Ten Years of Academic Writing

Data Link Layer Attacks

Data Link Layer Attacks

Vincent Triola

The data link layer, layer 2, forms the second layer of Open Systems Interconnection model (OSI) of computer networking, which is comprised of seven-layers.

Data Link Layer Attacks

Vincent Triola

The data link layer, layer 2, forms the second layer of Open Systems Interconnection model (OSI) of computer networking, which is comprised of seven-layers.

Sony Network Security Analysis

Sony Network Security Analysis

Vincent Triola

In 2014, Sony experienced a network security breach which resulted in the release of thousands of emails, company communications, and other sensitive data (Pagliery, 2015). For a company as large...

Sony Network Security Analysis

Vincent Triola

In 2014, Sony experienced a network security breach which resulted in the release of thousands of emails, company communications, and other sensitive data (Pagliery, 2015). For a company as large...

The CIA Security Triad isn’t solely about balancing network security.

The CIA Security Triad isn’t solely about balan...

Vincent Triola

One might think that CIA is a balance of elements that allow for maximization of user ability and security. This might be true but this balancing act is really an...

The CIA Security Triad isn’t solely about balan...

Vincent Triola

One might think that CIA is a balance of elements that allow for maximization of user ability and security. This might be true but this balancing act is really an...