What is Link Layer Encryption?

Finjan TeamBlog, Cybersecurity

Finjan What is Link Layer Encryption?

Network security is frequently implemented by considering the network as a series of layers, each dedicated to a particular function (data transport, applications, user interactions, etc.). This model has the underlying logic that, with several layers to have to work against, any potential attacker won’t find it easy to break through to the heart or kernel of the system, where … Read More

Anatomy of a TCP Sequence Prediction Attack

Finjan TeamBlog, Cybersecurity

Finjan Anatomy of a TCP Sequence Prediction Attack

With so much of our business and personal lives relying on the transfer of information between points on the internet, it’s little wonder that cyber-criminals have long favored these connections as a target for their operations. Hijacking connections and/or intercepting data streams offers hackers a prime opportunity to extract valuable information assets, siphon off digital financial ones, or to interject … Read More

Blacklisting vs Whitelisting – Understanding the Security Benefits of Each

Finjan TeamBlog, Cybersecurity

Finjan Blacklisting vs Whitelisting   Understanding the Security Benefits of Each

Guarding individual computer systems and organizational networks from the effects of malicious software or the intrusion of unauthorized users and applications begins with solid perimeter and endpoint defenses, and an effective method of access control. Though opinions differ as to which is best, two approaches dominate in the bid to restrict and regulate access to vital system and network resources … Read More

MAC (Media Access Control)

Finjan TeamBlog, Network Security

Finjan MAC (Media Access Control)

Telecommunications and old-school postal systems use a hierarchy of identifying characteristics (number, exchange, zip or area code, state or country code, etc.) to break the process of transmitting messages into manageable steps, each of which may be handled by mechanisms appropriate to a given stage (mailbox, local sorting office, etc.). The same holds true for network and internet communications, where … Read More

A Closer Look at Sniffing (aka Packet Sniffing)

Finjan TeamBlog, Network Security

Finjan A Closer Look at Sniffing (aka Packet Sniffing)

In the realm of cyber-security, it’s sometimes the case that what works as a defense or deterrent in preserving the integrity of computer networks may also be turned against them as a weapon. This is certainly true of sniffing. What is Sniffing? Sniffing (or packet sniffing) is the process of capturing packets of data as they flow across a computer … Read More

Simple Network Management Protocols (SNMP)

Finjan TeamBlog, Network Security

Finjan Simple Network Management Protocols (SNMP)

Network administrators and Information Security Officers (ISOs) have a tough job monitoring and marshaling the resources of corporate infrastructure – especially at a time when enterprises are expanding their operations beyond localized data centers and campuses to dispersed networks having the potential to span the globe. Fortunately, there’s a standardized set of mechanisms that can streamline and rationalize network management … Read More

Network Security Objectives and Attack Modes

Finjan TeamBlog, Network Security

Finjan Network Security Objectives and Attack Modes

A network exists when two or more computing systems are linked in a mutually dependent relationship that enables them to share resources and/or information. The connection between systems may be a physical one – as is the case with a traditional private data center, where banks of servers and systems are connected by cables, routers, and switches. It may also … Read More

Border Gateway Protocol

Finjan TeamBlog, Internet Security

Finjan Border Gateway Protocol

With the increasing integration of cloud-based telecommunications and data transmission over the internet, there’s a need for different corporate and private networks to interact with each other. To preserve data integrity and to ease the flow of information, it’s essential to have standardized pathways and rules to govern this interchange. One of these is the Border Gateway Protocol or BGP. … Read More

TCP/IP Vulnerabilities

Finjan TeamBlog, Cybersecurity

Finjan TCP/IP Vulnerabilities

Part of the beauty of using the internet to move information around lies in the apparently seamless and user-friendly way in which transmissions are accomplished. This stems in large part from the use of a common set of transmission/reception mechanisms or protocols – but it’s the very standardization of these methods that leaves them so open to exploitation and attack. … Read More