When was the first computer network created and by whom?
Contributions to computer networks were made by the following:
CERN in Switzerland
The first computer network was created at CERN the European research center for particle physics. it is in Switzerland.
UCLA in 1969
The previous comment "the first computer network was created at CERN" is not correct. In 1989, CERN added the WWW as a new feature to the already-existing Internet. The Internet itself was created in 1969 at UCLA. There were previous experiments in wide-area networking, e.g., in 1965. For more info, see "history of the internet" on isoc.org.
DARPA
The computer networking revolution began in the early 1960s and has led us to today internet technology. The Internet was first invented by DARPA (Defense Advanced Research Projects Agency) for military purposes, and then expanded to the purpose of communication among scientists. In 1957, the launch of Sputnik had spurred the U.S to create a network for communications links between military and university computers that would not be disrupted by bombs or enemy spies. In order to solve the problem, in 1968 DARPA (Defense Advanced Research Projects Agency) made contracts with BBN (Bolt, Beranek and Newman) to create ARPANET (Advanced Research Projects Agency Network).
Sergei Lebedev in the Ukraine
The first computer network in Ukraine by Sergei Lebedev for the USSR antimissile system. The system was operational in 1960 far before the idea of ARPANET.
SAGE air defence computer network
A network of vacuum tube computers connected by leased telephone lines and the first MODEMs used by the US to protect against bomber attacks. The system was operational in 1958.
Which functionality is NOT provided by security templates in Windows operating systems?
Type your answer here... Create new security parameters
Answer Explanation: Security templates do not provide new security functionality. Instead, they simplify administration by enabling centralized access and distribution for existing security features.
Four Major Elements in choosing a Firewall?
firewall functions by acting on traffic based on it's policy. A policy is comprised of a set of rules. A rule is an action taken on traffic that fit a certain criteria. A single rule is comprised of four basic elements:
Difference between ripv1 and ripv2?
The main difference between RIPv1 and RIPv2 is classless routing. RIPv2 incorporates the addition of the network mask in the update to allow classless routing advertisements. This is extremely important for the flexibility needed to efficiently utilize network assignments for an ever-shrinking pool of IP addresses.
There are other differences, as well. In RIPv2, the destination address for the updates is multicast, instead of broadcast, as in RIPv1. This reduces the burden on the network devices that do not need to listen to RIP updates. With broadcast, every device on the broadcast domain must at least open the IP packet and process the initial information to determine relevance. With multicast addressing, if a device needs that information, it will listen to that specific address. If it does not need the RIP information, it does not have to process the multicast address. The multicast address RIPv2 sends to is 224.0.0.9.
Another addition to RIPv2 is authentication. Authentication is used to ensure that routes being distributed throughout the network are coming from authorized sources.
FTP and Telnet are considered OSI layer 7 protocols. If you are blocking the service, then layer 3 or 4 (network or transport) is responsible.
Form the IR planning team, Develop the IR policy, Organize the security incident response team (SIRT), Develop the IR plan, and Develop IR procedures.
The critical elements are: Statement of management commitment. Purpose and objective of the policy. Scope of the policy. Definition of information security incidents and their consequences within the context of the organization. Organization structure and delineation of roles, responsibilities, and level of authority; should include the authority of the incident response team to confiscate or disconnect equipment and to monitor suspicious activity, and the requirements for reporting certain types of incidents. Prioritization or severity rating of incidents. Performance measures and reporting and contact forms.
What is the diffie-hellman cipher?
Diffie-Hellman is not as much a cipher as a means of securing exchanging keys. You would use it to securely notify someone else of a symmetric shared key that you both would use for encrypting data.
Think of it as more a key exchange method utilizing public and private keys than an actual cipher methodology.
What is the padding in networking?
padding meanse when we send some small data than it add some more bits and then sends it does not affect the original data.
Why ip is called connectionless?
IP is connectionless because you don't want routing to reply to every routing request; it would slow things down to almost a stop. The router has to assume that the packet arrives where it was sent.
What is the purpose of open system interconnection?
A:
Internetworking (i.e., the interconnection of two or more individual networks) is a complex task.
The communication process is judging as successful if the transmitted message has been delivered at the authorized destination(s) in a reliable and secure fashion and the meaning understood by the destination matches the meaning intended by the source.
Before the communicating parties starting to communicate, they have to define the several communication functions required for successful communication (i.e., flow control, error detection and correction, congestion control, addressing, routing, message formatting, etc.), and establish rules, conventions, and agreements, that govern these functions. These rules or protocols have to be followed by the communicating entities in order to ensure the success of the communication process.
In network communications, there are three basic agents:
So, to accomplish communication, we have to provide both physical connectivity between the hosts (this includes the definition of the cabling, the connectors, the physical topology, etc.), as well as logical connectivity (this includes software processes as the addressing and the routing).
In general, we want to accomplish:
As you can understand, some of the communication functions are used to accomplish task (1), some others are used to accomplish task (2), and some others are used to accomplish task (3). So, these functions are forming logical groupings called layers.
We can visualize these layers as a stack. Each layer communicates with the others via a well-defined interface. Each layer has well-defined communication functions, which are concerned with one of the above communication tasks (1, 2, or 3). These functions are governed by associated protocols (that is why this layered network architecture also called protocol stack). Each layer is concerned with its own task, and provides services to the upper layer in a transparent fashion. Each layer "trusts" the other layers and depends on them working properly in order to accomplish successful communication.
The International Standards Organization (ISO)established a seven-layer internetworking model called Open System Interconnection (OSI) to serve as a blueprint for internetworking. It is an open model, that is, a model which defines the layers, their functions, and the associated protocols, but not the actual way to accomplish these functions. That gives more flexibility to vendors to use the technological solution they believe that best fits to their needs.
OSI is a reference model (not used so much in practise, because is very abstract) that is used to:
The layers of the OSI model from top-to-bottom are:
From layer 7 to layer 4 we have end-to-end communication. Layers 2 and 1 concerned with host-to-network communication(i.e., network access). Layer 3 has a flavor of both.
Layers 7 to LLC sublayer are implemented in software. MAC sublayer and physical layer are implemented in hardware.
Repeaters and hubs (multi-port repeaters) operate on layer 1. Switches operates on layer 2. Routers operate on layer 3 (connect different networks).
At the communication process between two hosts, data are passing from all the layers of the protocol stack (from top to bottom). Each layer at the source device adds a header (data link also adds a trailer or tail) which contains control information in order to accomplish its functions. This process is called encapsulation.
This header with the data of the upper layer forms a Protocol Data Unit (PDU). The PDU of layers 7 to 5 is referred as data. Layer 4 PDU is referred as segment (when TCP is used) or datagram (when UDP is used). Layer 3 PDU is referred as packet. Layer 2 PDU is referred as frame. Layer 1 PDU is referred as bit stream.
At the destination, the information goes through the protocol stack from bottom to the top. Each layer staps-off the header and moves up the PDU. This is called decapsulation.
The "virtual" communication between the same layers at the source and the destination devices is called peer communication (and these layers are called peer layers).
You have to understand that a network model is a theoretical approach to the networking function that helps us to simplify and understand the overall process.
Kotsos
What is a secure process for keeping confiditial information private?
A good way to keep your private data secure is GnuPG or PGP, which are encryption suites (google them to get more info)
What is Client ID in blackboard?
This is usually the user - either your student-id or a user name you have been given from the BlackBoard administrator.
How can an operating system helps administrator to control a network and manages security?
"http://wiki.answers.com/Q/How_can_an_operating_system_helps_administrator_to_control_a_network_and_manages_security"
Smart jack.
Domain security policy in windows server 2003?
In Server 2003 domian security policy helps you to set Password Protection.. 1)Password length 2)Password Complexity 3)Password Age (min age & max age) In Server 2003 domian security policy helps you to set Password Protection.. 1)Password length 2)Password Complexity 3)Password Age (min age & max age)Default and Recommended Password Policy Settings
=============================================== Policy Default Recommended Comments
Enforce password history
24 passwords remembered
(No change) Prevents users from reusing passwords.
Maximum password age
42 days
(No change)
N/A
Minimum password age
1 day
(No change)
Prevents users from cycling through their password history to reuse passwords.
Minimum password length
7 characters
(No change)
Sets minimum password length.
Password must meet complexity requirements
Enabled
(No change)
For the definition of a complex password, see "Creating a Strong Administrator Password" in the Establishing Secure Domain Controller Build Practices section.
Store password using reversible encryption
Disabled
(No change)
N/A
Default and Recommended Account Lockout Policy Settings
====================================================== Policy Default Recommended Reason
Account lockout duration
Not defined
0 minutes
The value 0 means that after account lockout an Administrator is required to reenable the account before account lockout reset has expired.
Account lockout threshold
0 invalid logon attempts
20 invalid logon attempts
The value 0 means that failed password tries never cause account lockout. Because an account lockout duration of 0 minutes (administrator reset) is recommended, a small number for this setting can result in frequent administrator interventions.
Reset account lockout counter after
Not defined
30 minutes
This setting protects against a sustained dictionary attack by imposing a nontrivial delay after 20 unsuccessful attempts.
Default and Recommended Kerberos Policy Settings
================================================ Policy Default Recommended Comments
Enforce user logon restrictions
Enabled
(No change)
N/A
Maximum lifetime for service ticket
600 minutes
(No change)
N/A
Maximum lifetime for user ticket
10 hours
(No change)
N/A
Maximum lifetime for user ticket renewal
7 days
(No change)
N/A
Maximum tolerance for computer clock synchronization
5 minutes
(No change)
Maximum tolerance between the client's and server's clocks.
Note: If you want to more information so you can visit http://www.iyogibusiness.com/
What is the actual address used for a default gateway?
The address of a default gateway can vary widely depending on which device on which network is the default gateway. There isn't one specific default gateway address.
A popular address is one used on home based networks, 192.168.1.1
What is considered to be the least complex trust model?
Web-of-trust
Answer Explanation: The web-of-trust model is very simple, and is most often associated with Pretty Good Privacy (PGP). This model operates without a central authority. Individuals create and sign certificates for people who are known and trusted. The decision of whether to trust another individual is left with the user.
Lamport's hash implements a one-time password protecting against eavesdropping and password file theft.
What would you recommend for the core switches?
Depending on the size of the network and actual traffic requirements technically a "core layer switch" can scale from a 2960 all the way up to and beyond a 6500.
Some block cipher modes of operation only use encryption because the input is set to
some initialization vector and the leftmost bits of the output of the encryption function
are XORed with the first segment of plain text p1 to produce the first unit of cipher text
C1 and it is transmitted. While in decryption, the cipher text is XORed with the output of
the encryption function to produce the plain text.