Can exponential back-off be abused to "knock off" a station off a network?

In my Cryptography & Network Security course, my professor mentioned that you can "knock off" a station of a network by abusing the timings of the exponential off algorithm used in CSMA/CD and CSMA/CA. He explains that the at… Continue reading Can exponential back-off be abused to "knock off" a station off a network?

Does the Time-To-Live (TTL) value of DNS records have any security implications?

I’m currently reading about resource record in the Domain Name System (DNS), in particular about the Time to live (TTL) aspect of start of authority records (SOA) records. It seems to me that the TTL was firstly defined in RFC 1034 and la… Continue reading Does the Time-To-Live (TTL) value of DNS records have any security implications?

What is the actual use-case for Passive-Inteface on a Link-State Router compared to other forms of network security?

I am studying Networks and Routing as part of developing skills in IT and Cybersecurity, and I have learned about the Passive Interface mode for, say, OSFP. Passive Interface disables the sending of Hello Packets along certain interfaces, … Continue reading What is the actual use-case for Passive-Inteface on a Link-State Router compared to other forms of network security?

Consider a Fraudulent bank website, would it violate all the aspects of the CIA triad or any one? [closed]

I believe it would violate all the three aspects due to following reasons:

Confidentiality: Since the website is obviously a scam, in case any person/user registers it, the data of the user would not be confidential or would be up for sal… Continue reading Consider a Fraudulent bank website, would it violate all the aspects of the CIA triad or any one? [closed]

Ransomware and the C-I-A Triad

In earlier, more innocent (?) times, cyberattacks seemed to be fairly straightforward. You have the data exfiltration attacks, where copies of sensitive personal information and intellectual property are stolen, often without the victims’ knowledge sin… Continue reading Ransomware and the C-I-A Triad

Confidentiality, Integrity, or Availability? Please help! [closed]

I got asked 3 questions in my university course today and I’m really torn because they feel like such subjective topics that can be argued in many ways.

A security association lifetime of 14400 seconds is in place.
Multi-factor authentic… Continue reading Confidentiality, Integrity, or Availability? Please help! [closed]

Multi-Factor Authentication = Confidentiality or Integrity? [duplicate]

I got asked 3 questions in my university course today and I’m really torn because they feel like such subjective topics that can be argued in many ways.

A security association lifetime of 14400 seconds is in place.

Multi-factor authenti… Continue reading Multi-Factor Authentication = Confidentiality or Integrity? [duplicate]