Cables Cables and more cables
Posted in IT Basics and tagged Cable Standard, Media Standars by YoYo with no comments yet.
TCP/IP model, the peculiar thing about this image, is it’s layout. It is organized in such way to help you understand TCP/IP and how it works. Combining this knowledge will help you have an understanding for the CISSP exam.
Posted in IT Basics and tagged IP, TCP/IP by YoYo with no comments yet.
SSL is a secure protocol used for transmitting private information over the Internet. It works by using a public key to encrypt data that is transferred over the SSL connection. SSL provides data encryption, server authentication, message integrity, and optional client authentication.
TLS – upgrade to SSL, resides on application layer and can secure other protocols/applications, such as SMTP, IMAP, POP3, and HTTP.
SET (Secure Electronic Transaction) protocol originated by VISA and MasterCard as an Internet credit card protocol using digital signatures; makes USE of an electronic wallet on a customer’s PC and sends encrypted credit card information to merchant’s Web server, which digitally signs it and sends it on to its processing bank. It is comprised of three different pieces of software, running on the customer’s PC (an electronic wallet), on the merchant’s Web server and on the payment server of the merchant’s bank. The credit card information is sent by the customer to the merchant’s Web server, but it does not open it and instead digitally signs it and sends it to its bank’s payment server for processing.
Posted in IT Basics by YoYo with no comments yet.