Page 33 - Cyber Defense eMagazine - December 2017
P. 33
address is the one that would get recognized from the web. Many cybersecurity experts
would agree that if you make your public IP address being different from your private IP
address – you could make your network’s communications being more reliable and
secure. For such a purpose, people would use many different tools and the most
applied in such a case is a Virtual Private Network (VPN) gadget. That application
would hide your private IP and possibly the entire location and make your internet
experience being more convenient. Maybe this could be the good tip to many network’s
administrators and engineers doing the configuration of your network.
In conclusion, putting the group of devices in the network is the task that would look for
so many skills. On the other hand, making such a network being secure is the real
challenge. In other words, you need to manage the feasible risk every single day and
even if you are fully concentrated on that task – you could get the victim of cyber
breach. The purpose of this review is to suggest some of the examples of the good
practice and not to provide the silver bullet to all existing concerns. In this case, the
silver bullet would not exist and the only thing we can rely on is the hard work.
About the Author
Milica Djekic is a well-read and frequent
contributor to Cyber Defense Magazine. Since
Milica Djekic graduated at the Department of
Control Engineering at University of Belgrade,
Serbia, she’s been an engineer with a passion for
cryptography, cyber security, and wireless
systems. Milica is a researcher from Subotica,
Serbia. She also serves as a Reviewer at the
Journal of Computer Sciences and Applications
and. She writes for American and Asia-Pacific
security magazines. She is a volunteer with the American corner of Subotica as well as
a lecturer with the local engineering society.
33 Cyber Defense eMagazine – December 2017 Edition
Copyright © 2017, Cyber Defense Magazine, All rights reserved worldwide.