answersLogoWhite

0

📱

Computer Network Security

Network security is any form of computer security dealing with multiple computers linked through a network. Questions about everything from firewalls to viruses to denial-of-service attacks belong here.

1,030 Questions

How to disable 1996 Nissan Pathfiner security system?

have you got a key lock inside your glovebox? our 93 pulsar has a special key that fits a lock that is in the gove box, it turns the system off and on.

What is interception in Information security?

considering 2 systems in communication, when a hacker enters into the scene, he want's data which is being transmitted. so, he first hijacks the session, so that the data sent by first system is transmitted to both the second system and hacker................

What is a RF Lead?

What is sometimes called a Radio Frequency lead is a shielded cable used beween pieces of equipement to reduce the effects of radio frequency interference.

Where can one gain a qualification in information system security?

One can gain a qualification in Information System Security (ISS) from the following colleges and Universities: Devry, ITT Technical Institute, Sheridan College, Tech IMO, Gantham, Westwood, Rotheram, to name a few.

What is simple duplex?

A simple duplex is a channel through which data is transmitted and it can either be half or full duplex. Half duplex means that data can be sent or received but not at the same time while full duplex means that this can happen simultaneously.

Why is network security becoming an issue?

Usually because it requires more time to process traffic. It's well known that wireless networks with enabled security are slower than unsecured. If you have in the same time a lot of users it might become a serious issues and purchase of additional equipment is required.

Almost the same is true for wired network.

How do you stop a computer to broadcast?

Three basic ways:

  1. On most lap tops there is a switch on the front
  2. On most towers there is a USB stick to unplug
  3. On all computers WIFI and Blue-tooth can be disabled from "my computer".

Why is it important that security exercises be conducted?

Security exercises should be conducted for several reasons:

1) to keep those with responsibilities for executing incident response familiar with policies, procedures, tools, and their own responsibilities

2) to identify potential flaws in security so that they can be remediated or mitigated

3) to train people new to security responsibilities

4) to keep those with security responsibilities in a mindset to always be thinking about security - rather than getting focused on other day-to-day operational responsibilities and neglecting security

5) to provide incentive to those with security responsibilities to keep security well-maintained lest they be embarrassed during a security exercise

When the primary key of one table is represented in a second table to form a relationship?

This is known as a "foreign key" (the data it points to is foreign to the current record). It is also commonly called a "foreign key constraint", usually in database systems where the database will perform additional data integrity checks when a primary key is updated or removed (such as restricting deletion of the primary record, clearing the value in the foreign key field, or cascading the deletion to the related records).

What is unauthorised modification?

Unauthorised modification is changing the contents of a file without the granted permission

What is the best definition of Information Security?

There are so many different conflicting definitions about Information Security out there; however there are clear censuses amongst the field's professionals and leaders on the following definition writing by Michael Chahino and Jason Marchant:

INFORMATION SECURITY is a discipline governing the framework for the continuous cycle of safeguarding information and ensuring related regulatory compliance.

- Discipline

• a branch of instruction and learning such as history, finance, economics

- Framework

• a frame or structure composed of parts fitted together documenting the methodology of incident identification, mitigation, and resolution much like the scientific method

- Cycle

• a series of processes that are repeated in a precise and deliberate manner

- Information

• electronic, printed, audible, visual, memorized

- Compliance

• ensuring that the institution is in compliance with applicable laws, regulations, and contractual agreements

Source(s):

Computer Security Institute (CSI) 2010 Annual Conference

What can be accomplished by practicing defense in depth?

Defense in depth is a concept where there are multiple layers of protection. An analogy would be the way a castle is defended. The first layer of defense could be clearing the area around the castle to prevent attackers from having anything to hide behind. The next layer might be a moat around the castle that would make getting to the castle wall difficult. The next layer might be a thick outer wall that is difficult to breach. Making the wall high would be another layer of protection, making it hard to go OVER the wall. Archers mounted on top of the wall would be another layer of protection. Providing arrow slits for the archers to shoot through would provide more protection for the archers and make them more effective at defending the castle. The castle might aslo contain an inner-keep that provides another layer of defense that would have to be breached in order to get to those inside.

In computers the defense-in-depth could be achieved by combining many different protections to build up to greater overall protection. If one defense is breached there are still other protections in place that can thwart the attack. Anti-virus software, firewalls, e-mail filters, security training, policies and proceedures, physical access limitations, system backups, system redundancy, contingency planning, and many other technical, policy, and procedure protections can be combined to provide good overall security for a computer system.

What company pioneered in network security monitoring?

Marcus Ranum, the CSO of the company Tenable, is known for building the worlds first firewall. He was named an industry pioneer by SC Magazine in 2009.

What is switch in network?

There are three (3) ways to do switching: circuit switching, message switching, and packet switching.

A network may employ 2 of these (message switching and packet switching) to send and receive data.

How many No. of ports in router?

The number of ports vary with the router - some as few as 4, and some many more than that.

Trending Questions
What are the main advantages and disadvantages of Single Sign-On solutions? What are the 3 A's of network security? How can you provide security to your system? What types of information are included in the show cdp neighbor command? How to solve Transfer problems between primary and secondary zones in Windows 2000? When the meaning of information is disclosed to only authorized individuals which service is provided Information availabilty or information integrity or information confidentiality or info nonrepudi? What is availability for IA security? Why do some block cipher modes of operation only use encryption while others use both encryption and decryption? What are the main advantages and disadvantages of using a layered network architecture? What company pioneered in network security monitoring? What security risks are present when authenticating over an unencrypted network connection? Where to download William stallings book? How do you securely access your computer from the web? What is piggybacking in computer security? A company wants to configure a firewall to monitor all channels of communication and allow only traffic that is part of a known connection Which firewall configuration should be deployed? Is network security a good field to be in? Why ip is called connectionless? What firewall keeps track of the state of the state of network connections traveling through the firewall? Let 01111 be the frame delimiter flag in a data link protocol What is the transmitted bit sequence for the data 0111110111011110 using the bit stuffing method? DiD elements focus on what three areas?