In the last chapter, we learned how we can connect computers to a network and make them talk to each other. Now, what if we want to talk to a […]
Author: A. Boukar
The Data Link Layer : Communication within a LAN
In the last chapter, we have learned that layer 1 is responsible for the physical transmission of data between connected machines. The physical layer receives that data from the layer […]
The Physical Layer : How Machines Are Connected
Now that we have learned about the layers that make up the OSI model, let’s go ahead and discuss each of them separately. In this chapter, we’ll learn about the […]
Introduction to the OSI Model
In order to understand computer networks and how they work, we first need to learn about the OSI Model. The OSI Model is a standard that defines a set of […]
What is SAML? And Why is it Used?
Security Assertion Markup Language (SAML) is an open-source standard that allows separate parties to exchange authorization data between them. It allows users to access a third party service using credentials […]
NIST Standards You Should Know About For CISSP Exam
If you are preparing for the CISSP exam, then you have certainly encountered some of NIST standards. They are referenced in almost all eight domains. If you are having a […]
COBIT – IT Governance Framework
For years, organizations have suffered from a crucial gap that existed between business objectives and IT governance. IT activities were not always aligned with business goals, information technology risks were […]
What is the CIA Triad?
The CIA Triad stands for Confidentiality, Integrity and Availability. These three concepts form the basis of information security. They are the principles that secure systems should adhere to. In other […]