In the 1980s, the Internet really started to come to life due to its usage by the U.S. government, universities, and large corporations. These hosts were being supported by the Internet Protocol (IP) and connected via a series of LANs. The most common of these LANs was the Ethernet. Other hosts were connected through WANs, using technologies such as X.25. This eventually evolved into the need to transmit data via the original method used before...