Page 115 - Cyber Defense eMagazine March 2024
P. 115

delivered such information, so far. Further, if the courier is not getting accurate feedback the message
            will not be distributed and in other words, if one device in the network cannot have a rapport with another
            object in the grid no data transfer will be allowed. Moreover, if a protocoling between some networking is
            good, signal will go through, while if not those objects will never talk to one another, so far.




            It seems there was a long time from the very first ancient cryptographic tools until this modern practice
            which mainly relies on some engineering capacities transmitting either open or encrypted signals via
            some communication systems giving a chance to those taking advantage over such abilities to recognize
            each other’s behavior within some information transmission solution. In other words, communication
            protocols can be assumed as a way of the appropriate dealing and only if both sides are happy with one
            another’s manners, they will make a communication, while if not – they will remain silent about each other
            even if they can cope with each one face-to-face. In other words, if everything is not in a perfect condition,
            the message will not go on to anyone. The main challenge with the modern communication protocol is it
            can be pretty vetting-requiring to design such software or hardware as those dealing with cryptology must
            be highly knowledgeable and very experienced to get entrusted with such a project as only well-confirmed
            persons with a plenty of the skills are capable to obtain such a task, so far. Hence, it is needed to think a
            bit about how it works in a digital system designing a two-way communication counting on the arrays of
            the bits which travel through the information packets and truly need a great degree of the knowing of the
            data science and programming in order to make everything being operatable and accurate. Finally, the
            main imperative with the ongoing data science, computer engineering and coding algorithms is to gain a
            strong  application  with  cryptology  getting  in  mind  all  pluses  and  minuses  of  the  current  both  –
            cryptography and cryptanalysis which must be used in a totally rational and responsible way as those
            creating a highly sophisticated weapon should undoubtedly think about an adequate counter-weapon
            letting those using both of them stay safe and secure at the same glance.




            About The Author

            Milica  D.  Djekic  is  an  Independent  Researcher  from  Subotica,  the  Republic  of
            Serbia. She received her engineering background from the Faculty of Mechanical
            Engineering, University of Belgrade. She writes for some domestic and overseas
            presses and she is also the author of the books “The Internet of Things: Concept,
            Applications and Security” and “The Insider’s Threats: Operational, Tactical and
            Strategic  Perspective”  being  published  in  2017  and  2021  respectively  with  the
            Lambert Academic Publishing. Milica is also a speaker with the BrightTALK expert’s
            channel. She is the member of an ASIS International since 2017 and contributor to
            the Australian Cyber Security Magazine since 2018. Milica's research efforts are
            recognized with Computer Emergency Response Team for the European Union (CERT-EU), Censys
            Press, BU-CERT UK and EASA European Centre for Cybersecurity in Aviation (ECCSA). Her fields of
            interests are cyber defense, technology and business. Milica is a person with disability.








            Cyber Defense eMagazine – March 2024 Edition                                                                                                                                                                                                          115
            Copyright © 2024, Cyber Defense Magazine. All rights reserved worldwide.
   110   111   112   113   114   115   116   117   118   119   120