Point-To-Point Protocol (PPP)
Point-To-Point Protocol (PPP): A data link layer communication protocol primarily used to establish a direct connection between two nodes in a network. It provides authentication, encryption, and compression features to make the data transmission secure and efficient. PPP was commonly used in dial-up internet connections, and it is still a foundational protocol in several forms […]
Phishing
Phishing: A type of cyber-attack that involves tricking individuals into revealing sensitive information, such as passwords or financial data, through fraudulent emails or websites. It is often used by hackers to gain access to accounts or steal personal information. 3 examples of phishing attacks are fake emails from banks asking for account information, fake online […]
Point-To-Point Tunneling Protocol (PPTP)
Point-To-Point Tunneling Protocol (PPTP): Point-to-Point Tunneling Protocol (PPTP) is an older VPN protocol used to implement virtual private networks, offering encapsulation of PPP packets over IP for the creation of a VPN over a TCP/IP-based network. While it has been widely deployed, it’s considered less secure than other VPN protocols due to known vulnerabilities and […]
Phreakers
Phreakers: Individuals who engage in the unauthorized access of telecommunication systems, such as telephone networks or voicemail systems. They may use special equipment or software to bypass security measures and gain access to restricted information or services. It is used in the field of information security to identify and prevent potential security breaches in telecommunications […]
Point-to-point
Point-to-point: A communication link established between two specific devices to facilitate exclusive data transfer between them. This mode of communication is widely employed in networks to ensure that data can travel from one fixed location to another without being interrupted or accessed by unauthorized entities. It is often used in telecommunications and computing, often forming […]
Physical access control
Physical access control: The measures put in place to restrict physical access to a facility, building, or device. This can include security guards, keycards, security cameras, and biometric scanners. It is used in the field of information security to prevent unauthorized individuals from gaining access to sensitive information or systems. 3 examples of physical access […]