What is CASB?

CASB stands for Cloud Access Security Breaker, which is a software tool that acts as a barrier between on-premises and a cloud provider’s infrastructure which can be a Azure, AWS , Google Cloud , IBM cloud etc.

The technology is needed to secure cloud services which are being adopted at a large pace by different organization’s. CASB vendors understand that for the protection of cloud services is different since the data is yours but stored in a systems that belong to someone else.

The benefits provided by CASB are:

  • Efficiently govern cloud data.
  • Ensure compliance.
  • Guard against threats.

There are different vendors of CASB such as Bitglass, Microsoft , Mcaffee, Symantec , Cisco , Forcepoint etc. More information about the vendors – click here.

About DocTooLss :

We make Technology EaZy via Docs” 

Follow us @doctools8 | WordPress: www.doctoolss.wordpress.com | Website: www.doctoolss.com| Tumblr: https://www.tumblr.com/blog/doctoolss | Medium: https://medium.com/@doctoolss| Facebook: https://www.facebook.com/DTdoctoolss/  | Linkedin: https://www.linkedin.com/in/doc-tools-a302311a9/

Good practices to be followed for FireWalls to avoid cyberattacks

What are Firewalls?

Firewalls are the network security systems which monitors the incoming and outgoing network traffic as per the pre-determined rules which are being implemented on it.

The well known OEM for firewalls are many but the ones discussed here are Palo Alto, Juniper, Check Point and Cisco ASA.

Password Requirements

  • Set the login attempts to 3?
  • The login attempt from a user should be set to a 3 attempts or minimum so that if incase an unauthorised users tries to break a user account, the attacker attempt could be prolonged and the account could be avoided from any kind of attacks .
  • Set the minimum length of password to be eight or more?
  • The password sets should be bigger in length that too alphanumeric to protect the system from any kind of attacks such as dictionary attacks etc. as minimum length passwords can be easily cracked by an attacker.
  • Set the login time to be 3 minutes or less?
  • The user who logs in to its account should be logged on for a minimum time, if he/she has failed in its first few attempts of login. This will help in keeping the account safe from an unauthorised users.

Authentication Authorization Accounting and Auditing (AAA)


It is the process by which users prove that they are who they claim to be which can be judged by username , passwords, token cards etc.


As in the users are authenticated the next step i.e. Authorization, where in the users or administrators can determine which resources the users or administrators are allowed to access and do operations to be performed as if an unauthorised users get to access the administrators profile by which they could access those resources which could lead to losses to the organisation.

Accounting and Auditing

After the users are authenticated and authorized then it comes it begins to access the network. The role of accounting and auditing is to see how long does the users or administrators stay accessed to their accounts and what all actions are being performed by them. These are also known as crating the audit trails.

Virtual Private Network (VPN)

VPN is termed as a logical connection between two devices via an encrypted tunnel.
Types of VPN:
  1. Remote Access VPN
  2. Site to Site VPN
    • Intranet based VPN
    • Extranet based VPN
Remote Access VPN : - When a user who connects to a private network and access all its services and resources remotely. example : If an employee of a XYZ company is located in a remote zone and wants to access to use its XYZ company's resources or want to apply for a leave on its company's portal he or she will remotely connect to a VPN which is a secure environment and access the resources.
Site to Site VPN :- It is also known as Router-to-Router which is commonly used in the large companies or organisations. Where in  organisations, with branch offices in different locations, will use Site-to-site VPN to connect the network of one office location to the network at another office location. 
Ex: If a bank named as "Cherry Bank" located in Hudson, New York wants to access the customer's data who has been recently re-located to Cloumbia, New York, will access the data of "Cherry Bank" located in Cloumbia, New Work. 
  • Intranet based VPN: When several offices of the same company are connected using Site-to-Site VPN type, it is called as Intranet based VPN.
  • Extranet based VPN: When companies use Site-to-site VPN type to connect to the office of another company, it is called as Extranet based VPN. Ex : Barclays Bank in London, UK is connecting to ANZ Bank , Auckland, NZ.

For more information on Technologies/best practices

About DocTooLss :

We make Technology EaZy via Docs” 

Follow us @doctools8 | WordPress: www.doctoolss.wordpress.com | Website: www.doctoolss.com | Facebook: https://www.facebook.com/DTdoctoolss/

Network Protocols the Formula One of IP Tracks

Network Protocol

Whenever a novice lands in a network domain, he or she gets tangled in the new technical jargons or abbreviations which are being widely used over the different topics of Network Technology.

Here we at DocTooLss try to break and simplify these topics, so that you all are able to understand these jargons and make our world a simple place to live in.

There is always a *conditions apply to everything then why to leave here too, “this blog is for those novice people like me, who have landed and are tangled in this bizzare world of network security/ technology”

So if you think we need to update or add more things or any other feedback, please do comment or mail us @ task.theme@gmail.com | Tweet us @doctoolss8 | Skype us doctools | website: https://doctoolss.com/home/

Find below the protocols used:

TELNET – It is a protocol which allows a user on a remote client machine, called the Telnet client, to access the resources of another machine, the Telnet server, in order to access a command-line interface. There is a drawback with it that no encryption technique is available with it and everything is sent in clear text which includes words.

SSH – It is also similar to a Telnet where a secure session is built, It is employed for doing things like running programs on remote systems, logging into systems, and moving files from one system to another. And it does all of this while maintaining an encrypted connection.

FTP – It transfer files between two machines, used by applications. As a program, it’s employed by users to perform file tasks by hand. FTP also allows for access to both directories and files and can accomplish certain types of directory operations, such as relocating into different ones. There is a drawback with FTP that it can’t be used to execute remote files as a program.

TFTP – It is the version of FTP and is fast and eazy to use. It has no directory-browsing abilities i.e. it can only send and receive files.

HTTP – It is use to manage communication between web browsers and web servers and opens the right resource when you click a link.

HTTPS – It is sometimes known as Secure Hypertext Transfer Protocol. It uses Secure Socket Layer (SSL) which is also referred as SHTTP. It is the secure version of HTTP that shields you with shole security tools for keeping transactions between web browser and a server secure.

NTP – Network type Protocol that works by synchronizing devices to ensure that all computer systems are on the agree time.

DNS – Domain Name Server which converts the name of the sites to a IP address, ex- If you type http://www.google.com which will be converted into

DHCP – Dynamic Host Configuration Protocol that assigns to a host. It works well in small to very large network environment.

APIPA – Automatic Private IP Addressing – WS OS provide a feature called APIPA where clients can automatically self-configure an IP address and subnet mask.

TCP – Transmission Control Protocol it takes large blocks of information from an application and breaks them into segments.

UDP – User Datagram Protocol which basically scale down economy model of TCP and transports information that does’nt require reliable delivery.

ICMP – Internet Control Message Protocol – it is a management protocol and messaging service provider for IP working on network layer as per OSI model.

About DocTooLss :

We make Technology EaZy via Docs” 

Follow us @doctools8 | WordPress: www.doctoolss.wordpress.com | Website: www.doctoolss.com | Facebook: https://www.facebook.com/DTdoctoolss/

Website Built with WordPress.com.

Up ↑

Create your website with WordPress.com
Get started