• EMail Protocols

    Privacy Enhanced Mail (PEM): Uses Data Encryption Standard (DES) in the Cipher Block Chaining (CBC) Mode. Secure Multipurpose Internet Mail Extension (S/MIME): Uses the user’s encryption algorithm with RC2, DES, and 3DES for confidentiality. Pretty Good Privacy (PGP): Uses the International Data Encryption Algorithm (IDEA) for encryption of bulk data.

  • Data Link Layer Protocols

    Synchronous data link control / SDLC: supports loop or hub go-ahead configuration used with bounded and unbounded media. High Level Data Link Control / HDLC: Provides an option for a 32bit checksum, maintains data integrity, and provides flow control. Link access procedure balanced / LAPB: Performs packet framing operations, using I-, S- and U-frames.

  • WAN Protocol Characteristics

    Frame Relay Provides point to point connections by creating virtual circuit paths. Forwards frames and performs error check only at the end points. X.25 Is designed to operate over unreliable network lines works with the physical, data link and network layers of the OSI model.

  • Packet Switching / WAN Technology

    X.25: defines communication between DTE and DCE devices. Switched multimegabit data services (SMDS): Is a connectionless protocol and can provide bandwidth for exchange of large amounts of data. A connectionless, high-speed, datagram-based WAN technology for communication over public data networks. Frame Relay: Forwards packets to their destinations and doesn’t unpack frames at each node. Link…

  • Region 8 GOLD Exceptional Volunteer Award

    Both surprised and excited, I am also honored to have been awarded the “Exceptional Volunteer Award“, together with Khaled Mokhtar from Egypt and Tomislav Pokrajcic from Croatia from IEEE Region 8s Young Professional Organization. This achievement would not have been possible without all the Student Branch, GOLD and German Section Volunteers! Congratulations to Khaled and…

  • Betreff: E-Mail

    Titelseite der heutigen Süddeutschen. Man fragt sich in der Tat.

  • Change management process

    Submit the change Approve the change Document the change Test the change Implement the change Report the change

  • Reconnaissance Methods

    FIN Scan: Uses an IP-bases server’s error-handling mechanism against it. Operation System (OS) Identification: users an operating system’s weaknesses to obtain valuable information. Port sweep: Bombards a servers’s IP address with packets to identify active services. Evasive sweep: Identifies a server’s systems and services without ever completely connecting to it.

  • Components od a basic information system architecture

    Network architecture Protection mechanisms Platform architecture Security Models Enterprise architecture

  • Security Models

    Address security, integrity and information flow Graham-Denning: Defines the commands that a subject can execute to create or delete an object. Noninterference: Prevents covert channels and interference attacks. Brewer & Nash Address security and integrity Clark-Wilson State Machine: Is concerned with capturing a system’s state and ensuring its security. Bell-LaPadula (is a statemachine) Further Descriptions…