Category Security

Encoding

It’s often necessary to convert data from one format to another format. This process is called encoding. You might encode data to save space, to make it easier to process, or for a variety of other reasons. Think, for example…

Encryption

Encrypting a piece of information involves protecting it by turning it into an unreadable mess for unauthorised viewers, but making it perfectly legible for its intended audience. The scrambled version is called ciphertext, and to anyone without the key to…

Firewall

The word Firewall takes its name from the world of architecture, where it means a partition made of fireproof material. In the world of computers and networking, a firewall also helps to stop you getting burned, by keeping outsiders breaking…

sFTP

In today’s cyber security environment you can no longer risk transferring your data across an unencrypted connection. Standard FTP ( File Transfer Protocol ) has been around a long time and does not on its own encrypt data, it’s simply…

SIP

SIP ( Session Initiation Protocol ) is a protocol used for initiating/maintaining/terminating real-time sessions related to voice, video and messaging apps. You need to understand SIP  if you have any interest in information security, because it’s a signaling communications protocol.…

SSH

SSH and FTP are frequently discussed together. Secure Shell was created in 1995 and can be described as “a cryptographic network protocol for secure data communication”. SSH permits remote command-line login and remote execution. It shares many of the features…

SSL

SSL ( Secure Socket Layer ) is a security protocol that lets applications encrypt information that moves between a client to a matching server. The successor of SSL – TLS  ( Transport Layer Security ) SSL protocol was deprecated with…