Be patient!

We are updating old articles and new articles. Hope you this of interest. Please feel free to comment on articles

802 Standard is the technical side of the the internet. Cyber Security is the locking down the miss use of the 802 attempting to prevent criminal activity. The failure of Cyber security is due to politics and ignorance. Logic is solid at the 802 ground level, Just ones and zeros. Its what is above this that the games are played allow holes for criminal activity.

In the AI document, AI say these point below. But I say that cyber security is required because man has made standards above the 802 standard to allow activity that can lead to nefarious activity.

Until a national disaster occurs, these holes that allow nefarious will continue.

So we take this somewhat loose standards above 802 and add nefarious AI to the mix and a world dominated by bad characters will control the internet.

The internet must controlled nationally based on the laws of the land. And as any asset need Identity control and monitoring. We must Protect our borders

What is there about 802 that requires cyber security policies
802 standards themselves do not directly require cybersecurity policies,
as they define the technical specifications for networking technologies.
However, the implementation and usage of these standards can pose security
risks if not properly managed. Here are a few reasons why cybersecurity
policies are necessary when using 802 standards:

  1. Unauthorized Access: If not properly secured, networks based on 802
    standards can be vulnerable to unauthorized access. Cybersecurity policies
    should include measures to prevent and detect unauthorized access, such as
    strong passwords, multi-factor authentication, and regular security
    audits.
  2. Data Breaches: If data is transmitted over networks based on 802
    standards, it can be at risk of being intercepted or stolen. Cybersecurity
    policies should include measures to protect data, such as encryption,
    secure data transmission protocols, and regular backups.
  3. Malware and Viruses: Networks based on 802 standards can be vulnerable
    to malware and viruses. Cybersecurity policies should include measures to
    prevent and detect malware, such as antivirus software, regular software
    updates, and user education.
  4. Denial of Service (DoS) Attacks: Networks based on 802 standards can be
    targeted by DoS attacks, which can disrupt or disable the network.
    Cybersecurity policies should include measures to detect and mitigate DoS
    attacks, such as intrusion detection systems and traffic monitoring.
  5. Compliance with Regulations: Depending on the industry and the type of
    data being transmitted, there may be regulations that require certain
    cybersecurity measures. Cybersecurity policies should be developed to
    comply with these regulations.

In summary, while 802 standards do not directly require cybersecurity
policies, the implementation and usage of these standards can pose
security risks. Therefore, it is essential to develop and implement
cybersecurity policies to protect against these risks.

This picture shows the ignorance of our government. Its going to take a president who is internet savy. Not Al Gore and certainly not Obama.

Obama Yard Sale


802 is a series of standards for implementing networking technologies. The
most well-known standards in this series are:

  1. 802.3: This standard defines the specifications for Ethernet networks.
    It includes different versions like Fast Ethernet (802.3u), Gigabit
    Ethernet (802.3z), and 10 Gigabit Ethernet (802.3ae).
  2. 802.5: This standard defines the Frame Relay access method for use on a
    wide area network (WAN).
  3. 802.11: This standard defines the specifications for wireless computer
    communication using radio waves. It includes different versions like Wi-Fi
    4 (802.11n), Wi-Fi 5 (802.11ac), and Wi-Fi 6 (802.11ax).
  4. 802.1Q: This standard defines VLAN tagging, which allows multiple
    virtual LANs to be created on a single physical network.
  5. 802.1x: This standard defines a port-based network access control
    system that allows only authorized devices to connect to a network.
  6. 802.3ab: This standard defines the high-speed Ethernet standard, also
    known as Gigabit Ethernet.
  7. 802.3ba: This standard defines the 10GBASE-T standard, which allows 10
    gigabit Ethernet to be run over twisted pair cabling.
  8. 802.3cd: This standard defines the 40/100 GbE over SMF standard, which
    allows for the deployment of 40 and 100 gigabit Ethernet over single-mode
    fiber.
  9. 802.3aq: This standard defines the Link Aggregation Control Protocol
    (LACP), which allows multiple physical links to be combined into a single
    logical link.
  10. 802.3w: This standard defines the Energy Efficient Ethernet (EEE)
    standard, which reduces power consumption by allowing devices to enter
    energy-saving modes when not in use.

Danwillie at Mastodon

Comment local