What is Encoding?

Encoding is the process of putting a sequence of characters (letters, numbers, punctuation, and certain symbols) into a specialized format for efficient transmission or storage. Via Technopedia: Encoding involves the use of a code to change original data into a form that can be used by an external process. The type of code used for […]

Read More

How to prepare for an infosec job interview

Study the job description and align your resume to match. The goal is to align yourself to the job description as much as possible, but don’t stretch the truth. If a job description is available, and it has a detailed list of functional skills, prepare on paper how you match the skills to answer how […]

Read More

What is a Payload?

A payload is either: 1) The essential data that is being carried within a packet or other transmission unit. The payload does not include the “overhead” data required to get the packet to its destination. Note that what constitutes the payload may depend on the point-of-view. To a communications layer that needs some of the […]

Read More

What is NAT?

Address translation, specifically Network Address Translation (NAT), can be used to hide one or more devices behind a router or firewall that is performing NAT. This enables us to extend the life of IPv4 because a single globally routable IP address can support thousands of private IP addresses being translated to a single IP address. […]

Read More

What is Subnetting?

The process of subnetting involves taking a network and carving it up into smaller logical networks. It is a common practice to associate a single subnetwork with a single VLAN.

Read More

What is Data Loss Prevention (DLP)?

Data loss prevention (DLP) is a strategy for making sure that end users do not send sensitive or critical information outside the corporate network. The term is also used to describe software products that help a network administrator control what data end users can transfer. DLP software products use business rules to classify and protect […]

Read More

What is Identity and Access Management (IAM) ?

Identity and access management (IAM) is the security discipline that enables the right individuals to access the right resources at the right times for the right reasons. IAM addresses the mission-critical need to ensure appropriate access to resources across increasingly heterogeneous technology environments, and to meet increasingly rigorous compliance requirements. This security practice is a […]

Read More