
- Details
- Written by: Meena
- Category: Cybersecurity PRISM
Cisco’s encrypted Virtual Private Network (VPN) solutions offer data security within private networks that are extended across public networks such as the Internet. Appearing to the user as private network links, VPNs actually create a highly secured wide area network (WAN) through the use of dedicated connections and encryption.

- Details
- Written by: Meena
- Category: Cybersecurity PRISM
Access control is “the process of granting or denying specific requests . . . ".
This process needs the following inputs:
• Who issued the request?
• What is requested?
• Which rules are applicable when deciding on the request?

- Details
- Written by: Meena
- Category: Cybersecurity PRISM
Amazon Web Services (AWS) Virtual Private Cloud (VPC) Flow Logs containing network flow metadata offer a powerful resource for security. Not only can you log all IP flows in a VPC network with help from flow logs, but you can also use this data to perform various types of flow analysis.

- Details
- Written by: Meena
- Category: Cybersecurity PRISM
WHAT IS THE SURFACE WEB?
Everyone who has access to the internet uses the Surface web, or as some like to call it — the Clearnet. That content is indexed by different search engines like Google, Bing, Yandex, Duckduckgo, Yahoo, Baidu, etc. A typical search query consists of only keywords and even when you do not know the exact address of a website, those keywords are taken as inputs by the search engines to use their algorithms and give you the best results possible. Again — results consist of only indexed content by that search engine.
Although we use the Surface web for quite a long part of our days and feel like it is infinite, it actually is just a fraction of the whole package. The remaining part is hidden or invisible, but it is not impossible to access it.

- Details
- Written by: Meena
- Category: Cybersecurity PRISM
IBM created the IBM Security Framework to help ensure that every necessary IT
security aspect can be properly addressed when you use a holistic approach to
business-driven security.