0P3N Blog
Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.


This is a back-up process of public and private key material over multiple systems or devices. It’s a tool that prevents the re-creation of private and public key material from the backup. The key materials are backed up and then mathematically distributed across several systems or devices. Usually three people are assigned specific, separate job responsibilities within different portions of ...


The central processing unit (CPU) is the computer component that controls system operations. It comprises an arithmetic logic unit (ALU), which runs all arithmetic and logical operations, and a control unit, which processes the decoding of instructions and implementation of the requested instructions. Older computers employed multiple chips to take on the task. There are some functions that require support ...


Computer memory retains data that is to be processed by the CPU. Computer memory falls into two categories: nonvolatile memory, which is retained even when the computer is powered off, and volatile memory, data that is lost when the computer loses power. Read-only memory (ROM): this is a type of nonvolatile memory that is preserved when the computer is powered ...


A database system can be used to retain and process data in one or more tables without needing to write specific programs to run these functions. A Database Management System (DBMS) provides high-level commands to work on the data in the database. The DBMS allows the database administrator to control all components of the database, including its design, performance, and ...


A network is defined as a series of two or more computers connected together to communicate and exchange information and other resources, such as centralized data and software. Networks are built around a cable or wireless connection that employs radio wave or infrared signals to connect the computers. For a network to work properly it must supply connections, communications, and ...


Networks can be divided into two types with respect to how data is stored, how network security is administered, and how the computers on the network interact. The two types are: Peer-To-Peer (P2P) Network: When computers are connected on a network, each computer functions as a server that shares data and services, or as a client that utilizes data or ...


The mapping of a LAN design is called Topology. There are four categories: Star topology Bus topology Ring topology Mesh topology Hybrid combinations of these topologies also exist. Star topology – all computers and devices are connected to a main hub or switch. The hub or switch amasses and disburses the flow of data within the network. Star ...


The Open Systems Interconnection (OSI) reference model was developed by the International Standards Organization (ISO) in 1984 to define network communications, and interpret the flow of data on a network. The OSI reference model is made up of seven layers that starts with the physical connection and ends with the application. The seven OSI layers are: Physical Layer Data-Link ...


When a host receives a data transmission from another host on the network, that data is processed at each level of the OSI to the next higher layer, in order to present a useful data transmission to the end-user. Part of this processing entails the creation of headers and trailers by the sending host’s software or hardware that are placed ...


The TCP/IP Application Layer: This pertains to communications services to applications and acts as a go-between for the network and the application. It also handles presentation and administering communication sessions. It encompasses the Application Layer, Presentation Layer and Session Layer of the OSI reference model. Examples: HTTP, POP3, and SNMP. The TCP/IP Transport Layer: This layer addresses multiple functions, ...