answersLogoWhite

0

📱

Computer Network Security

Network security is any form of computer security dealing with multiple computers linked through a network. Questions about everything from firewalls to viruses to denial-of-service attacks belong here.

1,030 Questions

What is sink node?

Sensor network comprises of scattered sensor nodes with limited computational capabilities and battery power. The existing security solutions for traditional wireless networks can not be used because of the constraints associated with sensor network. We present secure sink node architecture as two-tiered scheme for sensor network security. The architecture protects the sink node from unauthorized access by surrounding it with two protection layers. Sink nodes listen to only inner layer nodes and inner nodes are allowed to communicate with only outer layer nodes. These protection layers are formed in an intelligent manner without violating constraints specific to sensor network. In order to enhance security, protection layers are re-adjusted in case of an attack. We present statistical analysis to elucidate the performance of proposed architecture.

What are the different types of security?

  1. Large-company common stocks.
  2. Small-company common stocks (small caps).
  3. Corporate bonds (Long-term).
  4. Government bonds (Long-term).
  5. Immediate-term government bonds.
  6. Treasury bills (T-bills) / Short-term government bonds.

What are the advantages of a honey pot site?

Some of the advantages of a honeypot site are:

- brings money to the local economy

- Creates jobs for the local people, bringing them money (which then can link into the MULTIPLYER EFFECT)

- It'll boost the publicity for the area so that more tourists revisit the area in the future

- Because the area has more money they can reinvest

What Security auditing is handled by?

The security auditing is usually handled by the professional auditing firms. Such firms usually hire professional accountants and auditors to help them with the same.

How many bits in 4 octects?

An octet is a unit of digital information in computing that consists of eight bits. The term is often used when the term byte might be ambiguous, because there is actually no standard for the size of the byte (although octet and byte are often used interchangeably). Since an octet has 8 bits, 4 octets would have 32 bits (4x8=32).

Why a packet has limit of 63 characters?

A packet does not have a limit of 63 characters - depending on the protocol it may have a total size of 1508 and beyond; the actual data is somewhat smaller but not limited to 63 characters.

For Ethernet frames, 64 characters is closer to the minimum size for data.

What is the process of encapsulation of one packet within another called?

Tunneling, but you should really read your textbook before asking routing questions online... ;)

How do you begin to become a network engineer?

Network engineers are the backbone of the computer infrastructure of a company. Large companies are able to employ many network engineers, while smaller ones often need to hire a consulting group. These engineers update a computer network and fix problems whenever they arise. If you want to become a network engineer, you need a love of computers as well as terrific problem-solving skills. == Bachelor's degree in computer engineering or computer science. == Step 1 Study a computer-related field in college. Despite the name, network engineering doesn't require an engineering degree. You could also study a completely different major and minor in information technology.

Step 2 Get a job at your university's office of information technology. Most large schools hire student IT support to work in both classroom and dorm environments. These jobs generally require 1 to 2 years of computer-related study and are a great way to build your resume.

Step 3 Learn to use all different kinds of operating systems. Most network administration computers use a different operating system than the office computers and company laptops. You'll need to be familiar with all of them in order to become a network engineer.

Step 4 Look for an internship with the IT department of a company or with a computer consulting firm. The number of students majoring in computer-related fields is growing, so you will need experience to help you stand out from the pack.

Step 5 Work on your communication skills. If you become a network engineer, you'll often have to work with people who aren't as tech-savvy as you. You should learn to explain computer problems in straightforward language. Consider taking an acting, improv or speech class to hone your communication skills.

Would you connect to an Unsecured Wireless Network?

The rule generally is connect to an unsecured wireless network at your own risk. The security risk to your privacy and device are high. Its not advisable at all

Why would you need wtls to implement wireless transport layer security?

To Provide needed security measures and Privacy for Wireless application protocol (WAP) clients and servers

To provide a suitable security protocol given the limited memory,bandwidth, and processor capabilities of WAP clients

Why is header checksum required in TCP?

Its used to detect an error if the packet may be mis-routed. I'm not 100% sure.

What is transparent firewall?

Since the fundamental task of a firewall is to filter packets, the weak point in its traditional behavior is the fact that it also must route packets after a decision is made. Can the model be simplified? Of course it can, and the answer comes by stepping down a layer in the OSI model. Instead of the device handling packets at layer 3 (network), what if it merely inspected frames and moved them to the proper interface? Sound familiar? This type of device would continue to filter packets, but operate at layer 2 (data link), like a bridge. Such a device has come to be known by several names: a transparent, in-line, shadow, stealth or bridging firewall.

ranajoy karmakar@gmail.com

ccna,network engineer

How do you find a wpa key for a wireless network without it hooked up to my computer?

You can't. If you do not know it and there is no other computers connected to the same router, there is no way you can get the key without setting up a new one.