answersLogoWhite

0

📱

Computer Network Security

Network security is any form of computer security dealing with multiple computers linked through a network. Questions about everything from firewalls to viruses to denial-of-service attacks belong here.

1,030 Questions

What is the fastest way to get your system clean?

Either you can download system cleaner software

or follow these simple steps:

1.go to C drive.

2. right click and go to properties

3. click on disk clean up.

4. then choose what you want clean all there are either deleted material or temp. files.

5. click OK

Which SSL certificates are good for subdomain security?

Wildcard SSL certificates are good for subdomain security.One of the most important aspects of your ecommerce website is Secure Sockets Layer (SSL) protection.When you buy a wildcard SSL certificate, you can use it to encrypt all of the subdomains. However, it is important that the there is a common factor in the domain names.

What security risks are present when authenticating over an unencrypted network connection?

The main problem is somebody sniffing the network. At least when the traffic is encrypted the attacker now has to unencrypt it. Depending on your encryption this could take minutes or months.

How big of a risk does authenticating over an unencrypted line pose. Depends on what your authenticating to, if its only your youtube account then you will probably dont have much to worry about, if your authenticating with your bank for perhaps a money transfer - then this could lead to problems.

What is Ring Protection in SDH?

Ring protection is a system where multiplexers are connected in a ring topology. If a single span fails traffic switches around the other side of the ring.

Discuss major types of attacks you could expect to experience and the resulting damage to your site?

Impossible to say without knowing what kind of site you are talking about, and what services you are running. If a site is public, available via a network connection, or a remote dialup, you could be subject to any attack that has an attack vector through those methods.

Your job is to make sure that the attacks do not succeed, thereby eliminating or vastly reducing any possible damage to the site.

Why 48 bit key is USED in des algorithm?

The total key length for single DES is 56 bits. At the time, it was felt that was adequate so that someone could not easily guess what the key was. With automated approaches that has been shown to be too weak for good cryptoanalysis.

What 'are' the primary information security areas?

Quick and Dirty Answer:


The primary security areas are: 1.) Confidentiality 2.) Integrity 3.) Availability

Consider an web browser http client that wants to retrieve a web document at a given URL the ip address of the web serverhttp server is initially unknown what transport and application-layer pro?

If the client doesn't know the IP address of the desired web server it has to find that out. This can be done via DNS if you know the name of the server as part of the URL.

After the address is located then transfer takes place using HTTP protocol. This is a layer 7 (application layer) protocol.

What is a few options?

In order to name some options one would need to know the area - the question does not specify any.

What is a maintenance security program?

The maintenance of the security system involves periodic checks of all the elements that make up the installation (cameras, detectors, computers, circuits, lighting systems, etc.) to verify that they work well. Next, systems that are not functioning properly would be corrected or repaired (corrective maintenance).

Is possible eyes use for network security as password?

I'm going to go out on a limb somewhat here, but if you are referring to the use of a human eye as a password then you are talking about a biometric device known as a retinal scanner. They do exist as lock devices primarily, but could be used for just about anything that requires authentication that is difficult to fake.

What essential protections must be in place to protect information systems from danger?

The essential (basic or foundation) protections to protect information systems must consist of a three tier approach: Technical, Physical and Administrative. Within these tiers are the core building blocks of managing a dynamically changing security posture. Before moving on, seriously consider, no protection can be more consistently effective without situational awareness, due diligence, and enforcement. Broken down succinctly you must ensure certain hardware and software are installed, implemented well and the latest security patches is kept updated: Network Router/Switch, Operating System (OS), Firewall, Anti-Virus, Spyware Protection and any security updates available for your other software. Remember these are basic protections. In addition, a great back up plan: External drives and/or High Capacity storage Media (the former is usually faster), and a real time backup application for both the data as well as the system itself. It will allow for recovery of not only your important data but you can also fully restore your information system in a shortened amount of time (as opposed to reloading the OS and each application). Finally, you need encryption; two types: 1. Data-at- Rest (stored on hard drives and/or other media) and 2. Data-in-Transit (Sending your data from one location to another and keeping it from prying and spying eyes). All of the above is the beginning of your "defense in depth" information systems protection program.

Technical security controls are devices, processes, protocols, and other measures used to protect the information system; examples include but not limited to; encryption, anti virus, firewalls, Spyware Protection, etc.

Physical security controls are physical ways and means you prevent access to the information systems; locked doors, fences, alarms, cameras etc.

Administrative controls are essentially the polices and procedures put in place to ensure your information system doesn't become vulnerable by following some basic rules and acceptable use policy (not to mention what information you authorize to give out and who can access your information system).

What is the meaning of stack-based buffer overflow?

A buffer overflow occurs when you put more stuff into it than it can hold. For a stack, it means you put or pushed onto the stack more information than the size of the stack.

If I have a stack that can hold 10 entries, then putting 11 in the stack will overflow it.

What can you do with a degree in network security?

There are many career opportunities with a IT security degree. Some entry level positions are: IT security technicians, firewall administrators, IT security assurance, and IT security manager. Your career can lead into several prestigious positions such as an information security officer or even a chief information security officer.

Generally an IT security degree falls into the network security category. Examples of job roles can be to manage firewalls and intrusion detection/prevention systems, develop security policies, setup encryption standards, packet level analysis, and provide consulting.

What is the difference between discretionary and mandatory access control?

In the most common implementations of Discretionary Access Control, users "own" their directories and the files and programs they contain. They can grant and deny access and execution privileges for these to other users. Users can also be parts of groups. They may be able grant or restrict access to all members of a group.

In Mandatory Access Control the operating system controls the ability of a subject or initiator to access or generally perform some sort of operation on an object or target. The object or target can be something like a process, a file, a directory, a program, or a memory segment. Subjects and objects each have a set of security attributes. Whenever a subject attempts to access an object, an authorization rule enforced by the operating system kernal compares these security attributes to the policy and decides whether the access or operation will be allowed. With mandatory access control, this security policy is centrally controlled by a security policy administrator; users do not have the ability to override the policy and, for example, grant access to files that would otherwise be restricted.

Which are three general approaches of replay attack?

Three general approaches to replay attacks include:

  1. Packet Replay: An attacker captures network packets and retransmits them to impersonate a legitimate user or session, often targeting authentication processes.
  2. Session Replay: This involves replaying a previously established session's data to gain unauthorized access, typically by reusing session tokens or cookies.
  3. Man-in-the-Middle (MitM) Replay: An attacker intercepts and stores communications between two parties, later replaying them to manipulate or deceive either party without their knowledge.

What are root keys in association with digital certificates?

Digital certificates are verified through the use of another certificate, creating a chain of certificates that ends with the root certificate

The issuer of a certificate is called a certification authority (CA). The owner of the root certificate is the root certification authority.

If one system failed in star topology what happens?

In a star topology only the failed system would have a problem, unless the device was the network connectivity device (on a LAN).

In a WAN, if the building was connected through the central building and the central building had a problem then all buildings would be affected. If it isn't the central connection point then only the building with the problem would be affected.

Advantage and disadvantage of fix partition?

A disadvantage of fixed partitions is the severe limitation that occurs through the fixed or allocated space in the particular division. Another disadvantage of this is the loss of magnetic disc space of the total disk space available when running different operating systems on the same hard disk.

Should the SSID broadcast option should be turned off at the access point?

It should be, it makes your router a little bit harder to find for people who should not use your router anyway.