answersLogoWhite

0

📱

Computer Network Security

Network security is any form of computer security dealing with multiple computers linked through a network. Questions about everything from firewalls to viruses to denial-of-service attacks belong here.

1,030 Questions

What is the data called when it is to be encrypted by inputting into an algorithm called?

Before encryption, the data is referred to as "plain text". After encryption it is called "cipher text".

What is the purpose of DDoS?

The only purpose is to disrupt access to websites by flooding the servers with more requests than they can manage.

How monitoring 5 or 6 computer based server based networking?

You have several solutions:

1. Setup a mirroring port in your switch, and connect the internet monitoring software computer to the mirroring port. For internet monitoring software, I would recommend "WFilter enterprise".

2. Setup a proxy server. And do monitoring in the proxy server. (eg: Squid web proxy)

In voice communications circuit switching is preffered over packet switching Give reasons?

You need a dedicated circuit for carrying voice communications that cannot be shared with others. That won't happen with packet switching, which will result in choppy and non-understandable conversations.

How do you secure your wireless network?

Log into your router, enter the system password and secure things.

192.168.1.1 <--- type this into your Ip address bar. Not working? Try the ones below.

192.168.0.1

192.168.1.254

If you don't know the password, try different default ones including password, administrator, admin, and nimda (admin in reverse). Or you can look in the manual that came with your router.

...

#1 Open the "Run" program.

#2 Type in "CMD"

#3 Type in "IPCONFIG" this will give you information about your network.

#4 Look at the default gateway and stream to the right. You should see your router's IP address. If you don't see anything make sure you are connected to your wireless network.

#5 Open your internet browser it doesn't matter which you use. Type in your router's IP address on your IP address bar above.

#6 Usually it will prompt for a password. Enter the password and secure your stuff!

ISDN network security concerns?

What is ISDN? As a short word, some network engineers use ISDN network terminology for WAN connection using ISDN technology. ISDN stands for Integrated Services Digital Network which provides switched (dialed) digital WAN services in increment of 64 Kbps.

ISDN Network availability is widespread, but you can still find places where it is simply not available. One key reason to use dialed connections of any kind, including ISDN network, might be to send and receive data for only short periods of time. Routers frequently use ISDN network to create a backup link when their primary leased line or Frame Relay connection is lost. ISDN technology uses T-carrier technology to quickly and efficiently send digital data streams over existing phone lines.

ISDN network Channel

ISDN network includes two types of interfaces: Basic Rate Interface (BRI) and Primary Rate Interface (PRI). Both BRI and PRI inISDN technology provide multiple digital bearer channels (B channels), over which temporary connections can be made and data can be sent. Because both BRI and PRI have multiple B channels, a single BRI or PRI line can have concurrent digital dial circuits to multiple sites, or multiple circuits to the same remote router to increase available bandwidth to that site.

How do you set a password on a echolife hg520b router so no one else can use my wireless network?

Use your browser to connect to the router http://192.168.1.1 and login (default username and password are admin) In the navigation pane on the left, expand tools and click System Management The admin account will be in listed in the table. Click on the pencil in the right hand column to edit the account. Supply the old password and the enter and confirm the new one, save the changes and you're done. You will probably be prompted to login with the new password to continue on the page, but this will give you a chance to test it. Good Luck.

Why attenuation is much higher in coaxial cable than in twisted pair cable?

It is not true. Attenuation is higher in twisted pair cable. See related links:

It is, because coaxial cable is concluded system and magnetic field of signal in coaxial cable is kept inside the cable so there is little energy losses because no energy is spent on inducing currents outside of cable.

How are classical encryption techniques like modern symmetric-key cipher?

In symmetric key techniques there is a single key and that key is kept secret. Symmetric key is a like a sub part of classical encryption.

Why all the focus on cyberspace cybersecurity and cyberwarfare?

In 2009, cybercrime surpassed the drug trade in terms of overall revenue, so it's easy to see the seriousness of the activity. For every operating system, application, and even file type, there are vulnerabilities which can be exploited by worms, viruses, malware, script kiddies, organized crime, and attacks by foreign entities. To protect ourselves, we rely upon the skills and abilities of IT security teams.

Notable security incidents include the TJ Maxx and Home Depot wireless security breaches, in which criminals drove around sniffing networks, broke the feeble WEP encryption, and stole millions of credit card numbers. A Veterans Affairs employee left a laptop on the back seat of his vehicle - it was stolen, along with the PII of millions of veterans. The bomber of the World Trade Center also used PGP to encrypt his communications with other planners (this is well before 9/11).

To protect against these types of incidents, cybersecurity personnel focus on awareness training, security policy development, instituting best practices for access control and authentication, cryptography, malicious software, intrusion detection and prevention, and overall network topology. The many fields of cybersecurity produces specialists

Unfortunately, there are far fewer security personnel than there are criminals, which is why cybersecurity professionals are so highly sought after (and paid). The US Government has indicated that computer security vacancies are a critical field, and are subject to direct hire, and DoD 8570 compliance states that IT personnel will be paid premiums for their security certifications.

Most recently, the United States Army's new CyberCommand at Ft. Meade, MD is the new home of the Dept. of Defense's breeding ground for cyber operators. Although an autonomous command, CyberCommand will have some overlap with the NSA in their duty to protect DoD networks, suggest policies for civilian entities, and even infiltrate other foreign governments in the event of a cyberwar.

The United States is not the only government to have such a command - the recent attack on Google is thought to be an action of the Chinese government. Computers built overseas are often discovered to have components which may supply information to the originating country - in effect, the foreign states are asking companies to install hardware which can spy on users.

It's not safe out there - a new out of the box Dell can be compromised within 15 minutes once connected to a network. NIST has documentation on how to protect your computers, although some functionality may be lost. The NSA provides manuals on locking down Windows based computers, and surprisingly, recommend Apple's own security manual for locking down Apple computers.

What is the role of a network in client-server architecture?

Simple: in order to have a client-server architecture you need a network. The role of the network is to move data packets between the client and the server. In a client-server architecture the server usually has to manage the network (for example, a domain controller in a Windows environment).

What does KIV stand for in KIV-7?

The KIV in KIV-7 is not an acronym for anything. The KIV models are some of the latest in the family of Type-1 encryption devices approved by the NSA which have designations starting with the letter "K". The first generation of NSA cryptographic devices were electromechanical and included the KL-7. Many subsequent devices also have "K" as the first letter of their designation. It could be speculated that the K is related to "cryptographic" or "key" (as in cryptographic key) but considering the NSA's penchant for using code words that have nothing to do with the information being classified it is probably just coincidence.

How often do you run computer network security?

If a computer system is operating then it should be utilizing network security. So the answer would be all the time.

Which is NOT a wireless security practice?

The following are very basic, but common, bad Wireless Security practices:

  • Connecting to unknown networks;
  • Leaving your wireless connection unsecured;
  • Using typical passwords (123, Admin, Letmein, etc);
  • Not securing your router/modem password;

There are other uncommon bad practices such as IGMP Snooping setting misconfigured, setting high DHCP lease lengths, bridging unsecured connections, among others.

How does one do network security?

Network security can be done in a variety of manners. In general, the methods to perform network security involve constantly updating hardware and software to combat potential computer threats.

What are the core aspects of computer security?

different aspects of computer security including:

Firewalls

Passwords

Security (Antivirus and Antispyware) software

Keeping software up to date

Trickery on the net

Dangerous downloads

Backing up data

What are the most recent technology advances in the muscular system?

what are the most recent & advanced technologies in the petroleum industry what are the most recent & advanced technologies in the petroleum industry

Advantages of network?

i) we can share the important files, documents,etc within the network.

ii) we can share the costly hardware and software in network.

iii) we can take the data backup within the network.

What is Cluster Area Network?

A Cluster Area Network, also known as a Campus Area network or CAN, is a network comprised of a series of small LANs over a small Geographical area, such as a College Campus.

What is the fragmentation threshold?

The maximum frame size wireless device can transmit without fragmenting the frame.

A collision happens when two devices that use the same medium transmit packets at exactly the same time. The two packets can corrupt each other, and the result is a group of unreadable pieces of data. If a packet results in a collision, the packet is discarded and it must be transmitted again. This adds to the overhead on the network and can reduce the throughput or speed of the network. Larger frames are more likely to collide with each other than smaller frames. You can make the wireless packets smaller by lowering the fragmentation threshold. If you lower the maximum frame size, it can reduce the number of retransmissions caused by collisions, and lower the overhead caused by retransmissions. However, making frames smaller introduces a different kind of overhead. Smaller frames introduce more overhead on the network too. This is especially true on a wireless network, because every fragmented frame sent from one wireless device to another wireless device requires the receiving device to acknowledge the frame. In times of high packet error rates (over five or ten percent collision or errors), lowering the fragmentation threshold can help improve performance of the wireless network. The time that is saved from reducing re-transmissions can be enough to offset the extra overhead added by using smaller packets. This can result in higher throughput. If the rate of packet error is low and you lower the fragmentation threshold, wireless network performance will decrease. This is because lowering the threshold adds protocol overhead and reduces protocol efficiency. The default maximum value 2346 is recommended.

When did they ban hacking?

Never have. You can't ban this activity ... a "hacker" is an individual who is interested in learning the ins and outs of a particular procedure or device. As a result, there is nothing to "ban".

What can be considered is whether the activities are done illegally or cross a company policy.