What is FIDO2?
What is FIDO2?
  • Security

Passwords are not an ideal way to surf the World Wide Web safely. They are either so complex that they are hard to remember, or so simple that they can be guessed in next to no time. FIDO2 takes a different approach and relies on modern technology. The open standard has the potential to make surfing the net safer and more convenient at the same time.

What is FIDO2?
What is a firewall?
What is a firewall?
  • Security

A firewall provides effective protection against viruses and other malware that attempts to infect your computer. However, it needs to be properly configured to do so. In the following article, you will learn how to do this, how a firewall works, and what its limitations are.

What is a firewall?
What is a demilitarized zone?
What is a DMZ (Demilitarized zone) in Network Security?
  • Security

Companies hosting their own websites, an online shop, or e-mail inboxes should make sure to separate the corresponding server of these from the local network. This makes it possible to protect devices within the company network from hacker attacks that take place on public networks. Solid protection comes in the form of a demilitarized zone, which separates endangered systems from sensitive...

What is a DMZ (Demilitarized zone) in Network Security?
TLS (Transport Layer Security)
What is TLS (Transport Layer Security)?
  • Security

Internet security measures have become indispensable these days. Encryption is essential to ensure that unauthorized third parties do not gain access to data or are able to manipulate it. That’s what TLS or Transport Layer Security is for. Here’s what you need to know about this integral element of the modern Internet.

What is TLS (Transport Layer Security)?
Social engineering – the security gap at ‘layer 8’
What is Social engineering?
  • Security

The most effective system break-ins often happen without a scene. Instead of disrupting central network devices with DDoS attacks or sneaking through onto operating systems with Trojan horse techniques, hackers increasingly try to exploit the human security gap. There are various such methods that fall within the broader category of social engineering: a technique that sees hackers gather publicly...

What is Social engineering?
RAID 1
RAID 1
  • Security

Hardly a storage concept embodies the RAID principle (Redundant Arrays of Independent Disks) as well as RAID 1 in which two or more hard disks are linked to save copies of data for access in case of system failure. Find out more about RAID 1 and why mirroring makes this network so special.

RAID 1
Protect sensitive data with a strong password
How to choose a strong password
  • Security

It only takes a few seconds for a hacker to gain access to your private data without you having any idea. More often than not, a password is the only means of protection when logging into online services; and if it is too obvious, it will not prove too much of a challenge for criminals to crack. There are numerous options to increase password security.

How to choose a strong password
Kerberos
What ist Kerberos authentication and how does it work?
  • Security

What is Kerberos and how does it work? When using unsecure networks, you may expose yourself to cyberattacks. However, a number of security protocols exist that make it difficult for hackers to read sensitive data. Kerberos is a widely used authorization technology based on a trusted third party. Read on to find out how Kerberos works.

What ist Kerberos authentication and how does it work?
ISO 27001
ISO 27001
  • Security

By complying with the ISO 27001 standard, companies can prove they carefully handle information and plan for exceptional circumstances. Public certificates and standards according to the ISO certification create trust among consumers and attest to the company’s secure and tested treatment of data. The certification is performed by an independent institute.

ISO 27001
IP Spoofing: Fundamentals and counter-measures
What is IP Spoofing?
  • Security

Sending data over networks is one of the most important and highest utilized functions of the modern computer era. But the structure of the necessary TCP/IP connections makes it all too easy for criminals to intercept data packets along their way and either view or alter their contents. One of the most common methods of attack is IP spoofing, which allows DoS and DDoS attacks, among other things...

What is IP Spoofing?