Network Architecture

Network architecture is the design of a communication network. It is a framework for the specification of a network’s physical components and their functional organization and configuration, its operational principles and procedures, as well as data formats used.

Stateless Authentication (Token-based Authentication)

Token-based authentication enables users to obtain a token that allows them to access a service and/or fetch a specific resource, without using their username and password to authenticate every request. Because the token can be a self-contained entity that conveys all the required information for authenticating the request, then it is often referred to as stateless authentication. In this case, the …

Stateful Cloud

Stateful protocols are all about recording session activity. Stateful cloud platforms use cookies to validate through Session Based Authentication during which, the server will create a session for the user following his or her login. The session ID is then stored on a cookie on the user’s browser. For the entire duration of the user’s session, the cookie containing the digital …

Stateless Cloud

What are Stateless Clouds? Transmissions via stateless protocols mean data is being transmitted without any information about sender or receiver being retained by either. Thus both are unaware of the “state” of the other. The upside of clouds using stateless protocols is that they allow administrators to use the cloud without revealing credential information, reducing the risk of credential theft. Additionally, …

Demilitarized Zone (DMZ)

A DMZ, short for demilitarized zone, is a network (physical or logical) used to connect hosts that provide an interface to an untrusted external network – usually the internet – while keeping the internal, private network – usually the corporate network – separated and isolated form the external network. As systems that are most vulnerable to attack are those that provide …

Zero Trust

Zero Trust, Zero Trust Network, or Zero Trust Architecture refer to security concepts and threat model that no longer assumes that actors, systems or services operating from within the security perimeter should be automatically trusted, and instead must verify anything and everything trying to connect to its systems before granting access. The term was coined by a security analyst at Forrester …

Virtual Private Network (VPN)

A virtual private network (VPN) is a secured communications channel implemented over shared, public networks – i.e. the internet – to connect remote users and machines to a private network – i.e. a company’s network. Privacy is achieved by authenticating the connecting parties and encrypting the communications channel to prevent eavesdropping on data traversing the channel. VPN is most commonly used …