Unknown's avatar

All posts by thecybersecurityman

IP Addresses (Version 6)

In my last post, I discussed IPv4 addresses, which are 32-bit addresses expressed in dotted decimal format. This post will detail the IPv6 Addresses using examples from Howtonetwork.org Update: after reading this blog post, you can navigate to here where I elaborate on more IPv6 concepts Why Did We Need to Create IPv6?The biggest reason ...

IP Addresses (Version 4)

Did you know there are two versions of IP addresses? There are Internet Protocol version 4 (IPv4) addresses and  Internet Protocol version 6 (IPv6) addresses. In this post, I'll discuss IPv4 addresses. Every device connected to a network, such as the Internet or your home network, is given an IP address. An IP address is ...

Access Control Models

Important Access Control Concepts Access control follows the identification and authentication process, and once users are authenticated, security and network administrators use access controls to ensure that only authenticated users get access to the resources they are authorized to access. There are several models of access control, but before we can discuss these different models, ...

Control Types

Control Types After a user has been identified and authenticated, the next security measure involves authorization and access control. From a broad standpoint, there are three main security control classifications that cybersecurity professionals base on their implementation. They are technical, management, and operational. Technical Controls Technical controls are any controls (both hardware and software) utilizing ...

Methods of Authentication: PPP, AAA, and EAP

How do we authenticate when we login to another device or an application? It's much more than just entering a username and password, right? Well, there are actually many ways to authenticate! I'll discuss some of the main ones we use and what goes on behind the scenes. Point-to-Point Protocols (PPP) If you're familiar with ...