answersLogoWhite

0

📱

Computer Network Security

Network security is any form of computer security dealing with multiple computers linked through a network. Questions about everything from firewalls to viruses to denial-of-service attacks belong here.

1,030 Questions

Name five things that may impact network operations when you upgrade the network operating system NOS?

1) Lack of monitoring during upgrades.

2) System's errors due to lack of NOS to communicate during upgrade

3) Heavy load on Support websites due to questions on the upgrade

4) Depending on where the NOS is located if the systems being upgraded are in the same physical location as live servers there is always the possibility of someone unplugging a wrong cord or overloading a UPS during the upgrade.

5) Employee's misinforming

What are the main advantages and disadvantages of using a layered network architecture?

The following are the advantages of a layered architecture:

Layered architecture increases flexibility, maintainability, and scalability. In a Layered architecture we separate the user interface from the business logic, and the business logic from the data access logic. Separation of concerns among these logical layers and components is easily achieved with the help of layered architecture.

Multiple applications can reuse the components. For example if we want a windows user interface rather than a web browser interface, this can be done in an easy and fast way by just replacing the UI component. All the other components like business logic, data access and the database remains the same. Layered architecture allows to swap and reuse components at will.

Layered architecture enables teams to work on different parts of the application parallely with minimal dependencies on other teams.

Layered architecture enables develop loosely coupled systems.

Different components of the application can be independently deployed, maintained, and updated, on different time schedules.

Layered architecture also makes it possible to configure different levels of security to different components deployed on different boxes. sO Layered architecture, enables you to secure portions of the application behind the firewall and make other components accessible from the Internet.

Layered architecture also helps you to test the components independently of each other.

The following are the disadvantages of a layered architecture:

There might be a negative impact on the performance as we have the extra overhead of passing through layers instead of calling a component directly.

Development of user-intensive applications can sometime take longer if the layering prevents the use of user interface components that directly interact with the database.

The use of layers helps to control and encapsulate the complexity of large applications, but adds complexity to simple applications.

Changes to lower level interfaces tend to percolate to higher levels, especially if the relaxed layered approach is used.

What steps need to be taken when assessing the risk of a data breach?

The steps we took to assess one of our largest ever data breaches was simple, but the process was long and difficult. What we were first needed to figure out was how many total records were breached. Then, we needed to figure out what type of data was in those records and the source of the breach. Perhaps the most difficult and time-consuming aspect of all of this was the time we spent researching and trying to figure out how the data was used and if it was.

What is a network types of network and how network mission is critical in business?

network is connection of two or more computers .

three main types of network:

1.LAN(local area network) means-LAN are confined to a small area.Usually,this small area is within a single building,although it need not be confined to just a single office.

Sometimes LAN's spread through several buildings on the same site.

2.MAN (METROPOLITAN AREA NETWORK) means-A MAN is a computer network run by one (1) organisation that connects together several LAN's across a larger area such as a city.It is larger than a LAN

3.WAN (WIDE AREA NETWORK) means-A WAN is a computer network spread over a very large area,and uses satellite and other connection rather than cable

there are also 2 others

4. CAN (campus area network)

5. PAN (personal area network)

1.PEER-TO-PEER2.CLIENT/SERVER

BUISNESS DATA & INFORMATION CAN BE SHARED BY DIFFRENT BUISNESS ORGANISATIONS SITUATED AT DIFFRENT LOCATION.

IDENTIFYING JOB OPENINGS AND ARRANGING MEETINGS WITH THE PEOPLE WHO WILL MAKE THE HIRING DECICIONS

What is the difference between promiscuous mode and inline mode?

Inline is used to look at a specific location such as between two routers, where as promiscuous mode captures traffic using a capture device such as a hub or switch, this way all traffic that goes through the device is monitored.

How secure is biometric?

I you are asking what the false-acceptance rates (FAR) are ... it depends on the type of biometric and how the sensitivity is set. The tighter you set the tolerances, the fewer false acceptances you get, but the more false rejections (FRR) you get.

Typically:

Fingerprint: 1% FAR at 10% FRR, 0.01% FAR at 20% FRR

Hand-print: Better than fingerprints - somewhere in the neighborhood of Retina scans

Iris: more intrusive but more accurate than retina scans

Retina: better than fingerprints, less than Iris. Affected by health - prone to false rejections when health changes

Voice: highly variable - affected by health (ever had a sore throat?)

Facial recognition: 1% FAR at 10% FRR, 0.01% FAR at 30% FRR

... of course there are other biometrics that can be used, there are just some examples and YMMV.

Usually Bio-metrics needs to be combined with another authentication method to achieve strong security - but with another method - even if the other method is a second bio-metric - it is very strong.

If you are asking a bout how secure the database of bio-metric information is... that's just a general question of how secure the computer system is. Improperly secured it would be a tasty target for an attacker seeing PII on individuals.

How is blocking related to a crossbar switch?

: Blocking can occur when two switch inputs attempt to access the same intermediate switch channel.

What is the fastest way to get your system clean?

Either you can download system cleaner software

or follow these simple steps:

1.go to C drive.

2. right click and go to properties

3. click on disk clean up.

4. then choose what you want clean all there are either deleted material or temp. files.

5. click OK

Which SSL certificates are good for subdomain security?

Wildcard SSL certificates are good for subdomain security.One of the most important aspects of your ecommerce website is Secure Sockets Layer (SSL) protection.When you buy a wildcard SSL certificate, you can use it to encrypt all of the subdomains. However, it is important that the there is a common factor in the domain names.

What security risks are present when authenticating over an unencrypted network connection?

The main problem is somebody sniffing the network. At least when the traffic is encrypted the attacker now has to unencrypt it. Depending on your encryption this could take minutes or months.

How big of a risk does authenticating over an unencrypted line pose. Depends on what your authenticating to, if its only your youtube account then you will probably dont have much to worry about, if your authenticating with your bank for perhaps a money transfer - then this could lead to problems.

What is Ring Protection in SDH?

Ring protection is a system where multiplexers are connected in a ring topology. If a single span fails traffic switches around the other side of the ring.

Discuss major types of attacks you could expect to experience and the resulting damage to your site?

Impossible to say without knowing what kind of site you are talking about, and what services you are running. If a site is public, available via a network connection, or a remote dialup, you could be subject to any attack that has an attack vector through those methods.

Your job is to make sure that the attacks do not succeed, thereby eliminating or vastly reducing any possible damage to the site.

Why 48 bit key is USED in des algorithm?

The total key length for single DES is 56 bits. At the time, it was felt that was adequate so that someone could not easily guess what the key was. With automated approaches that has been shown to be too weak for good cryptoanalysis.

What 'are' the primary information security areas?

Quick and Dirty Answer:


The primary security areas are: 1.) Confidentiality 2.) Integrity 3.) Availability

Consider an web browser http client that wants to retrieve a web document at a given URL the ip address of the web serverhttp server is initially unknown what transport and application-layer pro?

If the client doesn't know the IP address of the desired web server it has to find that out. This can be done via DNS if you know the name of the server as part of the URL.

After the address is located then transfer takes place using HTTP protocol. This is a layer 7 (application layer) protocol.

What is a few options?

In order to name some options one would need to know the area - the question does not specify any.

What is a maintenance security program?

The maintenance of the security system involves periodic checks of all the elements that make up the installation (cameras, detectors, computers, circuits, lighting systems, etc.) to verify that they work well. Next, systems that are not functioning properly would be corrected or repaired (corrective maintenance).

Is possible eyes use for network security as password?

I'm going to go out on a limb somewhat here, but if you are referring to the use of a human eye as a password then you are talking about a biometric device known as a retinal scanner. They do exist as lock devices primarily, but could be used for just about anything that requires authentication that is difficult to fake.

What essential protections must be in place to protect information systems from danger?

The essential (basic or foundation) protections to protect information systems must consist of a three tier approach: Technical, Physical and Administrative. Within these tiers are the core building blocks of managing a dynamically changing security posture. Before moving on, seriously consider, no protection can be more consistently effective without situational awareness, due diligence, and enforcement. Broken down succinctly you must ensure certain hardware and software are installed, implemented well and the latest security patches is kept updated: Network Router/Switch, Operating System (OS), Firewall, Anti-Virus, Spyware Protection and any security updates available for your other software. Remember these are basic protections. In addition, a great back up plan: External drives and/or High Capacity storage Media (the former is usually faster), and a real time backup application for both the data as well as the system itself. It will allow for recovery of not only your important data but you can also fully restore your information system in a shortened amount of time (as opposed to reloading the OS and each application). Finally, you need encryption; two types: 1. Data-at- Rest (stored on hard drives and/or other media) and 2. Data-in-Transit (Sending your data from one location to another and keeping it from prying and spying eyes). All of the above is the beginning of your "defense in depth" information systems protection program.

Technical security controls are devices, processes, protocols, and other measures used to protect the information system; examples include but not limited to; encryption, anti virus, firewalls, Spyware Protection, etc.

Physical security controls are physical ways and means you prevent access to the information systems; locked doors, fences, alarms, cameras etc.

Administrative controls are essentially the polices and procedures put in place to ensure your information system doesn't become vulnerable by following some basic rules and acceptable use policy (not to mention what information you authorize to give out and who can access your information system).