RAID
What is RAID (Redundant Array of Independent Disks)?
  • Security

When the RAID concept was first introduced in the late 1980s, it was primarily intended as an alternative to high cost hard drives on mainframes. While the issue of cost has shifted somewhat into the background, RAID storage systems are still in demand because of their high reliability in a server environment. What’s behind the technology and what are the various RAID levels?

What is RAID (Redundant Array of Independent Disks)?
Encryption methods: An overview
Encryption methods: An overview
  • Security

E-mail, instant messaging, or voice-over IP: If you want to communicate over the internet, you should make sure that the data transfer process can be trusted. The same goes for the World Wide Web. With online banking and digital shopping, money transactions are increasingly being carried out online. Popular encryption methods like DES, AES, or RSA should guarantee the security of passwords, credit...

Encryption methods: An overview
TLS vs. SSL
TLS vs. SSL: what is the difference?
  • Security

SSL and TLS are two encryption protocols that are frequently used in email programs and browsers. Have you ever wondered which one you should choose when you are prompted to pick one when configuring an email client, for example? Here, you will learn what the differences between SSL and TLS are and why only one of them is still viable today.

TLS vs. SSL: what is the difference?
Microsoft Exchange Zero Day Attack
Reaction to Microsoft Exchange zero-day attack
  • Security

On March 6, Microsoft pointed out vulnerabilities in the Microsoft Exchange software. IONOS had already learned of the vulnerability on March 3 and immediately applied updates provided by Microsoft to all Exchange systems it operated itself in order to eliminate the vulnerabilities. IONOS systems were not affected by the attack wave.

Reaction to Microsoft Exchange zero-day attack
What is IAM (Identity and Access Management)?
IAM – What is Identity and Access Management?
  • Security

In any system based on user accounts, Identity and Access Management has a role to play. So does every application use IAM? How important are Identity and Access Management systems when it comes to corporate compliance? And what features do these systems offer?

IAM – What is Identity and Access Management?
What is credential stuffing?
Credential stuffing: how security leaks become a data sieve
  • Security

There are billions of stolen logins circulating on the dark web today. Hackers use these combinations of logins and passwords to break into user accounts and steal sensitive data using a technique known as “credential stuffing”. To protect your data, you need to know how credential stuffing works and what countermeasures you can take to protect yourself.

Credential stuffing: how security leaks become a data sieve
Ethical hacking
Ethical hacking – addressing security breaches and preventing cybercrime
  • Security

Ethical hacking has been booming worldwide for several years. A growing number of companies voluntarily choose to be hacked and commission skilled IT professionals to target them by attacking their own infrastructure. Real stress tests under real conditions are intended to reveal weaknesses in their systems and prevent illegal hack attacks that could have dire consequences. The procedure is also...

Ethical hacking – addressing security breaches and preventing cybercrime
Hash function
What is a hash function? Definition, usage, and examples
  • Security

Hash functions are used in many areas of computer science. They generate hash values that represent digital information in a consistent manner according to defined parameters. They provide additional security (using encryption) during data transmission and allow data to be accessed more quickly. We explain what hash functions are, how they are used and provide some examples.

What is a hash function? Definition, usage, and examples
What is Mandatory Access Control (MAC)?
Mandatory Access Control (MAC): how does it work?
  • Security

Data protection is very important, especially when it comes to high-security branches like the government and the military. Users in most organizations only have access to the data they need to do their job, and when it comes to highly sensitive data, it’s important to have a system that’s as tamper-proof as possible. That’s where Mandatory Access Control comes in. Keep reading to find out how...

Mandatory Access Control (MAC): how does it work?
What is role-based access control (RBAC)?
How does role-based access control (RBAC) work?
  • Security

Organizations restrict access permissions in systems to protect sensitive data from unauthorized access and modification. However, assigning access permissions to users individually is a high-maintenance and error-prone process. In the case of role-based access control (RBAC), permissions are assigned based on previously assigned roles. Here, we explain how role-based access control works.

How does role-based access control (RBAC) work?