answersLogoWhite

0

📱

Computer Network Security

Network security is any form of computer security dealing with multiple computers linked through a network. Questions about everything from firewalls to viruses to denial-of-service attacks belong here.

1,030 Questions

What is needed to connect your computer with other computers or hardware?

If your using windows go to remote assistance and put in the other computers internet protocol (ip) address.

Easier if you have Windows Live Messenger you can easily ask people if they would like remote assistance.

What are physical communication media?

# Twisted pair - Wire twisted to avoid crosstalk interference. It may be shielded or unshielded. #* UTP-Unshielded Twisted Pair. Normally UTP contains 8 wires or 4 pair. 100 meter maximum length. 4-100 Mbps speed. #* STP-Shielded twisted pair. 100 meter maximum length. 16-155 Mbps speed. Lower electrical interference than UTP. # Coaxial - Two conductors separated by insulation such as TV 75 ohm cable. Maximum length of 185 to 500 meters. ## Thinnet - Thinnet uses a British Naval Connector (BNC) on each end. Thinnet is part of the RG-58 family of cable*. Maximum cable length is 185 meters. Transmission speed is 10Mbps. Thinnet cable should have 50 ohms impedance and its terminator has 50 ohms impedance. A T or barrel connector will have no impedance. Maximum thinnet nodes are 30 on a segment. One end of each cable is grounded. ## Thicknet - Half inch rigid cable. Maximum cable length is 500 meters. Transmission speed is 10Mbps. Expensive and is not commonly used. (RG-11 or RG-8). A vampire tap or piercing tap is used with a transceiver attached to connect computers to the cable. 100 connections may be made. The computer has an attachment unit interface (AUI) on its network card which is a 15 pin DB-15 connector. The computer is connected to the transceiver at the cable from its AUI on its network card using a drop cable. Maximum thicknet nodes are 100 on a segment. One end of each cable is grounded. 3. Fiber-optic - Data is transmitted using light rather than electrons. Usually there are two fibers, one for each direction. Cable length of 2 Kilometers. Speed from 100Mbps to 2Gbps. This is the most expensive and most difficult to install, but is not subject to interference. Two types of cables are: 1. Single mode cables for use with lasers has greater bandwidth and costs more. Injection laser diodes (ILD) work with single mode cable. 2. Multimode cables for use with Light Emitting Diode (LED) drivers. All signals appear to arrive at the same time. P intrinsic N diodes or photodiodes are used to convert light to electric signals when using multimode.

{| ! Media ! Distance(meters) ! Speed ! Approx Cost/station | UTP 100 4-100Mbps $90 STP 100 16-155Mbps $125 Thinnet 185 10Mbps $25 Thicknet 500 10Mbps $50 Fiber 2000 100Mbps-2Gbps $250 (multimode) |}

Help someone said they were going to hack me and i dont want to be hacked please HELP?

1.) You need to have any kind of anti-virus.

2.) when you see random crap popping up, turn off your router, it'll cut the connections between you, and the hacker.

3.) its smart to close any ports you have open.

4.) have a password on your computer.

Good Luck!

How does symmetric key encryption work?

Symmetric encryption requires that both parties (sender and receiver) know and have the exact same encryption key. This key is used both for encrypting and decrypting the data. Using the same encryption algorithm means that only those individuals that know or have the same key will be able to read any messages encrypted by the symmetric key.

What is Tribal flood network?

The Tribe Flood Network or TFN is a set of computer programs to conduct various DDoS attacks such as ICMP flood, SYN flood, UDP flood and Smurf attack.

Tribal Flood Network (TFN), like trinoo, is a classic DDoS attack, using a master program and multiple agents on multiple compromised systems.

Unlike trinoo it can spoof the source IP for the agents, and can generate multiple types of attack (including UDP flood, TCP SYN flood, ICMP echo request flood, and ICMP directed broadcast).

TFN2K is a more sophisticated version of the original TFN.

Explain the types of information that could affect confidentiality and security and how to handle this in the workplace?

If any confidential information to do with clients is given out, it is a very serious matter as it may be causing a threat to others, types of information that could affect confidentiality and security are peoples personal details for example their PIN numbers, national insurance numbers or account numbers. All of this information can be kept confidential by not telling anyone them, do not discuss a client's case over the phone to a family friend or someone that knows the person. The data protection act was set up to prevent confidential and secure information from being given out and it is breaking the law if you do. All these sorts of information should be handled very carefully this way no information will be revealed. It is very important that we handle this information with great care not only to protect the information but to keep the business professional and legal.

i hope this helps:) x

Who or what types of website or companies use symmetric key encryption?

If you are using an encrypted channel, then at some point everyone uses symmetric encryption. It is fast (compared to asymmetric).

The first part of an encrypted conversation will probably use asymmetric encryption to provide the shared private key that is later on used for the bulk part of data conversations on an encrypted channel.

Should these ports be open on windows 7 135 139 443 445 2869 5357 10243?

From what ive seen these ports dont have to be open I really dont think that they should effect your W7 experience

How do you block websites with certain text in the URL such as social networking sites over a network or particular workstations?

If you're using Google Chrome (and who in their right mind isn't?), you can quickly download AdBlock (free on chrome) and you can block not just adverts but just about anything you want :-)

How can a security framework assist in the design and implementation of a security infrastructure?

The security framework provides strategic direction to design and implement the security infrastructure. It also ensures the accomplishment of objectives.

How do you detect zombies in a network?

If you monitor traffic on computers on a network and find traffic occurring when no user is logged on, you probably have a zombie, especially when you are getting outbound traffic when no authorized used is actually using the system.

How essential are good security practices in the field of Network Device Management?

Good security practice is very essential in the field of Network Device Management. Without securities things could go wrong very fast and causes a lot of issues.

What kind of transmission media would you recommend for each different department of a medical instrument company with four different buildings and why?

Need to know what sort of data is going to be transferred. Is itconfidential files with a need for a very secure line. Or is it just for a reliable email system to build up social bonds among employees in the different buildings..? What is the existing technology like? What is your budget? We need to know a bit more information before we can give an answer.

You have been asked to deign the entire cable system for a medical instrument manufacturer's new central warehouse. The company already has three buildings within two city blocks, and the warehouse will be its fourth building. Currently, the building run on separate network, but the company would like to be able to exchange data among them. For example, the quality control department building 1 would like to be able to access servers in the research department in building 2.In addition, the sales department in building 3 wants to conduct video training session for its representatives in the field via internet. Next door, in the warehouse, 50 shipping and packing personnel in the fulfillment department will be riding up and down the aisles on forklifts pulling inventory off the shelves on daily basics.

What kind of transmission media would you recommended for each different building and department of the medical instrument company and why?

What is included in a network traffic signature?

protocols, TCP/IP headers, attack signatures, prot numbers

The rules for making a hash algorithm are public on the fips website how come someone with access to lets say my sha1 function cant decipher the resulting hash?

Great question - one of the things about hashing is that it is very difficult or impossible to reverse the hashing process, even if you know the algorithm. This is because just doing the steps backwards will not result in the original value.

What does security management enable you to do?

Security management enables you to enjoy protection in your system. You will be notified of any potential threats and firewalls are set up for your system's protection.

What is the firewall. What is the purpose of a firewall?

To filter access (in and out) to network only to a legitimate user.

Common attribute used to filter on a firewall :

1. IP number

2. MAC address

3. DNS

And so you don't have access to any websites that contain:

games

proxies

porn

downloads

chat sites (facebook, ebuddy, MSN INBOX, messenger)

What is an attempt to penetrate the security of a system by convincing people to disclose secret information?

this would be called social engineering

example someone calls an employee and says they are it and they need their password and the employee gives up the info