Page 33 - Cyber Defense eMagazine - December 2017
P. 33

address is the one that would get recognized from the web. Many cybersecurity experts
               would agree that if you make your public IP address being different from your private IP

               address  –  you  could  make  your  network’s  communications  being  more  reliable  and
               secure.  For  such  a  purpose,  people  would  use  many  different  tools  and  the  most

               applied  in  such  a  case  is  a  Virtual  Private  Network  (VPN)  gadget.  That  application

               would  hide  your  private  IP  and  possibly  the  entire  location  and  make  your  internet
               experience being more convenient. Maybe this could be the good tip to many network’s

               administrators and engineers doing the configuration of your network.


               In conclusion, putting the group of devices in the network is the task that would look for
               so  many  skills.  On  the  other  hand,  making  such  a  network  being  secure  is  the  real

               challenge. In other words, you need to manage the feasible risk every single day and
               even  if  you  are  fully  concentrated  on  that  task  –  you  could  get  the  victim  of  cyber

               breach.  The  purpose  of  this  review  is  to  suggest  some  of  the  examples  of  the  good

               practice  and  not  to  provide  the  silver bullet  to  all  existing  concerns.  In  this case,  the
               silver bullet would not exist and the only thing we can rely on is the hard work.





               About the Author


                                                       Milica  Djekic  is  a  well-read  and  frequent
                                                       contributor  to  Cyber  Defense  Magazine.    Since

                                                       Milica  Djekic  graduated  at  the  Department  of

                                                       Control  Engineering  at  University  of  Belgrade,
                                                       Serbia, she’s been an engineer with a passion for

                                                       cryptography,    cyber    security,   and    wireless
                                                       systems.  Milica  is  a  researcher  from  Subotica,

                                                       Serbia.  She  also  serves  as  a  Reviewer  at  the
                                                       Journal  of  Computer  Sciences  and  Applications

                                                       and.  She  writes  for  American  and  Asia-Pacific

               security magazines. She is a volunteer with the American corner of Subotica as well as
               a lecturer with the local engineering society.



                   33    Cyber Defense eMagazine – December 2017 Edition
                         Copyright © 2017, Cyber Defense Magazine,  All rights reserved worldwide.
   28   29   30   31   32   33   34   35   36   37   38