answersLogoWhite

0

📱

Computer Network Security

Network security is any form of computer security dealing with multiple computers linked through a network. Questions about everything from firewalls to viruses to denial-of-service attacks belong here.

1,030 Questions

How can you prevent computer theft?

One can protect their PC from hackers by installing comprehensive anti-virus software programs such as AVG, Norton or Kaspersky. One should also try to find difficult to guess passwords and change them frequently, and use different passwords for different accounts.

What is RFC 1918?

RFC 1918 is Address Allocation for Private Internets The Internet Assigned Numbers Authority (IANA) has reserved the following three blocks of the IP address space for private internets: 10.0.0.0 - 10.255.255.255 (10/8 prefix) 172.16.0.0 - 172.31.255.255 (172.16/12 prefix) 192.168.0.0 - 192.168.255.255 (192.168/16 prefix) We will refer to the first block as "24-bit block", the second as "20-bit block", and to the third as "16-bit" block. Note that (in pre-CIDR notation) the first block is nothing but a single class A network number, while the second block is a set of 16 contiguous class B network numbers, and third block is a set of 256 contiguous class C network numbers.

What are the vulnerabilities in the network?

Every network is different; the only way to find out the vulnerabilities in a given network is to initiate an audit of the network. One piece of that is risk assessment, and from that you develop a vulnerability matrix.

What is the meaning of asymmetric encryption?

Asymmetric Encryption is a form of Encryption where keys come in pairs. What one key encrypts, only the other can decrypt.

Frequently (but not necessarily), the keys are interchangeable, in the sense that if key A encrypts a message, then B can decrypt it, and if key B encrypts a message, then key A can decrypt it. While common, this property is not essential to asymmetric encryption.

Asymmetric Encryption is also known as Public Key Cryptography, since users typically create a matching key pair, and make one public while keeping the other secret.

Users can "sign" messages by encrypting them with their private keys. This is effective since any message recipient can verify that the user's public key can decrypt the message, and thus prove that the user's secret key was used to encrypt it. If the user's secret key is, in fact, secret, then it follows that the user, and not some impostor, really sent the message.

Users can send secret messages by encrypting a message with the recipient's public key. In this case, only the intended recipient can decrypt the message, since only that user should have access to the required secret key.

The key to successful use of Asymmetric Encryption is a Key Management system, which implements a Public Key Infrastructure. Without this, it is difficult to establish the reliability of public keys, or even to conveniently find suitable ones.

Why security in operating system is important?

Without security in a computer system you are violating the 3 tenets of security:

  1. Confidentiality
  2. Integrity
  3. Availability
Also, in many cases companies are required by law to provide security for their systems, by using due care and due diligence.

What is the strongest password?

No 5 - Combine partial 2 or 3 or even 4 unrelated words together (mix uppercase and lowercase)

User can combine 2 words together like "Diamond", "Blog","Security" to become "DiamBloSecu"

No 4 - Combine word with number and (mix uppercase and lowercase)

User can combine your name and your handphone number together, like your name "Scotfield", handphone is "01255447689″, then your password will become "Scotfield01255447689″, this is my favourite password to use also, because it is consider strong and easy to remember password.

No 3 Replace Word with number and symbol randomly. (mix uppercase and lowercase)

Good example is Microsoft suggest strongest password P@ssw0rd, it replace a with @ symbol and o with 0 (Zero), This will need some creative to think of it.

No 2 Mix Word and number together randomly. (mix uppercase and lowercase)

Let said, "Scotfield" and "01255447689″, if we mix randomly to become "S012cot5544fie76ld89″, frankly… i do not think is it possible to crack it..but it very hard to remember also.

No1 Mix meanless Word, number and symbol randomly, and at least 15 length. (mix uppercase and lowercase)

Strongest password equals to hardest remember password, for example

E7r9t8@Q#h%Hy+M

er…. if possible please do not create above strongest password, because this is really very hard to remember

------------------------

I think that most difficult password that I could retrieve was (combination of Alpha numerics):

"A4714GusToE19lAPT@0pmaMsUch&INe" I would suggest don't use this password because this is extremely difficult to remember. It will take more than two hundred years of computation by a high-speed super computer.

Lack of security and its effects to economy?

Privacy activity increase because lack of security and make economy of a country easily being hack

Advantages of ethical hacking?

Since security is week in all technical fields... ethical hackers are brought into work for the corporate sectors with high wages... All ethical hackers have a great scope in nearly future.. if you have any disagreement in my idea about ethical hackers you can mail your concepts to "pown.raj77@gmail.com" For futher informations about ethical hacking you can contact me through my mail id..

What are the advantages and disadvantages of steganography?

The obvious advantage of steganography is that you can hide a secret message in another message, be it text, image, audio, or whatever media you decide to hide your secret in. The main problem with this is that either you or the person you're sending the "secret" message to need to be able to find the message. And if you can find it, then the bad guys you want to keep the message a secret from can find it, too.

What are the 2 basic functions used in encryption algorithm?

Two basic functions used in Encryption Algorithms are * Substitution * Transposition

Why do networking components need more examination from information security perspective than from a systems development perspective?

Hardware is assigned to one of two categories: the usual systems devices and their peripherals, and those devices that are part of information security control systems. The latter must be protected more thoroughly than the former, since networking subsystems are often the focal point of attacks against the system; they should be considered as special cases rather than combined with general hardware and software components.

What is interruption in Information security?

Stopping the message transfer between 2 persons , so that 2nd person can't receive the message.....

What is centralized test groups and decentralized test groups?

I require more details but let me answer in terms of team hierarchy.

Centralized test groups: A TCOE is formed in an organization which provide test resources (people) to projects as per their requiement. Training, skill, Time and billings are tracked. Mostly lead by Test Manager.

Decentralized: Project teams own test resouces. so a project manager/dev manager are leads and test team report to them dedicately.

Is ivi service peer to peer www.ivi.tv?

Yes.

Permission from You for ivi, Inc. to Use Your Computer and Bandwidth to Enable the Peer-to-Peer Viewing of Video on the Site and to Manage the Network of Computers Running ivi tvAs consideration for using ivi tv, you agree and understand that:

  1. ivi tv will utilize the processor, bandwidth and hard drive (or other memory or storage hardware) and/or cache of your computer (or other applicable device) for the limited purpose of facilitating the communication between, and the transmittal of data, content, programming, services or features to, you and other Service users, and to facilitate the operation of the network of computers running instances of the Service.
  1. ivi will take organizational and technical measures intended to protect the privacy and integrity of the computer resources (or other applicable device) you are utilizing, however, you acknowledge and agree that this is not a representation or warranty of ivi.

Is WinMX harmful?

Nope. As long as you have the community patch you will be fine.

Go here to get it.

It does not contain any spyware/virus thingies.

That doesn't mean you will not find viruses on the winmx network though. As with all p2p programs, you should scan the files you download with an antivirus scanner just to be safe.

Although I've never really heard of an mp3 containing a virus... lol

Also you can search for any file type you wish.

http://winmxworld.com/

Make sure you get the community patch, otherwise you will be helping the network be attacked with fake files and flooded. Also network attackers have begun to try and "data mine" information off of the network. Help the network by blocking these horrible people by using the community patch! As of currently, the mxpie patch has been deemed inefficient when it comes to blocking these evil people!

Is there any source code for longitudinal redundancy check?

It depends on the language you want to use. Here is a VB example:

http://bytes.com/topic/visual-basic-net/answers/443023-lrc-calculation-algorithm

How can you get a network access code?

It must be provided initially by the organization offering the network service, be it the cable company, the satelite company, etc. It is usually a very long (aprox 25 digits) string and is alphanumeric (letter and numbers). I believe after a usser logs onto the service he/she has the option to enter their own key provided they follow the same format for length of characters. Normally when one signs up for service with a provider, they provide the network access key to the customer in case of system errors where the customer might be required to enter the key.