Routing Protocols. RIP, EIGRP, OSPF, IS-IS

Routing protocols are used to establish a path between routers. The most common routing protocols used are: Routing Information Protocol (RIP), Enhanced Interior Gateway Routing Protocol (EIGRP), Open Shortest Path First (OSPF), and Intermediate System to Intermediate System (IS-IS). Which protocol to use with a Local Area Network (LAN) depends on the following Factors: Administrative cost of management. Administrative… Read More »

Greg Palmer

Bastion Host Overview

A Bastion Host (BH) is a computer on a network perimeter which is running a hardened Operating System (OS). This protection includes patches, authentication, encryption, and eliminates unnecessary software and services  (Weaver, Weaver, Farwood, & Weaver, 2012). Weaver et al.’s (2012) provides the following list of BH characteristics: A machine with adequate memory and processor speed. All patches… Read More »

Greg Palmer

Security+ Terms and Acronyms

Terms and Acronyms Used in Security+ Term Acronym Triple Digital Encryption Standard 3DES  Authentication, Authorization and Accounting AAA Access Control List ACL Advanced Encryption Standard AES Advanced Encryption Standards 256-bit AES256  Authentication Header AH  Annualized Loss Expectancy ALE  Access Point AP Application Programming Interface API Advanced Persistent Threat APT Annualized Rate of Occurrence ARO  Address Resolution Protocol ARP… Read More »

Greg Palmer

Security+ SY0-401 General Information & Characteristics

Security+ General Information The CompTIA Security+ Certification is often a first step towards more advanced security certifications.   About The CompTIA Security+ certification is a vendor-neutral, internationally recognized credential used by organizations and security professionals around the globe to validate foundation level security skills and knowledge. Candidates are encouraged to use this document to help prepare for CompTIA  security+… Read More »

Greg Palmer

The Process of Migrating an Application to the Cloud

The Process of Migrating an Application to the Cloud Applications can be moved to the cloud quickly with little problem if the migration is planned correctly. The process of constructing a plan for migrating a system to the cloud generally includes the following steps: Define the system goals and requirements. This process includes considering several factors such as… Read More »

Greg Palmer

Mobile Cloud Computing: Benefits & Disadvantages

It has been estimated that within the next few years mobile computing using cloud-based systems will become a trillion dollar business. Currently, it is not clear whether mobile computing is driving the growth of cloud-based systems or vice versa. Either way, most businesses understand that it is critical to have a mobile computing presence. To maximize efficiency and… Read More »

Greg Palmer

The Governance of Cloud-Based Systems

The Governance of Cloud-Based Systems The Dot Com crash of 2000 and corporate scandals such as Enron highlighted the need for better laws to oversee financial organizations, and also highlighted the need for better corporate governance. IT Governance is the part of corporate governance that includes policies, procedures, and controls that relate to information systems use, performance, Return… Read More »

Greg Palmer

Service-Oriented Architecture (SOA) Web Services

Service-Oriented Architecture (SOA) Web Services Service-Oriented Architecture (SOA) is a system of solutions characterized in terms of one or more services. Web services as a type of SOA allow programmers to use web services within their programs to perform specific functions. The following are features and benefits of SOA: The Service feature provides the benefits of improved information… Read More »

Greg Palmer

Security Advantages & Disadvantages of Cloud-Based Systems

Security Advantages & Disadvantages of Cloud-Based Systems Cloud computing benefits enterprises by reducing costs and allowing them to concentrate on their core business rather than IT and infrastructure related issues. Cloud services provide several security advantages and disadvantages. Advantages: Improved patch management and deployment due to cloud providers using specialized staff. Better human-relations reach. Through strong financial positions… Read More »

Greg Palmer

Security Threats to Cloud–Based Systems

Security Threats to Cloud–Based Systems Threats to both cloud-based and on-site solutions should be evaluated with an additional focus directed towards security issues specific to cloud services. Cloud security threats can come from internal or external sources, and can originate as human or software based attacks. Threat agents are as follows; anonymous attackers, malicious service agents, trusted attackers,… Read More »

Greg Palmer