answersLogoWhite

0

📱

Computer Network Security

Network security is any form of computer security dealing with multiple computers linked through a network. Questions about everything from firewalls to viruses to denial-of-service attacks belong here.

1,030 Questions

What are the phases of the incident response development process and What are the critical elements of each?

Form the IR planning team, Develop the IR policy, Organize the security incident response team (SIRT), Develop the IR plan, and Develop IR procedures.

The critical elements are: Statement of management commitment. Purpose and objective of the policy. Scope of the policy. Definition of information security incidents and their consequences within the context of the organization. Organization structure and delineation of roles, responsibilities, and level of authority; should include the authority of the incident response team to confiscate or disconnect equipment and to monitor suspicious activity, and the requirements for reporting certain types of incidents. Prioritization or severity rating of incidents. Performance measures and reporting and contact forms.

What is the diffie-hellman cipher?

Diffie-Hellman is not as much a cipher as a means of securing exchanging keys. You would use it to securely notify someone else of a symmetric shared key that you both would use for encrypting data.

Think of it as more a key exchange method utilizing public and private keys than an actual cipher methodology.

What is the padding in networking?

padding meanse when we send some small data than it add some more bits and then sends it does not affect the original data.

Why ip is called connectionless?

IP is connectionless because you don't want routing to reply to every routing request; it would slow things down to almost a stop. The router has to assume that the packet arrives where it was sent.

What is the purpose of open system interconnection?

A:

Internetworking (i.e., the interconnection of two or more individual networks) is a complex task.

The communication process is judging as successful if the transmitted message has been delivered at the authorized destination(s) in a reliable and secure fashion and the meaning understood by the destination matches the meaning intended by the source.

Before the communicating parties starting to communicate, they have to define the several communication functions required for successful communication (i.e., flow control, error detection and correction, congestion control, addressing, routing, message formatting, etc.), and establish rules, conventions, and agreements, that govern these functions. These rules or protocols have to be followed by the communicating entities in order to ensure the success of the communication process.

In network communications, there are three basic agents:

  • Applications running at hosts that want to communicate.
  • Hosts that want to communicate (sources and destinations).
  • Subnetworks where these hosts belong.

So, to accomplish communication, we have to provide both physical connectivity between the hosts (this includes the definition of the cabling, the connectors, the physical topology, etc.), as well as logical connectivity (this includes software processes as the addressing and the routing).

In general, we want to accomplish:

  1. Reliable communication between applications running at different hosts.
  2. Best-effort delivery of messages between hosts locating at different networks.
  3. Access of a host to a network.

As you can understand, some of the communication functions are used to accomplish task (1), some others are used to accomplish task (2), and some others are used to accomplish task (3). So, these functions are forming logical groupings called layers.

We can visualize these layers as a stack. Each layer communicates with the others via a well-defined interface. Each layer has well-defined communication functions, which are concerned with one of the above communication tasks (1, 2, or 3). These functions are governed by associated protocols (that is why this layered network architecture also called protocol stack). Each layer is concerned with its own task, and provides services to the upper layer in a transparent fashion. Each layer "trusts" the other layers and depends on them working properly in order to accomplish successful communication.

The International Standards Organization (ISO)established a seven-layer internetworking model called Open System Interconnection (OSI) to serve as a blueprint for internetworking. It is an open model, that is, a model which defines the layers, their functions, and the associated protocols, but not the actual way to accomplish these functions. That gives more flexibility to vendors to use the technological solution they believe that best fits to their needs.

OSI is a reference model (not used so much in practise, because is very abstract) that is used to:

  • Simplify the networking concept, dividing a complex task to several simpler tasks.
  • Allow the interconnection of equipment from different vendors.

The layers of the OSI model from top-to-bottom are:

  • Application layer (layer 7): Requires network resources and provides services to the end user. Examples of protocols include HTTP, FTP, etc.
  • Presentation layer (layer 6): Concerned with the syntax of the data. Encryption, coding, and formatting are the functions of this layer. Very theoretical layer. Example of protocols include JPEG, MPEG, etc.
  • Session layer (layer 5): Concerned with the communication between different applications. In other words, establish and terminates sessions. Very theoretical layer. Example of protocol include Xwindow.
  • Transport layer (layer 4): Concerned with reliable end-to-end transfer of messages. Two major protocols: TCP (reliable or connection-oriented) and UDP (unreliable or connectionless).
  • Network layer (layer 3): Best-effort (unreliable) transport of messages between different networks. Other tasks include Quality of Service (QoS), etc. Example of protocols include IPv4, IPv6, IPX, ICMP, etc.
  • Data Link layer (layer 2): Concerned with the accessing of the information onto the media (media-dependent layer) and the detection (not correction) of errors. Many technologies are associated with this layer (e.g., PPP, Ethernet, HDLC, etc.). Consists of two sublayers, Logical Link Control (LLC) sublayer - the upper sublayer -, used for framing and communication with the upper layers, and Medium Access Control (MAC) - the lower sublayer -, used for accessing the media.
  • Physical layer (layer 1): Concerned with the electrical and mechanical characteristics of the media. Includes cables and connectors types, message formatting (i.e., voltage values, frequencies, bit patterns, data rates, etc.), and physical topology (the way the devices are physically connected).

From layer 7 to layer 4 we have end-to-end communication. Layers 2 and 1 concerned with host-to-network communication(i.e., network access). Layer 3 has a flavor of both.

Layers 7 to LLC sublayer are implemented in software. MAC sublayer and physical layer are implemented in hardware.

Repeaters and hubs (multi-port repeaters) operate on layer 1. Switches operates on layer 2. Routers operate on layer 3 (connect different networks).

At the communication process between two hosts, data are passing from all the layers of the protocol stack (from top to bottom). Each layer at the source device adds a header (data link also adds a trailer or tail) which contains control information in order to accomplish its functions. This process is called encapsulation.

This header with the data of the upper layer forms a Protocol Data Unit (PDU). The PDU of layers 7 to 5 is referred as data. Layer 4 PDU is referred as segment (when TCP is used) or datagram (when UDP is used). Layer 3 PDU is referred as packet. Layer 2 PDU is referred as frame. Layer 1 PDU is referred as bit stream.

At the destination, the information goes through the protocol stack from bottom to the top. Each layer staps-off the header and moves up the PDU. This is called decapsulation.

The "virtual" communication between the same layers at the source and the destination devices is called peer communication (and these layers are called peer layers).

You have to understand that a network model is a theoretical approach to the networking function that helps us to simplify and understand the overall process.

Kotsos

What is a secure process for keeping confiditial information private?

A good way to keep your private data secure is GnuPG or PGP, which are encryption suites (google them to get more info)

What is Client ID in blackboard?

This is usually the user - either your student-id or a user name you have been given from the BlackBoard administrator.

How can an operating system helps administrator to control a network and manages security?

"http://wiki.answers.com/Q/How_can_an_operating_system_helps_administrator_to_control_a_network_and_manages_security"

Domain security policy in windows server 2003?

In Server 2003 domian security policy helps you to set Password Protection.. 1)Password length 2)Password Complexity 3)Password Age (min age & max age) In Server 2003 domian security policy helps you to set Password Protection.. 1)Password length 2)Password Complexity 3)Password Age (min age & max age)Default and Recommended Password Policy Settings

=============================================== Policy Default Recommended Comments

Enforce password history

24 passwords remembered

(No change) Prevents users from reusing passwords.

Maximum password age

42 days

(No change)

N/A

Minimum password age

1 day

(No change)

Prevents users from cycling through their password history to reuse passwords.

Minimum password length

7 characters

(No change)

Sets minimum password length.

Password must meet complexity requirements

Enabled

(No change)

For the definition of a complex password, see "Creating a Strong Administrator Password" in the Establishing Secure Domain Controller Build Practices section.

Store password using reversible encryption

Disabled

(No change)

N/A

Default and Recommended Account Lockout Policy Settings

====================================================== Policy Default Recommended Reason

Account lockout duration

Not defined

0 minutes

The value 0 means that after account lockout an Administrator is required to reenable the account before account lockout reset has expired.

Account lockout threshold

0 invalid logon attempts

20 invalid logon attempts

The value 0 means that failed password tries never cause account lockout. Because an account lockout duration of 0 minutes (administrator reset) is recommended, a small number for this setting can result in frequent administrator interventions.

Reset account lockout counter after

Not defined

30 minutes

This setting protects against a sustained dictionary attack by imposing a nontrivial delay after 20 unsuccessful attempts.

Default and Recommended Kerberos Policy Settings

================================================ Policy Default Recommended Comments

Enforce user logon restrictions

Enabled

(No change)

N/A

Maximum lifetime for service ticket

600 minutes

(No change)

N/A

Maximum lifetime for user ticket

10 hours

(No change)

N/A

Maximum lifetime for user ticket renewal

7 days

(No change)

N/A

Maximum tolerance for computer clock synchronization

5 minutes

(No change)

Maximum tolerance between the client's and server's clocks.

Note: If you want to more information so you can visit http://www.iyogibusiness.com/

What is the actual address used for a default gateway?

The address of a default gateway can vary widely depending on which device on which network is the default gateway. There isn't one specific default gateway address.

A popular address is one used on home based networks, 192.168.1.1

What is considered to be the least complex trust model?

Web-of-trust

Answer Explanation: The web-of-trust model is very simple, and is most often associated with Pretty Good Privacy (PGP). This model operates without a central authority. Individuals create and sign certificates for people who are known and trusted. The decision of whether to trust another individual is left with the user.

What is lamport hash?

Lamport's hash implements a one-time password protecting against eavesdropping and password file theft.

What would you recommend for the core switches?

Depending on the size of the network and actual traffic requirements technically a "core layer switch" can scale from a 2960 all the way up to and beyond a 6500.

Why do some block cipher modes of operation only use encryption while others use both encryption and decryption?

Some block cipher modes of operation only use encryption because the input is set to

some initialization vector and the leftmost bits of the output of the encryption function

are XORed with the first segment of plain text p1 to produce the first unit of cipher text

C1 and it is transmitted. While in decryption, the cipher text is XORed with the output of

the encryption function to produce the plain text.

How can you have Rp1009 digitkey security system manul?

To have an Rp1009 digit key security system manual, you can start by searching for the official documentation from the manufacturer’s website or contacting their customer support for resources. Alternatively, you may find user manuals and guides on forums or community websites dedicated to security systems. Additionally, consider checking online retailers or third-party sellers that often provide product manuals for various devices. Always ensure that the source is credible to avoid misinformation.

How do you use a utp cable tester?

there is lan tester available in the market, we have to connect one side of the crimped cable to one of the part of lan tester and the other side crimped cable had to be enter the other part of the lan tester... then we have to on the lan tester and we are able to visible LED's blinking one after the other , if not ther is a problem in crimping the cable..

What is resegmenting?

Resegmentation refers to a continued or repeated process of dividing into segments. In computers, it is a method that is generally used in databases.

What is IT security?

,

If you would like to learn more in IT Security, you have to take CISSP training course and the exam.

I suggest the Net Security Training company where I have completed CISSP course.

Their web-site is:

http://www.net-security-training.co.uk/

Regards,

Nick

What is used to secure wireless LANS?

1. Security algorithms like, WEP (Wired Equivalent Privacy) and WPA/WPA2 (WiFi Protected Access) are used for securing Wireless networks.

2.Creating a hidden network is also a good choice because ordinary computer users cannot see hidden networks.It adds an extra layer of protection.