answersLogoWhite

0

📱

Computer Network Security

Network security is any form of computer security dealing with multiple computers linked through a network. Questions about everything from firewalls to viruses to denial-of-service attacks belong here.

500 Questions

Why authentication in important for file protection?

User Avatar

Asked by Wiki User

Operating system data file protection through authentication is very important. A file can be any important document which may contain data or information that may be very valuable for the company or the owner of the file. If proper authentication is not carried out then the company can incur loss of data, expose to viruses and trojan attacks and can face a lot of issues. Authentication also increases the value of the information saved in the files because it does not appear fake. By giving the authentication to the people, you can ensure that no unauthorized person will access the file or imitate it. Just take the example of art work of a person saved in a file. Therefore, identification of the person is very necessary before sharing any file with any other person.

What is advantages of intrusion detection system?

User Avatar

Asked by Wiki User

Basically, instrusion detection -- either software installed on a computer or server or software built into a security appliance -- is for detecting and notifying you of any unuathorized attempt to gain access to your computer or network. There are several different schemes for intrustion detection, all based on some sort of user or machine authentication.

What does wireless network security do?

User Avatar

Asked by Wiki User

Because a wireless network is not specific to your home computers, you must secure the network so that other people cannot access your wireless connection. Without security, anyone driving by with a laptop or Ipod could access your internet connection and download items, or even access you personal information. Wireless security puts a password on your internet connection so that only the people you want using your internet will be able to access it.

Where is your WPA2 key?

User Avatar

Asked by Wiki User

Wireless keys are stored in the memory of the access point; to retrieve it you would need to know the admin password to get into the configuration page.

Example og upper and lower case password?

User Avatar

Asked by Wiki User

THIS IS UPPER CASE & this is lower case. So it is basically CAPITAL and small letters.

Why is it important to limit the number of open ports a system?

User Avatar

Asked by Wiki User

The more ports you have open on a system the larger the attack surface is. This means the more chances a malicious attacker has to get into your system and do something bad.

It is similar to having holes in a boat - the fewer, the better.

What is the difference between digital and analogue?

User Avatar

Asked by Wiki User

This is the part of electronics consisting of such circuits which processes analouge quantities is called analogue electronics. And the part of electronics which provides the data in the form of a maximum and minimum voltage signals i.e. By two voltage levels only is known as digital electronics.

What is the advantage of dynamic routing?

User Avatar

Asked by Wiki User

The router needs a routing table, to know where to send IP packets. The purpose of dynamic routing is to update the routing tables automatically. This means you need much less configuration, and the network dynamically adjusts to topology changes (for example, a router is added, or a cable has a bad connection).

What is a common password vulnerability?

User Avatar

Asked by Wiki User

There are many things that can make your password vulnerable. Some examples of password vulnerability are not changing the default password on a router, using common words or words that can be easily guessed by someone that knows you, and using the same password for all of your accounts.

WHICH OF THE FOLLOWINGARE FUNDAMENTAL OBJECTIVES OF INFORMATION SECURITY?

User Avatar

Asked by Wiki User

Regarding HIPPA recertification: all the above

What does information security protect information from?

User Avatar

Asked by Wiki User

Let's just say you have lots of vital information such as customer specifics, technological discovery that you'd want to implement into your company's operations, etc. You'd want to protect them from being read, which may lead onto them being used. You lose competitive edge over others as the information can be used by others.

There are many forms of attacks available:

hackers

trojans/malware

viruses

espionage

STAFF

There are many forms of information security software/hardware available. From monitoring of incoming/outgoing information on the internet, network gateway security to encryption strategies that stops files being used.

I find that encryption is the most useful one as no matter how much monitoring you do, you cannot stop people from stealing through USB, portable harddrive, etc. Or you'd have to be on constant vigilance when the monitoring software alarms you of the stealing actions.

Some opensource encryption softwares (i.e. free) avaiable on the internet, though I've forgotten the names. These softwares provide single user information security.

Some bigger enterprise security softwares such as EZ-Lock DRM by Digital Commerce Information provides full encryption strategies that allows different range of users, from 10 users to 30000. Its core ability is that users do not have to change any working habits but at the same time having everything encrypted and thus secured.

Others such as Adaptive Network Security from Brandford Network emphasizes on recognizing friends and foes. It integrates and correlates network resources, user information, and device information to automate security and IT operations.

How many bits in an IP V6 address?

User Avatar

Asked by Wiki User

128 Bits.

An IPv6 address is made up of 8 fields consisting of 16 bits per field. If you multiply 8 x 16 will get 128 bits.

Each field is separated by colons unlike IPv4 which was separated by dotted decimal notation.

A good link to go to to see the address and how sub-netting is done is on the related links below.

What ways that user can help strengthen security in a network?

User Avatar

Asked by Wiki User

- Do not run the computer with local administrator right

- Use strong password and never share it (lock the screen if you have to leave your pc).

- Change password afterwards if you are force to share it.

- Do not use the network for private matters.

- Use a secure VPN to encrypt your work while surfing the web and block attacks.

- Use a recommended anti-virus program such as Norton to block back-doors allowing access to your network from the outside.

- Do not use your network account for private affairs like Mailist, Facebook...etc.

- Do not mess around with antivirus and firewall set by the admin

- Always scan the USB stick after using it on other machines.

What operating system often used for server applications is a scaled-down version of unix?

User Avatar

Asked by Wiki User

This unenlightened question is found on many A+ certification exams, First, I will tell you the that they want. Then I will tell you why there is no correct .

The that they want you to write in is "Linux." This is in spite of the fact that Linux scales even higher than Unix and has more features, thereby making most Unix implementations the "scaled-down" operating system.

In order for something to be legally called a "version of Unix", it must undergo a rigorous certification process. No Linux distro has ever undergone this process, and so cannot be called a "version" of Unix. So then you would have to look at what certified Unix systems are commonly used in the server market. The only certified Unix systems still commonly used on the server market are Solaris 10, AIX and Mac OS X. All three of these systems scale very highly, which makes them unsuitable as an .

What are the potential risks for network security?

User Avatar

Asked by Wiki User

u may encounter some hackers slip in and watch ur privacy

and may need a tool

Which intermediary devices could be used to implement security between networks?

User Avatar

Asked by Wiki User

Security between networks is implemented in an intermediary device (a router or firewall appliance) at the perimeter of the network. The firewall function performed by this device permits only known, trusted data to access the network.

How can you forcibly remove AD from a server and what do you do later Can I get user passwords from the AD database?

User Avatar

Asked by Wiki User

dcpromo /forceremoval forcibly remove AD from a Server.

After you use the dcpromo /forceremoval command, all the remaining metadata for the demoted DC is not deleted on the surviving domain controllers, and therefore you must manually remove it by using the NTDSUTIL command.

What is meant by network security?

User Avatar

Asked by Wiki User

Answer

Effective Network Security has many layers. It requires security features at the local level (on each individual computer, and on the network level. A network is group of computers that share a common connection and so therefore are on the same network. For example, every computer that connects and uses to your home wifi are on the same network.

A network is a a group of individuals like i said. Therefore, computers themselves must have anti-malware software installed and that software must be frequently updated. Malware that affects a network of computers usually infected one computer initially and then other computers on the network were infected.

Network security also use a firewall. Firewalls monitors which websites (specifically the severs that host them) send data to the computers on the computer. They also monitor the data computers send to websites. Every time you visit a website your computers sends data to a server and that server back to your computer. Network security is important because it protects Fortune 500 companies, government agencies and home networks.

How do you design a computer network?

User Avatar

Asked by Wiki User

I used www.webs.com works well + free

Is there a need of physical security while using cryptography?

User Avatar

Asked by Wiki User

Yes. Decrypted or plain text - yet to be encrypted - messages need to be kept securely before they are encrypted and transmitted.

How is encryption commonly used?

User Avatar

Asked by Wiki User

Data encryption the process of scrambling stored or transmitted information so that it is unintelligible until it is unscrambled by the intended recipient. Historically, data encryption has been used primarily to protect diplomatic and military secrets from foreign governments. It is also now used increasingly by the financial industry to protect money transfers, by merchants to protect credit-card information in electronic commerce, and by corporations to secure sensitive communications of proprietary information.

All modern cryptography is based on the use of algorithms to scramble (encrypt) the original message, called plaintext, into unintelligible babble, called ciphertext. The operation of the algorithm requires the use of a key. Until 1976 the algorithms were symmetric, that is, the key used to encrypt the plaintext was the same as the key used to decrypt the ciphertext.

What are the Features of network security?

User Avatar

Asked by Wiki User

Enterprise security software products provide many features that help to protect companies. Some of the features include the protection of databases, infrastructure such as servers, private and sensitive data, firewalls, protection against hacking and data loss and many more.