Posts

Showing posts from 2020

What are Malicious Bots? Are you safe from them?

Image
Bots are the short form of “robot” and it also called 'Internet Bot'. A bot is normally used as an agent for a user or other software program, or to stimulate human activities. As an agent, bots work with certain instructions given by humans and try to automate certain tasks on behalf of the human. Bots are normally operated over the network. They can communicate with one another using internet facilities through instant messaging. In general, bots interact with web pages, talk with end-users, scan for content, and help users to get their task done. Here the advantage is that humans can get rid of repetitive actions and tasks they do in working environments and spend their time in a more efficient manner. Each bot that performs on the internet has an underline algorithm that specifies certain tasks that need to be done by the bot. There are plenty of different types of bots nowadays and people use them to accomplish various goals. A ' chatbot ' is the one most popul...

What is Software-Defined Networking (SDN) ?

Image
  The limitations of the traditional networks Traditional networking uses integrated hardware and software to direct traffic across a series of connected switches. The difficulty is that it is hard to perform real-world experiments on large-scale production networks. The reasons for these challenges can be given as  Research stagnation due to the expensive equipment to be procured and Networks are lack of modifications and improvements for several years and the rate of innovation in networks is slower as protocols are defined in isolation-lack of high-level abstraction. What is Software-Defined Networking (SDN)? SDN came as an idea of virtualizing the network. The initial step for introducing SDN was taken by Stanford University researchers. The Software-Defined Networking (SDN) is a network architecture approach that enables the network to go for a virtualized method which is separating the control-plane that manages the network from the data plane where traffic flows. A net...

Is Network really in danger with the invention of 5G ?

Image
5G or the 5th generation is the latest mobile network technology. It was developed after 1G, 2G, 3G, and 4G networks. The specialties of 5G are telecommunication system aims to deliver enhanced mobile broadband, massive machine-type communications, and Ultra-reliable and low latency communications.  5G enables a new kind of network that is designed to connect virtually everyone and everything together including machines, objects, and devices.  Some of the enhanced controls are included in 5G technology such as mutual authentication capabilities, enhanced subscriber identity protection, and additional security mechanisms. Depending on the type of application 5G is several times faster than the 4G. Modern telecommunication networks can be logically separated into four parts as a radio access network, core network, transport network, and interconnect network. In terms of network security, all three planes can each be exposed to unique types of thre...

Did Extended Detection and Response (XDR) make security controlling easier?

Image
  Cyberattacks are performed targeting networks or endpoints such as laptops, to maximize the damage, steal confidential information, or to get personal advantages, that involve taking control of computer systems. Cyberattacks are often performed by manipulating users to only perform a click action on a button, that executes a malicious code behind the scenes without the acknowledgment of the user. Sometimes, intruders find out weaknesses in software executable files and running malicious code without user awareness. This hideous nature makes it more difficult to monitor and detection of malware. The predecessor to XDR, the EDR (Endpoint Detection and Response) is a technology which is an improved version with the capabilities of malware detection and antivirus. The EDR procedure is that it records system activities and events that are performed on an endpoint and allows the Security teams to gain visibility to possible attacks that cannot be detected directly by humans. What is XD...

Top 5 Information Security threats in 2020

Image
1.Malware:  Malware is a broader name than can be given to a number of malicious software variants, including viruses, worms, trojans, ransomware, and spyware. From the above types, viruses are the most dangerous and quickly spreading, it acts as a biological virus and spreading through computer networks while capturing, encoding, or destroying valuable information. They usually spread through executable files and move via portable devices such as pen drives, portable hard drives.  Worms are another malware type that initiates in one machine and quickly spread through an entire network. Because of its nature, it is called worms. Spywares hide in computer systems or networks and monitor the moves of the users to collect useful information to do a serious crime. As an example, cyber crooks can use Spyware to gather credit card information of users and use them to do their transactions. Trojan type malware programs act like legitimate software in someone’s computer. It creates vu...