Skip to main content

Posts

Showing posts from January, 2017

Software Defined Networks: An Introduction

Description of the technology (Urias, Stout, & Loverro, 2015) Software defined networks (SDNs) is an emerging technology that is changing the defense and networking paradigm. (Hande, Jadhav, Patil, & Zagade, n.d.) Traditionally, network devices like switches and routers, using protocols (on the control plane) such as Open Shortest Path First(OSPF), Border Gateway Protocol(BGP) and Spanning Tree Protocol(STP) determine the best port or interface to forward packets (on the data plane). These routing protocols use static information such as hop count to determine the best path through the network. Moreover, (Ali, Sivaraman, Radford, & Jha, 2015) this decentralized method of network management is the leading cause of network faults and bugs due to errors during configuration. Not to mention, a proliferation of ’internet ossification phenomenon’ which is basically the stagnated network innovation. Additionally, there was no segregation of control and data plane which is har...

Book Summary: Tallinn Manual on the International Law Applicable to Cyber Warfare

This is a summary of book entitled 'Tallinn Manual on the International Law Applicable to Cyber Warfare'.   In 2008, the NATO CCD COE brought together a group of independent International Group of Experts to produce a manual to clarify the ambiguities surrounding cyber operations, particularly focusing on applications of jus ad bellum and just in bello. The book identified the international law and its applicability to cyber warfare and produces 95 rules to govern cyber conflicts. Each rule is supported with commentary provided by the experts and observers.  Its scope is in relation to cyber-to-cyber operations only. The book can be viewed here for free:  Tallinn Manual

Review: Grizzly Steppe

Report: Available Here Review: Being someone new to information and cyber security I was expecting a juicy technical account of what happen during the USA elections. I quickly hurried by moccachino and sandwich to sprint back upstairs to my office to read the JAR (Joint Analysis Report) prepared by the Department of Homeland Security and the FBI. The report mainly highlights a lot of boilerplate recommendations that organizations should be aware of in protecting their networks. It contains mainly cyber security best practices and top mitigation practices. In addition, it lists a names aliases that were detected in executing the hacks. This report maybe a political ploy? But it does contain some useful information.