answersLogoWhite

0

📱

Computer Network Security

Network security is any form of computer security dealing with multiple computers linked through a network. Questions about everything from firewalls to viruses to denial-of-service attacks belong here.

1,030 Questions

Is DES algoritgim a Network Security?

Yes, DES can be used for network security, but it is a rather weak one that can be cracked easily.

Who are the founders of Tenable Network Security?

Tenable Network Security is a company specializing in software and hardware products for IT security. The company was founded by Ron Gula, Jack Huffard and Renaud Deraison.

Where can one contact Network Security Appliance?

There does not appear to be a company or website titled "Network Security Appliance" and it is therefore not possible to find a contact address. There are however, appliances which are used within network security and information on these is available from several sites such as Wikipedia.

Who should lead a security team Should the approach to security be more managerial or technical?

Ideally, the lead of a security team should have some technical background, but it isn't essential. A good manager is one who listens to what other team members are saying and is able to make decisions based on the evidence. The manager must rely on the technical expertise of the members, even if they themselves are also technical in nature.

For a security team it is usually the case where a senior technical lead becomes the manager after a period of time. That would be the best case scenario, but as mentioned, you have to have a person with good management skills overall, whether they are technical in the area or not.

A balanced approach is the goal from this team. The end results are technical, but the decisions and how the team operates come from management, and how they interface with the rest of the corporation is very important.

What does A strong properly configured firewall eliminates?

A strong, properly configured firewall eliminates viruses. Trojans and viruses sneak in and harm your computer when the firewall isn't set up properly.

What does information protection refer to?

Security of the systems and tools to protect the information from physical or electronic attack.

Why is RAID 0 not an option for data protection and high availability?

RAID 0 is data striping. This means that data will appear to a user as one logical disk but all the data is distributed among two physical disks. If one disk fails operation cannot continue and data is lost.

RAID 1 uses two disks that are mirrored copies of each other. If one disk fails, operation can continue and no data is lost.

What is a firewall access control list?

A control list of your firewall that you can access.

answer #2

--------------

an access control list is a set of rules that are compared to each incoming or outgoing packet or access to determine if they are allowed to pass. The rules have different formats depending on the manufacture but they do the same thing. For example a rule may say drop all packets to port external port 155, or drop all web requests from the inside to a particular web site. In a properly configured firewall all traffic is blocked unless it matches a specific rule, this prevents an application (like a virus) using an oddball port to communicate and download more dangerous software. When a new virus is discovered one way to prevent its spread is publicize the ports it uses so they can be at least monitored if not blocked entirely.

How do you set up a site to site vpn?

This isn't an easy question to answer; it depends on the hardware/software that you are using to do the actual vpn connections. You would need to be more specific about what equipment you intend to use.

Does the business intelligence security issue fall under the governance risk and compliance GRC security domain if yes which GRC tools are relevant for implementing security?

Business intelligence (BI) is an essential component to a successful governance, risk and compliance (GRC) strategy: It involves what I refer to as risk and regulatory intelligence. Basically, business has to monitor its internal environment -- as well as the external environment the company operates in -- for issues, events and risks that can impact the organization. The goal is be intelligent to maximize opportunities while mitigating or avoiding negative events.

In the business intelligence (BI) security domain to which you refer, this means implementing tools that have the ability to integrate into your environment to monitor changes, collect information, and report on the state of security across systems, processes and relationships. Further, these tools need to have content and process/workflow management capabilities to store information and provide processes to evaluate risk.

What is the Verification code picture that comes up on a website for Its the one where you have to type out the symbols in a picture?

That is called a CAPTCHA - see the site http://www.captcha.net/

It is designed so that only humans can respond, not automated computer programs.

Which of the following statements best describes IA?

Measures that protect and defend information and information systems
Iowa, since that's the most prevalent acronym.
Measures that protect and defend information and information systems

About Aspen University Reputation?

Aspen University offers you an educational experience that: * Realizes the unprecedented business opportunities available in the current business climate that are being fueled by rapid technological change. * Allows you to continue your positive career trajectory without interruption. * Understands an adult learner's reluctance to warehouse themselves for several years to gain the knowledge and skills afforded by a masters degree. * Allows you to apply current practical knowledge right away in the professional arena, as you learn it. * Respects the professional experience you've accumulated, and is designed to facilitate the sharing and receiving those valuable insights amogst your peers. * Leverages years of experience in delivering graduate education via the internet-medium for your benefit. Aspen University has always been an online University. We have been a leader in affordable online education since 1982. All of Aspen's courses are offered online for your convenience. The internet based method of learning offers unique advantages over facilities-based educational models. For example, your geographical barriers are eliminated and you have 24/7 accessibility makeing scheduling easy and allowing course study at your convenience. We provide a multitude of programs viable in today's business marketplace which are designed to help you advance your career without interrupting it. Aspen University was awarded "Best Distance Learning Program for Higher Education" by the United States Distance Learning Association (USDLA) in 1996. Aspen has a solid history in distance learning, and has been accredited by the Distance Education Training Council (DETC) since 1993. To learn about our Online course delivery methods, contact our admissions office at 303.333.4224, ext. 177. Or toll-free in the United States at 1.800.441.4746, ext. 177

Differences of Virtual Memory between Windows and Linux?

Virtual memory may be implemented in different ways in different operating systems, such as Windows and Linux, but the core concept is the same; you are simulating more memory than you have by temporarily putting it on disk. The idea is the same between the two operating systems, and the way of implementing may be very different.

From the user's point of view they are the same.

How secure is MD5?

MD5 password scrambler used to be secure but now is no longer secure.

What is an IP grabber?

An ip grabber is a program that will find the ip address of another computer. Often used by hackers.