04.01.2021 Views

Cyber Defense eMagazine January 2021 Edition

Cyber Defense eMagazine January Edition for 2021 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cyber security expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group as well as Yan Ross, US Editor-in-Chief, Pieruligi Paganini, Co-founder & International Editor-in-Chief, Stevin Miliefsky, President and many more writers, partners and supporters who make this an awesome publication! Thank you all and to our readers! OSINT ROCKS! #CDM #CDMG #OSINT #CYBERSECURITY #INFOSEC #BEST #PRACTICES #TIPS #TECHNIQUES

Cyber Defense eMagazine January Edition for 2021 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cyber security expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group as well as Yan Ross, US Editor-in-Chief, Pieruligi Paganini, Co-founder & International Editor-in-Chief, Stevin Miliefsky, President and many more writers, partners and supporters who make this an awesome publication! Thank you all and to our readers! OSINT ROCKS! #CDM #CDMG #OSINT #CYBERSECURITY #INFOSEC #BEST #PRACTICES #TIPS #TECHNIQUES

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

the plaintext ends up with some sign of interpunction, so there can be the entire variations of the possible<br />

decrypted information. In other words, as the E2EE is critical at its endpoints it can be quite concerning<br />

on its way through from the source to destination as the channel can be tapped and potentially broken<br />

in.<br />

In order to illustrate the link encryption, we can use an example of the highway with its entire infrastructure<br />

that serves in directing the traffic on. The driver on that road must know where he goes and he has the<br />

permission to rely on the traffic signalization. In other words, the usage of the maps and GPS navigation<br />

is allowed, but what those all if the driver does not know the pathway. It seems that the link encryption is<br />

more like sending the packet of the information through the well-protected channel which routing<br />

information bits are carefully encrypted. The only fining being available at that moment is the information<br />

about the next stop. So, if it is needed to apply some GPS navigation it’s necessary to go step-by-step.<br />

In other words, stop linkage information is included as the plaintext and reading so it’s possible to figure<br />

out where the next station to such a packet is. In so general terms, those stops can be considered as<br />

hops where the entire packet is decrypted and re-encrypted in order to obtain the information about where<br />

further the packet should be delivered. The best practice has suggested that the most useful solution is<br />

the combination of the E2EE and link encryption for a reason the both – payload and routing information<br />

– are well-protected. That sort of cryptography is known as the super-encryption. The hop is any device<br />

in the network where once directed traffic can go and it can be the router, modem or server. The hop is<br />

also so sensitive point in the network because the hackers can identify that part of the IT infrastructure<br />

and try to attack the place where decryption of the packet itself takes place. That is especially the huge<br />

risk in case of the network monitoring for a reason the bad guys can find and exploit the places where<br />

the plaintext is widely accessible. In other words, the ongoing cyber criminals are extremely skillful<br />

individuals with the exceptional technical brightness that are capable to discover any weakness in the<br />

system and take advantage over so. The mix of the E2EE and link encryption gives the safer environment<br />

for data transport, but it’s still vulnerable to the high-tech attacks and campaigns.<br />

About the Author<br />

Milica D. Djekic is an Independent Researcher from Subotica, the<br />

Republic of Serbia. She received her engineering background from<br />

the Faculty of Mechanical Engineering, University of Belgrade. She<br />

writes for some domestic and overseas presses and she is also the<br />

author of the book “The Internet of Things: Concept, Applications<br />

and Security” being published in 2017 with the Lambert Academic<br />

Publishing. Milica is also a speaker with the BrightTALK expert’s<br />

channel. She is the member of an ASIS International since 2017<br />

and contributor to the Australian <strong>Cyber</strong> Security Magazine since<br />

2018. Milica's research efforts are recognized with Computer<br />

Emergency Response Team for the European Union (CERT-EU),<br />

Censys Press, BU-CERT UK and EASA European Centre for<br />

<strong>Cyber</strong>security in Aviation (ECCSA). Her fields of interests are cyber<br />

defense, technology and business. Milica is a person with disability.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>January</strong> <strong>2021</strong> <strong>Edition</strong> 49<br />

Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!