Zigbee IEEE 802.15.4 Internet of Things (IoT) Protocol

Zigbee IEEE 802.15.4 The improvement of wireless protocols is a major factor driving the development of newer Internet of Things (IoT) devices and systems. The Zigbee suite of communication protocols is used to create personal area networks with small, low-power digital radios, such as home automation, medical device data collection, and other low-power low-bandwidth needs. The Zigbee physical layer… Read More »

Compression of Network Data and Performance Issues

Network Data Compression. Todays networks will always have data limitations. Data sets continue to grow on pace with increasing bandwidth availability making compression an important service in improving network performance. The compression used in networks is actually a combination of compression and caching. It has been found that TCP rate control combined with compression provides the best value… Read More »

Transmission Control Protocol (TCP) Hybla

  Transmission Control Protocol (TCP) Hybla. A key component of TCP is a congestion-control mechanism. TCP does this by having each sender limit the rate based on perceived network congestion. If a TCP sender perceives that there is little congestion on the path between itself and the destination, it increases its send rate. If the sender perceives that… Read More »

Domain Name System (DNS) – Application Layer Protocol

Domain Name System (DNS) and Domain Name Service Protocol An application-layer protocol defines how applications on different systems pass messages to each other. An application-layer protocol defines; the types of messages exchanged, the syntax of the various message types, the meaning of the information, and rules for determining when and how a process sends and responds to messages.… Read More »

Security Policy Example – IRT Access & Authorization Policy

Policy Example   SunSpot Credit Union Computer Incident Response Team—Access & Authorization Policy   1.0       Policy Statement This policy applies to SunSpot Credit Union employees, temporary workers, contractors, and consultants who use or access SunSpot Credit Union information systems and computers.   2.0       Purpose/Objectives Policy Definitions for this policy are as follows: SunSpot Credit Union: (SCU). Incident Response… Read More »

Security Policy Example – Remote Access

  SunSpot Health Care Provider Remote Access Policy for Remote Workers & Medical Clinics   1.0       Policy Statement It is SunSpot Health Care Provider (SHCP) policy to protect Information Resources based on risk against accidental or unauthorized disclosure, modification, or destruction, and assure the Confidentiality, Integrity, and Availability (CIA) of clinic and patient data. Apply appropriate physical and… Read More »

Security Policy Template for Hand-Held Devices

Hand-Held Device use has become common place in today’s business environment to include company owned assets, and personal “Bring Your Own Device” (BYOD)’s. Security of Hand Held Devices normally spans over many of the other standard domains making it practical to treat them as a separate domain.. The SANS Reading Room article; Security Policy for the use of… Read More »

Virtual Private Network (VPN) Security and Monitoring Controls

A Virtual Private Network (VPN) is a group of network hosts that can transfer encrypted data between themselves on a Virtual Private Network. The technology creates a safe encrypted connection, usually over public networks such as the internet, that allows remote users and locations such as branch offices, to securely access and share resources. The main benefit is… Read More »

Basics of Security Awareness: Users are the Weakest Link

Basic Principles of Security Awareness. Security experts consider system users the weakest link in information security. User skill levels and experience can greatly vary, and unlike automated controls, human users can be subject to fatigue, or be distracted, which can lead to mistakes resulting in vulnerabilities. Security awareness training is often a user’s first experience with information security.… Read More »