answersLogoWhite

0

📱

Computer Network Security

Network security is any form of computer security dealing with multiple computers linked through a network. Questions about everything from firewalls to viruses to denial-of-service attacks belong here.

1,030 Questions

What is piggybacking in computer security?

ACK for the last received packet need not be sent as a new packet, but gets a free ride on the next outgoing data frame(using ACK field in the frame header). The technique is temporarily delaying outgoing ACKs, so that they can be hooked on the next outgoing data frame is called piggybacking. Piggybacking is one of the feature of TCP

How data is transferred between two computers on a network?

The simple answer is that information moves between computers as a data stream. The catch is that there are protocolsthat the computers use to talk to each other, and the ins and outs depend on the network through which they are communicating. To cite just a single example, if a PC or laptop is connected to the Internet, some kind of Internet protocol will be used by the server and that computer so that they can communicate. Certainly there is a lot more to this, and it will, as stated, depend on what network is being used to connect the computers in question.

What does a firewall do?

Firewall is a piece of software that creates a barrier between Internet and your PC.

In short, Firewall analyzes the traffic that goes from and to your computer and blocks such packets (traffic) that could hurt your computer.

What device is a hardware component that enables a computer to send and receive data instructions and information to and from one or more computers?

Any bidirectional communication channel or link between two or more computers fits into this category. This can be Ethernet port (wired or wireless) directly connected between two machines or associated switch or router which allows more connections to same network. Similarly other wired or wireless serial connections (like serial ports, USB, Bluetooth, Infrared) between computers can also send and receive data instructions and information between computers.

Actually the answer to this question is communication device, stated in the book: Microsoft Office 2007 Introductory Concepts and Techniques

Why network security needed?

Without network security, anybody could just hack into the network, make adjustments to files, database's etc... Just think about your bank for example. Without network security anybody could just log in and look at your details, transfer money in or out of your account etc...

How are subnets used to improve network security?

Yes, if you separate the network into different sub-networks, you can then set up rules (for example, through ACLs) that allow certain traffic between subnets, and block other types of traffic.

What constitutes computer risks?

There are a number of risks related to using computers.

1. Sometimes you might not be paying attention. You might wreck if you try to use a computer while driving.


2. Sometimes computers can make people lazy. They might put too much trust in a GPS system, for instance. So people drive off of cliffs, drive into lakes, drive through active construction zones, etc.


3. There may be health risks. Staring too long at a computer can cause eyestrain. If you don't offer proper wrist and back support, you might injure those parts of the body.


4. An irate person may harm themselves or another with a computer. A jealous boyfriend through a girlfriend's computer out the window and maimed a child playing below.

Is it true that non-repudiation ensures users cannot deny sending and or receiving data?

Non-repudiation only refers to the fact that a sender of a message cannot deny they sent it; since the relationship of the public/private key pairs makes it impossible to deny if they sent a message.

Non-repudiation cannot be used by either a sender or a receiver of a message to deny they ever received it; it only can be used if a message was received.

What is the use of having physical security system?

Because an advanced firewall and world class virus checking software doesn't help if someone can just walk into the office, sit down by a computer and do all the stuff the remote attacks or viruses tried and failed to.

Or in a context where a company is concerned about secret data: Stealing a laptop from an employee might work just as well as breaking in over the network. Plus if the employee has a VPN connection and has the password stored in the laptop, cracking the laptop would give you the network for free.

How does network help businesses save money?

Simple: increased user productivity. Instead of every employee having to walk to the person in charge of certain data, get the files from them on removable media, and then walk back to his own desk, the network allows files to be shared without any real effort. Changes to a file are also automatically available to everyone on the network, reducing the chance of different people having different versions of the information in question. Plus, a network allows the IT staff and management to more easily monitor what the users are doing on their computers, reducing wasted time (spent playing games, browsing the internet, etc.).

What are the three types of network security?

There are about 30 types of network security, described at the related link.

These including using firewalls, anti-virus software, encryption, using static IP addresses, using Virtual Private Network, etc.

Does IA BBP requires the IASO to ensure personnel receive system-specific and annual IA awareness training?

8510.01M was signed in 2000 was written to go with DITSCAP (DoDI 5200.40 - signed in 1997), which has since been superseded by DIACAP (DODI 8510.01 - signed in 2007)

Ultimately, responsibility for ensuring the training rests with the IAM, but the IAM can, and often does, delegate the responsibility to the IAO.

C3.4.4 requires preparation of the Environment and Threat Description, which, in turn requires:

C3.4.4.2.1.8. Training. Identify the training for individuals associated with the system's operation and determine if the training is appropriate to their level and area of responsibility. This training should provide information about the security policy governing the information being processed as well as potential threats and the nature of the appropriate countermeasures.

C3.4.7 requires identifying C&A Organizations and the Resources Required, which includes:

C3.4.7.2.3. Resources and Training Requirements. Describe the training requirements, types of training, who is responsible for preparing and conducting the training, what equipment is required, and what training devices must be developed to conduct the training, if training is required. Funding for the training must be identified.

C5.1.2 discusses certifying, among other things, "security education, training, and awareness requirements".

C5.2.4.3 requires: The program manager, user representative, and ISSO should ensure that the proper security operating procedures, configuration guidance, and training is delivered with the system. Note that the term ISSO has since been replaced by IASO in current IA terminology.

C5.3.9.2 requires: "that security Rules of Behavior, a Security Awareness and Training Program, and an Incident Response Program are in place and are current."

Appendix 2, the "MINIMAL SECURITY ACTIVITY CHECKLIST" includes the questions:

Table AP2.T11.

10.(h) Do the ISSO duties include the following:

Implementing or overseeing the implementation of the Security and Training

and Awareness Program?

Table AP2.T12.

3.(o) Do employees receive periodic training in the following areas:

(1) Power shut down and start up procedures?

(2) Operation of emergency power?

(3) Operation of fire detection and alarm systems?

(4) Operation of fire suppression equipment?

(5) Building evacuation procedures?

If you examine DoDI 8500.2, you will find requirements dealing with training including:

5.9 Each IA Manager, in addition to satisfying all responsibilities of an Authorized User, shall: (5.9.2) Ensure that all IAOs and privileged users receive the necessary technical and IA training, education, and certification to carry out their IA duties.

E3.3.7. Requires that:

All DoD employees and IT users shall maintain a degree of understanding

of IA policies and doctrine commensurate with their responsibilities. They shall be capable of appropriately responding to and reporting suspicious activities and conditions, and they shall know how to protect the information and IT they access. To achieve this understanding, all DoD employees and IT users shall receive both initial and periodic refresher IA training. Required versus actual IA awareness training shall be a management review item.

E3.4.6. Information Assurance Managers (IAMs) are responsible for establishing,

implementing and maintaining the DoD information system IA program, and for

documenting the IA program through the DoD IA C&A process. The program shall include procedures for:

E3.4.6.6. Tracking compliance with the IA Controls applicable to the DoD information system and reporting IA management review items, such as C&A status, compliance with personnel security requirements, compliance with training and education requirements, and compliance with CTOs, IAVAs, and other directed solutions.

Within the controls of 8500.2, you will find the following controls:

VIIR-1 Incident Response Planning

An incident response plan exists that identifies the responsible CND Service Provider in accordance with DoD Instruction O-8530.2, defines reportable incidents, outlines a standard operating procedure for incident response to include INFOCON, provides for user training, and establishes an incident response team. The plan is exercised at least annually.

VIIR-2 Incident Response Planning

An incident response plan exists that identifies the responsible CND Service Provider in accordance with DoD Instruction O-8530.2, defines reportable incidents, outlines a standard operating procedure for incident response to include INFOCON, provides for user training, and establishes an incident response team. The plan is exercised at least every 6 months.

PETN-1 Environmental Control Training

Employees receive initial and periodic training in the operation of environmental controls.

PRTN-1 Information Assurance Training

A program is implemented to ensure that upon arrival and periodically thereafter, all personnel receive training and familiarization to perform their assigned IA responsibilities, to include familiarization with their prescribed roles in all IA- related plans such as incident response, configuration management and COOP or disaster recovery.

Templates for validation of the controls by system validators include the following instructions:

For PRRB-1:

1. A set of rules that describe the IA operations of the DoD information system and clearly delineate IA responsibilities and expected behavior of all personnel shall be in place.

2. The rules shall include the consequences of inconsistent behavior or non-compliance.

3. Signed acknowledgement of the rules shall be a condition of access.

4. Training or reminder of the IA operations rules and code of conduct shall be performed on an annual basis, or as frequently as in accordance with DoD policy.

For PRTN-1

1. A set of rules that describe the IA operations of the DoD information system and clearly delineate IA responsibilities and expected behavior of all personnel shall be in place.

2. The rules shall include the consequences of inconsistent behavior or non-compliance.

3. Signed acknowledgment of the rules shall be a condition of access.

4. Training or reminder of the IA operations rules and code of conduct shall be performed on an annual basis, or as frequently as in accordance with DoD policy.

Where can a company go to learn more about network security products?

There are a number of options for one to find information about network vulnerability. The site Network World has some valuable information as does the Javvin website.

What does a workgroup switch of a network do?

The Switch by paying attention to the traffic that comes across it, it can "learn" where particular addresses are. For example, if it sees traffic from machine A coming in on port 2, it now knows that machine A is connected to that port and that traffic tomachine A needs to only be sent to that port and not any of the others. The net result of using a switch over a hub is that most of the network traffic only goes where it needs to rather than to every port. On busy networks this can make the network significantly faster.

Where do you find sound drivers for Toshiba Satellite L310 notebook?

You can find them on Toshiba's support site. The L310 is sold primarily in Asian markets, so you have to use the Asian site, not the usual American one. You can find a link to the drivers for the sound card below.

What transmission speed does 100-Mbps or Fast Ethernet support?

Ethernet supports speeds as low as 10 Mbps and as high as 1 Gbps. There are new initiatives to support 10 Gbps in the near future.

How can you prevent computer theft?

One can protect their PC from hackers by installing comprehensive anti-virus software programs such as AVG, Norton or Kaspersky. One should also try to find difficult to guess passwords and change them frequently, and use different passwords for different accounts.

What is RFC 1918?

RFC 1918 is Address Allocation for Private Internets The Internet Assigned Numbers Authority (IANA) has reserved the following three blocks of the IP address space for private internets: 10.0.0.0 - 10.255.255.255 (10/8 prefix) 172.16.0.0 - 172.31.255.255 (172.16/12 prefix) 192.168.0.0 - 192.168.255.255 (192.168/16 prefix) We will refer to the first block as "24-bit block", the second as "20-bit block", and to the third as "16-bit" block. Note that (in pre-CIDR notation) the first block is nothing but a single class A network number, while the second block is a set of 16 contiguous class B network numbers, and third block is a set of 256 contiguous class C network numbers.

What are the vulnerabilities in the network?

Every network is different; the only way to find out the vulnerabilities in a given network is to initiate an audit of the network. One piece of that is risk assessment, and from that you develop a vulnerability matrix.

What is the meaning of asymmetric encryption?

Asymmetric Encryption is a form of Encryption where keys come in pairs. What one key encrypts, only the other can decrypt.

Frequently (but not necessarily), the keys are interchangeable, in the sense that if key A encrypts a message, then B can decrypt it, and if key B encrypts a message, then key A can decrypt it. While common, this property is not essential to asymmetric encryption.

Asymmetric Encryption is also known as Public Key Cryptography, since users typically create a matching key pair, and make one public while keeping the other secret.

Users can "sign" messages by encrypting them with their private keys. This is effective since any message recipient can verify that the user's public key can decrypt the message, and thus prove that the user's secret key was used to encrypt it. If the user's secret key is, in fact, secret, then it follows that the user, and not some impostor, really sent the message.

Users can send secret messages by encrypting a message with the recipient's public key. In this case, only the intended recipient can decrypt the message, since only that user should have access to the required secret key.

The key to successful use of Asymmetric Encryption is a Key Management system, which implements a Public Key Infrastructure. Without this, it is difficult to establish the reliability of public keys, or even to conveniently find suitable ones.

Why security in operating system is important?

Without security in a computer system you are violating the 3 tenets of security:

  1. Confidentiality
  2. Integrity
  3. Availability
Also, in many cases companies are required by law to provide security for their systems, by using due care and due diligence.

What is the strongest password?

No 5 - Combine partial 2 or 3 or even 4 unrelated words together (mix uppercase and lowercase)

User can combine 2 words together like "Diamond", "Blog","Security" to become "DiamBloSecu"

No 4 - Combine word with number and (mix uppercase and lowercase)

User can combine your name and your handphone number together, like your name "Scotfield", handphone is "01255447689″, then your password will become "Scotfield01255447689″, this is my favourite password to use also, because it is consider strong and easy to remember password.

No 3 Replace Word with number and symbol randomly. (mix uppercase and lowercase)

Good example is Microsoft suggest strongest password P@ssw0rd, it replace a with @ symbol and o with 0 (Zero), This will need some creative to think of it.

No 2 Mix Word and number together randomly. (mix uppercase and lowercase)

Let said, "Scotfield" and "01255447689″, if we mix randomly to become "S012cot5544fie76ld89″, frankly… i do not think is it possible to crack it..but it very hard to remember also.

No1 Mix meanless Word, number and symbol randomly, and at least 15 length. (mix uppercase and lowercase)

Strongest password equals to hardest remember password, for example

E7r9t8@Q#h%Hy+M

er…. if possible please do not create above strongest password, because this is really very hard to remember

------------------------

I think that most difficult password that I could retrieve was (combination of Alpha numerics):

"A4714GusToE19lAPT@0pmaMsUch&INe" I would suggest don't use this password because this is extremely difficult to remember. It will take more than two hundred years of computation by a high-speed super computer.

Trending Questions
Does limiting your signal range increase network security? How the quality of service and security achieved in IPV6? How does asymmetric key encryption ensure non repudiation? What is meant by CC NA courses? A network administrator is selecting a switch that will operate at the network core Which three features should the switch support for optimum network performance and reliability? Which layer is done by congestion control? What is the secritycode for 5 case -sensitive characters 13 case -sensitive characters 10 hexadecimal 0-9 a-f case -sensitive characters 26 hexadecimal0-9 a-f case -sensitive characters? Differences of Virtual Memory between Windows and Linux? The rules for making a hash algorithm are public on the fips website how come someone with access to lets say my sha1 function cant decipher the resulting hash? What wireless security protocol provides the highest level of security? What is an advantage of domain networking? What requirement must a public key cryptosystems fulfill to be a secure algorithm? What is PDF and what does it have to do with printing? Define the term communication channel? How important is TTL to network security what is TTL for and can a Hacker use it to harm you PC or network? Ten signals each requiring 4000 Hz are multiplexed on to a single channel using FDM How much minimum bandwidth is required for the multiplexed channel Assume that the guard bands are 400 Hz wide? What is cat in computer networking? How does BitLocker enhance your security system? How is the CNSS model of information security organized? What on a computer are kernel level rootkits designed to do?