adamh

Detecting IoT_Reaper with Network Traffic Intelligence

Confidentiality, integrity, and availability are the three major components of information security. Over the years it has become easier to ensure the confidentiality of information via encryption, limiting data access to those who possess the correct key. Information integrity can be validated with a hash like MD5 or SHAxxx. If a file produces the same …

Detecting IoT_Reaper with Network Traffic Intelligence Read More »