Security FAQ

Comprehensive answers to your security questions and problems.

What is ARP Cache Poisoning?

ARP cache poisoning is one of the easiest and most effective methods for carrying out man-in-the-middle attacks. ARP works at layer two, also known as the data link layer, and is based on the MAC or hardware address of the communicating systems. Because of this, ARP cache poisoning can only be carried out between systems […]

What is ARP Cache Poisoning? Read More »

What is Session Layer Firewall?

Session layer firewalls are also commonly known as circuit-level gateways or circuit-level firewalls. They operate at the session-level of the OSI reference model and use NATto protect internal systems from outside attackers. The protection that is provided by these kinds of firewalls is basic and is done through the use of source/destination IP addresses as

What is Session Layer Firewall? Read More »

What is Proxy Server?

A Proxy server is a special kind of server used to act as an intermediary between two communicating systems. Effectively a proxy server would allow systems to make indirect network connections to networking services. The way this works is: – A client makes a connection request to the proxy server and requests some resource (file,

What is Proxy Server? Read More »

What is NAT?

NAT is how networking devices, specifically routers, and firewalls, assign a public address to computers inside a local area or private network. In other words, NAT can also be defined as a process by which networking devices at the perimeter of any network would modify the network address information in the IP header of a

What is NAT? Read More »

What is COPA?

COPA – referred to as the Child Online Protection Act – was a law in the United States passed in 1998 to protect minors from gaining access to harmful and objectionable material while browsing the internet. This law has been overturned, as it directly violates the right to free speech. This law was created because

What is COPA? Read More »

What is CIPA?

CIPA, which is short for Children Internet Protection Act, is a law in the United States signed in December 2000. CIPA has been designed and formulated keeping in mind the safeguarding of children against content on the Internet that is pornographic or explicit or objectionable. The law had been signed off by the then President

What is CIPA? Read More »

What is SHA-2?

SHA stands for Secure Hash Algorithm. SHA-2 was designed by the National Security Agency (NSA) and was published in the Federal Information Processing Standard (FIPS) FIPS PUB 180-2. SHA-2 is a cryptographic hash function similar to MD5 and SHA-1. It generates a 224, 256, 384, or 512-bit message digest or, in other words, a hash

What is SHA-2? Read More »

What is SHA-1?

SHA stands for Secure Hash Algorithm. SHA has been published by the National Institute of Standards and Technology (NIST) as a part of the Federal Information Processing Standard (FIPS) FIPS PUB 180-1. SHA is a cryptographic hash function similar to MD5, and it generates a 160-bit message digest or, in other words, a hash value

What is SHA-1? Read More »

What is Cryptography?

Cryptography is derived from the Greek word ‘cryptos,’ which means hidden. Cryptography is the art of encrypting confidential information and messages before transmitting them to another computer or location and then decrypting them when they reach the intended destination. In today’s modern world, hiding confidential information is a vital objective for any organization or country.

What is Cryptography? Read More »

What is Email Spoofing?

Email spoofing is a technique by which the sender of an email modifies or alters the header information of an email. In such emails, the “From” address contains an email address different from the one it was sent. Email spoofing is relatively easy to carry out, and it is one of the most over-utilized forms

What is Email Spoofing? Read More »