PinnedJolie CurranOne Page: OSI Layers and CybersecurityAll in one sheet! This sheet shows:Oct 14, 2021Oct 14, 2021
PinnedJolie CurranDating & Enterprise Security Architecture — they are more similar than you think.In a great dating relationship each party acts in a mutually beneficial manner. With the goal of strengthening the relationship. To keep a…Jul 29, 2021Jul 29, 2021
Jolie CurranMock Penetration TestWell, I did it. I was actually able to get into a network and find information — in a mock situation, of course.Oct 9, 2021Oct 9, 2021
Jolie CurranPacket Capture a Cybersecurity Must HaveCatching bad actors in the cyber world starts with analyzing, reviewing, and listening to Internet Protocol (IP) traffic. As you can…Sep 20, 2021Sep 20, 2021
Jolie CurranNetwork Appliances Secure network design — Part 2Network appliances help computers with the flow of information across the network. A network appliance could be a DSL router, camera, or…Aug 11, 2021Aug 11, 2021
Jolie CurranThat’s quite the balancing act — load balancing explainedIt’s 5 p.m. There is one cashier. Eight people standing in line. This when I roll my eyes. And in a whisper I say, “Ugh. I am never going…Aug 5, 2021Aug 5, 2021
Jolie CurranNetwork Address Translation and Port Address Translation — A ScenarioProblem: lack of public IP addresses available on the Internet for the Hard Knocks University (HKU)Aug 4, 2021Aug 4, 2021
Jolie CurranCIDR — This isn’t the latest drink.There are two main addressing schemes:Aug 4, 2021Aug 4, 2021
Jolie CurranStaying Safe — Protocols Can Do That.Doctors, nurses, and EMT have the ultimate goal of keeping patients healthy and safe. The same is true for secure computer protocols.Aug 3, 2021Aug 3, 2021
Jolie CurranSignatures, Keys & SaltWhat do digital signatures, keys, and salt have in common? They are ways to keep information safe. These cryptographic tools make sure…Jul 27, 2021Jul 27, 2021