answersLogoWhite

0

📱

Computer Network Security

Network security is any form of computer security dealing with multiple computers linked through a network. Questions about everything from firewalls to viruses to denial-of-service attacks belong here.

500 Questions

List two advantages of the SATA drive over the PATA drive?

User Avatar

Asked by Wiki User

a SATA hard drive can be connected to and controlled by a SAS hard drive controller

Disadvantages of network security?

User Avatar

Asked by Wiki User

Disadvantages Of Cyber Security .

1. Improved hacker speed and ability.

2. Interconnected computers.

3. Improved viruses, malware and worms.

4. Increase in "cyberwarefare" possibly

5. More annomitty between hackers.

Can you have a dynamic Mac address?

User Avatar

Asked by Wiki User

In general, the MAC address is tied to a specific piece of hardware and does not change. It is possible, however, under certain circumstances to change the MAC address.

MAC addresses are most often assigned by the manufacturer of a network interface card (NIC) and are stored in its hardware, the card's read-only memory, or some other firmware mechanism. If assigned by the manufacturer, a MAC address usually encodes the manufacturer's registered identification number and may be referred to as the burned-in address. It may also be known as an Ethernet hardware address (EHA), hardware address or physical address.

Although intended to be a permanent and globally unique identification, it is possible to change the MAC address on most modern hardware. Changing MAC addresses is necessary in network virtualization. In this case, the MAC address of the actual NIC is hidden from the network and the network only sees the MAC assigned to the virtual NIC - which can be configured, with some finesse, to be dynamic. It can also be used in the process of exploiting security vulnerabilities. This is called MAC spoofing.

What is leased line?

User Avatar

Asked by Wiki User

In very simple words, A leased line is a rent paying line; as the name suggests.

As it is very difficult to connect two different point in far flange areas, a customer uses a line that is provided by some network provider and pays accordingly.You can take it as connecting some of your database in two different cities.

Hope, you understand me :)

What program can capture packets on a network?

User Avatar

Asked by Shirley1927

A packet capture (or sniffer) program sees packets coming into and out of the NIC (network interface card). It saves it for later analysis and use. These capture programs can be used to analyze traffic, look for problems, or be used for looking at data coming across the network.

What is remote access?

User Avatar

Asked by Wiki User

remote access is where a computer is used from a different location to where the user is, this is useful to IT staff so they can administer a machine without even being in the same building, home users also benefit from remote access by being able to 'dial in' to their home computers whist at work or elsewhere.

What is a DoS attack?

User Avatar

Asked by Asjames

* A means of burdening or effectively shutting down a remote system by bombarding it with traffic from many other computers. ...

www.antispywarecoalition.org/documents/GlossaryJune292006.htm * A type of denial of service attack in which an attacker uses malicious code installed on various computers to attack a single target. This methods may be used by an attacker to have a greater effect on the target than is possible with a single attacking machine.

www.imvajra.com/glossary1.html * A type of external Internet attack, in which multiple sources attack a single target system, with the goal being denial of service for its users. ...

www.drcomputer.com/glossary.html * On the Internet, a distributed denial-of-service (DDoS) attack is one in which a multitude of compromised systems attack a single target, thereby ...

www.primode.com/glossary.html * Acronym for Distributed Denial of Service attack. An attack on a remote destination with a collection of PCs often under the control of a virus or ...

www.pctechbytes.com/glossary/d.htm * Distributed Denial-of-Service Attack The act of loading malignant code onto a host of other machines in order to perform a Denial-of-Service attack.

substratum.ca/subs/Resources/TechTerms/ * A Distributed Denial of Service attack; a DoS attack that originates from many different (geographically and network topographically) sources, on ...

en.wiktionary.org/wiki/DDOS

Define computer security?

User Avatar

Asked by Wiki User

Uses & application of computer

Where can one find information about Network Security Service?

User Avatar

Asked by Wiki User

One can find information about network security services on various websites Barracuda and Q1Labs. Both websites offer a great amount of information regarding this subject.

What are the procedures for dealing with different types of security breaches within a salon?

User Avatar

Asked by Wiki User

The first step when dealing with a security breach in a salon would be to notify the salon owner. After the owner is notified you must inventory equipment and records and take statements from eyewitnesses that witnessed the breach. Clients need to be notified that confidentiality has been breached so they can take measures to protect their information. As these tasks are being performed, the police should be called.

Why is security such a significant concern when using remote access servers on a network?

User Avatar

Asked by Wiki User

Remote access gives an attacker an opportunity to get into your server. And usually they get root access aswell, due to the fact its normally only admins who remotely log into servers. For example, something that happened me a few years back, I was at a relatives house when I got a call saying that a certain user forgot their password and couldn't get on the network. I logged into the server from my relatives computer, and gave the user a new password. But I didn't know there was a keylogger on my relatives computer. The following week the network AD was wiped out. The person who planted the keylogger had instantly gotten root.



(IF looking for Network+ Guide to Networking answer use this one)

Access servers enable computers to dial in to a network and obtain access to its resources, thereby exposing the network to the outside world.

Different types of protocol?

User Avatar

Asked by Wiki User

Different types of networking operating systems uses different digital languages to control the communication process between the computers. These languages is called Network protocols.

Definition : A protocol is a set of rules to govern the data transfer between the devices. The rules are used for the following purposes.

1. For compressing the data.

2. For sending device to indicate that it has finished sending a message.

3. For receiving device to indicate that it has received a message.

Types of Protocols :

There are different types of Protocol such as:

1. Transmission control Protocol (TCP)

2. Internet Protocol (IP)

3. Internet Address Protocol (IP Address)

4. Post office Protocol (POP)

5. Simple mail transport Protocol (SMTP)

6. File Transfer Protocol (FTP)

7. Hyper Text Transfer Protocol (HTTP)

8. Ethernet

9. Telnet

10. Gopher

1. Transmission control Protocol (TCP)

This is a communication protocol that computers uses to communicate over a network. TCP divides message into stream of packets which are sent and then reassembled at the destination.

2. Internet Protocol (IP)

Internet protocol is addressing protocol. It is always used together with TCP. IP addresses of packet, routes them through different nodes and networks until it reaches its final destination. TCP/IP is perhaps the most used standard protocol for connecting computer networks.

3. Internet Address Protocol (IP Address)

This is the address that identifies a computer on a network using TCP/IP. An IP address contains series of four numbers unique to the computer concerned Eg : 90.399.424.34. This address is usually supplied by a Internet Service Provider.

4. Post office Protocol (POP)

This is used to receive incoming E-mail .

5. Simple mail transport Protocol (SMTP)

This protocol is used for sending and distributing outgoing E-Mail .

6. File Transfer Protocol (FTP)

This is a system that allows users to transfer files from one computer to another computer. Files that can be transfered may include program files, text files and multimedia files ect. This method of file transfer is faster than that using HTTP.

7. Hyper Text Transfer Protocol (HTTP)

HTTP is used to transfer a hyper text between two or more computers. Hyper text is the text that is coded using the language called HTML. HTML codes are used to create links. This link may be in any format such as text or graphics.

HTTP is based on the Client/server principles. HTTP allows a client to establish connection with a server and make a request. The server accepts the connection initiated by the client and send back the response. An HTTP request identifies the resources that the client is interested it and tells the server what action to take on the resource.

8. Ethernet

Ethernet is a most popular protocol used for LAN communication. It transfer the information in digital packets. Every computer that uses this protocol contains the Ethernet Network Interface Card (NIC).

This card is an unique address code embedded in microchip. This address is used to identify the system. When a packet is placed on a network, The packet is sent to every computer on the networks but only the computer which has the same address as Network Interface Card address is allowed to claim that packet and receive the digital information contained with it.

Only one packet is placed at a time in the network. If two systems placed packets on the network on same time. When NIC tries to place a packet it first looks whether a packet already exit or not. If it exits the NIC is forced to wait for a random milliseconds before trying again. This continues until a 'gap' is found then the packet can be successfully transmitted on to a network.

9. Telnet

Telnet is a set of rules used to connect one computer to another computer. The process of this connection is called as remote login. The computer who request connection is called local computer, who accept the connection is called remote computer. If you type commands in local computer remote login these commands executed in the remote computer. You can see in your monitor what is the process going on in this remote computer.

Telnet also operates on the client/server principle. The establishment of connection and display data on the local computer uses a Telnet server program to accept the connection and send responses to requests for information back to the local computer.

10. Gopher

Gopher is a sot of rules used to search, retrieve and display documents from remote sites. It is possible to initiate on-line connections with other systems through Goper. It also operates on client/server principal

.

Did you like this resource? Share it with your friends and show your love!

inShare

How much does network security pay?

User Avatar

Asked by Wiki User

Payment varies depending on the size of the company, the nature of data being protected, the region of the country you are in.

It also depends on experience, and whether or not you have any certifications. I've seen starting salaries around 60K, going to more than 110K or even higher depending on qualifications.

Which tunneling protocal should be used?

User Avatar

Asked by Wiki User

Secure Socket Tunneling Protocol (SSTP) is a new VPN protocol that uses port 443, which is also used by Hypertext Transfer Protocol over Secure Sockets Layer (HTTPS). SSTP is used to transport Point-to-Point Protocol (PPP) traffic through an SSL channel. Currently it is only available on newer operating systems such as Windows Vista and Windows Server 2008.

What document requires that IASO ensure personnel receive system specific and annual IA awareness training?

User Avatar

Asked by Wiki User

AR 25-2
AR 25-2 requires the IASO ensure personnel receive system specific and annual IA awareness training. Note that the acronym IASO used in AR 25-2 corresponds to "IAO" as used in other DoD IA instructions, publications, directives, etc. such as 8510.01.

Can people see what you send over secured wireless network?

User Avatar

Asked by Wiki User

There is no easy answer: It depends. If you are worried about the safety of your information, do not type in sensitive information (such as credit card numbers, bank passwords, etc.) on an unsecured network. Unsecured networks are the ones that do not require a password, and anyone can get access to them. Most secure wireless networks feature some type of encryption, which makes it harder for hackers to get hold of your information. Currently, the best encryption is WPA2. You can check the type of encryption you are using by going into your connection properties. Upgrading to WPA2 may require a new router or wireless adapter. Keep in mind that just because you are using a secure network with WPA2 encryption at home doesn't mean everyone else is--try not to enter private information on public networks. No wireless network is completely safe, but the best ones are pretty close. Also, if your are concerned about safety and privacy, you should purchase a good security suite to prevent hackers from gainng access to your computer--and your information.

Which layer is done by congestion control?

User Avatar

Asked by Wiki User

at the network layer, congestion control mechanism takes place

How are layers used in a Flash document?

User Avatar

Asked by Wiki User

Layer based animation is useful for creating complex projects. It makes drawings and eding easier

Help in creatin Sophisticated Effects

E.g Gude Layers, Mask Layers (for spot light effects)

What are typical indicators that your computer system is compromised?

User Avatar

Asked by Wiki User

There can be several signs of computer compromise from different sources. Though most of the time, there could be other explanations for impaired performance besides viruses, malware or other sources of interference, if you find files missing or deleted and you did not do it, the computer is running extremely slow or files are moved or changed then all these could be signs of compromise. The best way to be sure is to get a virus scanning program (there are free ones) and scan your system. It's also important to get and maintain (frequently update) an anti-virus program. You may obtain a free one from the related links below.

Functions of wan?

User Avatar

Asked by D1

Wide area network generally consist of two or more local networks . Computers connected to a WAN are often connected through public Computers connected to a wide-area network are often connected through public networks, such as the telephone system. Wanos network less the costs and accelerate more network speeds. Like this you can get more provider those are providing WAN services.

Does fat32 support encryption?

User Avatar

Asked by Wiki User

No NTFS is the only file system capable of encryption

What is the difference between classless subnetting and classful subnetting?

User Avatar

Asked by Wiki User

CLSM (Constant Length sub net Mask). Whenever we are Using Same Sub net Mask in entire Organization, that architecture Is Called CLSM in the Network.

VLSM (Variable Length Sub net mask) in the Network. Whenever we are Using different-different sub net Mask in entire Organization, that architecture Is Called VLSM.