Intrusion Prevention Systems, or IPS, are security tools that monitor computer networks for suspicious activity and take automatic action to stop potential threats. They work by analysing network traffic, looking for patterns or behaviours that match known attacks or unusual activity. When something suspicious is detected, the system can block the harmful traffic, alert administrators,…
Category: Network Security
Key Agreement Protocols
Key agreement protocols are methods that allow two or more parties to create a shared secret key over a public communication channel. This shared key can then be used to encrypt messages, ensuring that only the intended recipients can read them. These protocols are important for secure online activities, such as banking or private messaging,…
Hash-Based Message Authentication
Hash-Based Message Authentication is a method used to check if a message has been altered and to confirm who sent it. It works by combining the message with a secret key and then applying a hash function, creating a unique code called a message authentication code (MAC). If the message changes, the code will not…
Software-Defined Networking (SDN)
Software-Defined Networking (SDN) is a method of managing computer networks that separates the system controlling where data goes from the devices that actually move the data. This makes it easier for network administrators to manage, adjust, and automate network behaviour using software rather than manual configuration of hardware. SDN allows updates and changes to be…
Public Key Infrastructure (PKI)
Public Key Infrastructure, or PKI, is a set of technologies and rules that help keep digital communications secure. It uses a system of digital certificates and encryption to verify the identity of people, devices, or websites. PKI makes sure that the information sent online is private and has not been changed by anyone else
Digital Certificate Management
Digital certificate management is the process of handling digital certificates, which are electronic credentials used to verify the identity of users, devices, or organisations online. It involves creating, distributing, renewing, and revoking certificates to ensure secure communication and data exchange. Proper management helps prevent expired or compromised certificates from causing security risks.
Perfect Forward Secrecy
Perfect Forward Secrecy is a security feature used in encrypted communications. It ensures that if someone gets access to the encryption keys used today, they still cannot read past conversations. This is because each session uses a unique, temporary key that is not stored after the session ends. Even if a server’s long-term private key…
Secure Key Exchange
Secure key exchange is the process of safely sharing secret cryptographic keys between two parties over a potentially insecure channel. This ensures that only the intended participants can use the key to encrypt or decrypt messages, even if others are listening in. Techniques like Diffie-Hellman and RSA are commonly used to achieve this secure exchange,…
OCSP Stapling
OCSP Stapling is a method used to check if a website’s SSL certificate is still valid without each visitor having to contact the certificate authority directly. Instead, the website server periodically gets a signed response from the certificate authority and ‘staples’ this proof to its SSL certificate during the connection process. This makes the process…
Certificate Revocation Lists
A Certificate Revocation List (CRL) is a list published by a certificate authority that shows which digital certificates are no longer valid before their scheduled expiry dates. Certificates can be revoked for reasons such as compromise, loss, or misuse of the private key. Systems and users check CRLs to ensure that a certificate is still…