PinnedLydia CaoMy experience with ISC2 Certified in Cybersecurity(CC) CertificationI’m delighted to share that I’ve recently passed the Certified in Cybersecurity (CC) exam by ISC2. ISC2 is still offering free online…Apr 5Apr 5
Lydia CaoA Collection of Cybersecurity WebsitesDuring my study in cybersecurity, I found many valuable and useful websites. Thus, this article serves as a collection of all cybersecurity…Jun 18Jun 18
Lydia CaoCryptography: Navigating the Order of Signature and EncryptionIn the complex process of cryptography, the order of signature and encryption has profound implications for non-repudiation and integrity…Apr 28Apr 28
Lydia CaoKerberos: Key Distribution for Symmetric Encryption and User AuthenticationThis article mainly introduces a summary of the Kerberos Version 4 Message Exchange process.Mar 11Mar 11
Lydia CaoIEEE 802.11i Wireless LAN SecurityThis study note is mainly introducing the basic components and services of IEEE 802.11i.Mar 11Mar 11
Lydia CaoNetwork Defenses: Firewalls and Intrusion Detection System (IDS)This article will introduce network defense methods related to firewalls, DMZ, and IDS.Mar 11Mar 11
Lydia CaoDiffie-Hellman key Exchange: Basics and VulnerabilitiesIn this article, we will talk about Diffie-Hellman key Exchange, and how it works.Feb 28Feb 28
Lydia CaoNetwork Security: Threats & ArchitectureIn this article, we are going to talk about three kinds of attacks from network, attack surfaces, and Security Architecture from ITU’s…Jan 28Jan 28