Josh Brade

OSI Model & Cybersecurity

1. Physical Layer (Layer 1) 2. Data Link Layer (Layer 2) 3. Network Layer (Layer 3) 4. Transport Layer (Layer 4) 5. Session Layer (Layer 5) 6. Presentation Layer (Layer 6) 7. Application Layer (Layer 7) Summary The OSI model helps categorize cybersecurity threats and identify at which layer they occur. It also guides implementing… Continue reading OSI Model & Cybersecurity

Asymmetric VS Symmetric Encryption

I had an interview today, and I felt I wasn’t as prepared as I should have been. A technical question came up, and I completely blanked. It really shook me and worsened the impostor syndrome I already struggle with daily. To make matters worse, HR didn’t send me the meeting link until an hour before… Continue reading Asymmetric VS Symmetric Encryption