Posts

Showing posts from November, 2020

BUILDING OF ZERO TRUST MODEL ARCHITECTURE

Image
  Zero Trust Model is the new buzz of the cybersecurity system. With its modern approach for providing safe network coverage, it has become the first to go choice of users nowadays. With more cases being reported of breaching happening more from internal factors, the Zero Trust Model was developed. This security system works on the principle of  “trust, but verify” which means and apply as the way, your network system would trust and believe every user coming across but the access to the data and information is given once the user is providing the server with proper authentication and after they overcome the verification process. The working mechanism of the Zero Trust Model aims to safeguard data and access grants across the network by verifying the user identity and location. This security system works, inspects, and keeps track of everything, henceforth providing the network system with secured network parameters after analyzing the whole server usage and working process. Being the

RECOMMENDATION FOR USING SSH KEYS

Image
SSH keys also commonly known as Secure Shell Protocol keys are the set of keys that allow the users to exchange data and files between two channels through a secure medium. The primary function of these key sets is to provide a secure private transaction medium to the users from both client end as well as server end. These keys are mostly used for the Git repository function.   Public key cryptography is mostly used by SSH keys for communicating. Asymmetric algorithms are used in public-key cryptography. While using SSH keys, the key used to encrypt the message is totally contrary to the one used to decrypt it.   These keys actually comprise two sets namely - Public key and private key. A public key is held by all, which means anyone can get access to it without much trouble, though the access to the private key is only with the users and the permission to step into the data is only granted after proper authentication is provided with proper passwords and valid I’d network.  TIPS FOR

RBAC (Role-Based Access Control ) and its Alternatives

Image
  Role-based access control is the security network system that allows the grant data access to the person on the basis of their role at a specific platform. It actually means the grant access to particular information will be given to an individual as per their job profile and only that much detail would be provided to them as they need to perform their tasks. Implementing RBAC for security, allows the higher authorities to build a tight network system for the users which henceforth makes access management easier. By following the concept of a Role-based access control system, the participant gets only limited access to the firm's data. This security level makes sure no other person intrudes on the specifics for no use and without any purpose. There are a lot of ways by which one can perform functions to follow RBAC by the use of the custom level privilege. The custom level privilege is actually the user level mode, which somehow means that privilege to the facts and figures wou

A - Z Guide For SSH Keys (Understanding SSH Keys)

Image
  SSH keys are actually the set of keys used to safeguard the network from intruders. SSH stands for Secure Socket Shell, in a simple language it is also known as Secure Shell. These pairs of keys work on the SSH protocol. SSH protocol was developed after a scenario of trespassing was observed on a network system. SSH Protocol was developed in 1995 by Tatu Ylonen. The main idea behind introducing the SSH Protocol was to protect the servers from attackers who try to make an attempt to gain access to your network with the help of usernames and passwords. And so just to make sure that no one steps in your network area without proper authentication SSH keys are developed. The main function of these keys is to provide users with secure private network transactions from both ends, whether being client-side or server-side. SSH keys  are mostly used for allowing single sign-in only at one time. These pairs of keys are used for managing networks, operating systems, and configurations.SSH keys w