Best Network Security Solutions

Virtual Private Network – VPN Cloud Based Security Brokers – CASB Antivirus / Antimalware I personally recommend to just use the Microsoft Defender Endpoint Detection and Reponse (EDR) Firewalls Identity and Access Management (IAM) Intrusion […]

Insecure vs Secure Ports

There are some default Ports used when working on a network/server but most of these ports exists in a default way and a secure way. Here are some essential ports listed with it’s default number […]

9 Essential Network Protocols

Within the network there are many different protocols. 9 of them are more than essential. Short Name Long Name Description HTTP Hypertext Transfer Protocol This is how web pages are requested and delivered on the […]

The OSI Model with possible protocols

No. Layer Description Device ImplementationsProtocols 7 Application Provides services directly to user applications. Identifies communication partners, identifies quality of service, considers user authentication and privacy and determines if adequate ressources are present. Gateway SMBHTTPSMTPFTPSNMPTelnetAppleTalk 6 […]

The OSI Layer and its possible attacks

The OSI Layer should be commonly known in the world of ICT but did you know what attack targets what layer? Here a table to clarify this… Layers Attacks 7 Application Exploit 6 Presentation Phishing […]