answersLogoWhite

0

📱

Computer Network Security

Network security is any form of computer security dealing with multiple computers linked through a network. Questions about everything from firewalls to viruses to denial-of-service attacks belong here.

1,030 Questions

Brute force attack and man in middle attack can be countered by Secure socket layer?

True - with SSL your traffic is being encrypted and cannot be understood or altered by a man in the middle attack or brute force unless the keys used are weak (which is not likely).

There are ways to fake connections (primarily by proxy servers) so that the user believes they have an SSL connection to a site but they really do not. The actual SSL connection is from the proxy server to the site, not the user to the site. The end result is that the proxy may be able to read the user's information.

What is the best type of system security?

The best type would be Front Point Security. They have been rated the best on several different rating. They are a wireless security system. These are considered the safest as there are no wires to cut to disable the system.

What does a client server network provide and how does it work?

The Client is the computer or device requesting data from the Server, which is a computer hosting the data. It works through a network protocol, more than likely TCP/IP.

Who is ultimately responsible for the security of information in the organization?

I think this is best answered by the old aphorism that security is everyone's responsibility. In practice there is likely to be a member of the Board who has the overall accountability and this person may be termed a Senior Information Risk Owner. Alternatively it may be the Chief Information Officer, the Chief Finance Officer or the Chief Executive Officer who has this accountability. Such officers are usually advised by experts in security and these may fall under the overall management of a Chief Information Security Officer. For best practice, everyone in the organisation should be given an appropriate level of security awareness training.

What are the top100 super computers?

i don`t think there is 100 types of computers, but i think HP is the best with its price

Functions of information security to an organisation?

The security of data and information is of vital importance to any organization and it is therefore a business decision as to what information should be protected and to what level. The business's approach to the protection and use of data should be contained in a security policy to which everyone in the organization should have access and the contents of which everyone should be aware. The system in place to enforce the security policy and ensure that the business's IT security objectives are met is known as the Information Security Management System (ISMS). Information Security Management supports corporate governance by ensuring that information security risks are properly managed.

Is a computer network a group of computers linked by wired or wireless technology to share data and resources?

Basically, yes. It can also be more specific or more complex than this (such as WWANs and VLANs) but the gist of it is:

A network is a group of communication devices which have intercommunication.

Why should you use Wireshark?

WireShark is a great tool for analyzing networks, finding bottlenecks, or for analyzing attacks.

What are the two principle requirements for the secure use of symmetric encryption?

Secure symmetric encryption requires that the required encryption key(s) be delivered to each authorized party securely. This may require out-of-band delivery of the key(s). Whatever the method of delivery, it needs to be secure.

It is also necessary to use keys and algorithms that cannot be broken without expending more resources than the value of the information being protected.

When the meaning of information is disclosed to only authorized individuals which service is provided Information availabilty or information integrity or information confidentiality or info nonrepudi?

When the meaning of information is disclosed to only authorized individuals the service provided is information confidentiality.

Information availability is exactly that - the availability of the information. If the system crashes or is bogged down by a DDOS attack, availability is impacted.

Information integrity is keeping the information from being altered from its correct values. If the data is corrupted or replaced with incorrect information, integrity is impacted.

Non-repudiation is providing proof that data was sent by a particular party or received by a particular party. One example would be on-line bill paying. The bill paying application should be able to provide the bill payer with proof that the payment of the bill was received by whoever they were paying. Conversely, there are times that it is important to prove the source of data. If someone sent an email agreeing to purchase a piece of land for a particular amount, and then tried to renege on the deal, it would be important to have a mechanism in place to prove that the original email really came from them. Digital signatures are often used to provide non-repudiation.

How to disable website in d-link 24 port switch?

Disable a website..? Im going to assume you mean block it. Your not going to do it from a switch either. A switch is only a very basic peice of hardware, it just passes on data - it doesn't check to see what the data is. If its only one website you could just block it from the hosts file. If its a specific type of site, you should probably just download some specific software.

What kinds of available systems sufficiently secure the reliability of network transmission?

TCP does, not sure about others. TCP can handle out-of-order packets and lost packets. Even though TCP does some rudimentary error checking, corrupted packets sometimes get through.

Why do you use encryption?

Encryption is used so that specific people, who have the key to the encryption, can read a given message, but other people who don't have the key can't read it. Sensitive information can thereby be sent to specific people while being concealed from the general public who might misuse it.

A network administrator is selecting a switch that will operate at the network core Which three features should the switch support for optimum network performance and reliability?

Probably QOS(quality of service) features would be nice in an advanced switch as well well as the ability to create vlans, and turn off certain undesirable protocols. Most of these features can be implemented from a router as well. I would also compare expandability and the speed of the backbone or (plane) that interconnects all of the blades in a large switch. I would also have at least a spare blade and powersupply for the switch if it's a mission critical switch like the switch at the network core.

I bought a new WiFi router and they give me a login IP a username and password. I don't see the WiFi network and i do not know what to do?

Generally, it is easiest to set up a new router with a wired connection, so my suggestion would be to plug the router directly into a computer and set it up as is needed for your environment. Without knowing your network configuration or the model of router you have, I cannot give you any specific advice at the moment but if you would like to talk further about this or have other more specific questions, please feel free to drop me a line. I'm always glad to help!

How do hackers get caught?

Its not possible not to get caught, however it is posssible to cover your tracks to a certain extent, Hence your Tor Browser (if configured correctly) and other things I shall not mention, if you cant figure this out on your own you shouldnt hack, being a cracker or a hacker is pretty much hot wired into a persons brain when they are born, you will never be good if you rely on others to learn, But to pirate just download tor browser from the TOR project, run it to the pirate website and bam, your pretty safe, also Remember there is allways someone bigger and better out there, when you run into them, learn tips and tricks.

Difference between adhoc network and cellular network?

to reduce power consumption and reuse the limited radio spectrum resources, a cellular network was formed. cell size is one of the factors in channel reuse rate.basically channel reuse rate in smaller cell size is higher than the channel reuse rate in bigger cell size.A cellular architecture would then present a challenge to the frequent handover procedure to the smaller cell size would usually induce a higher hand-off frequency.

in addition to cellular network an adhoc network is another network architecture for wireless networks. The adhoc network is non infrastructure network in which nodes can access services from one another regardless where they are.

the main difference between a cellular environment and adhoc network is that the adhoc method has no infrastructure allowing nodes to communicate with one another at any time and any where.

Difference between fdm and tdm?

FDM vs. TDM

TDM (Time Division Multiplexing) and FDM (Frequency Division Multiplexing) are two methods of multiplexing multiple signals into a single carrier. Multiplexing is the process of combining multiple signals into one, in such a manner that each individual signal can be retrieved at the destination. Since multiple signals are occupying the channel, they need to share the resource in some manner. The primary difference between FDM and TDM is how they divide the channel. FDM divides the channel into two or more frequency ranges that do not overlap, while TDM divides and allocates certain time periods to each channel in an alternating manner. Due to this fact, we can say that for TDM, each signal uses all of the bandwidth some of the time, while for FDM, each signal uses a small portion of the bandwidth all of the time.

TDM provides greater flexibility and efficiency, by dynamically allocating more time periods to the signals that need more of the bandwidth, while reducing the time periods to those signals that do not need it. FDM lacks this type of flexibility, as it cannot dynamically change the width of the allocated frequency.

The advantage of FDM over TDM is in latency. Latency is the time it takes for the data to reach its destination. As TDM allocates time periods, only one channel can transmit at a given time, and some data would often be delayed, though it's often only in milliseconds. Since channels in FDM can transmit at any time, their latencies would be much lower compared to TDM. FDM is often used in applications where latency is of utmost priority, such as those that require real-time information.

FDM and TDM are often used in tandem, to create even more channels in a given frequency range. The common practice is to divide the channel with FDM, so that you have a dedicated channel with a smaller frequency range. Each of the FDM channels is then occupied by multiple channels that are multiplexed using TDM. This is what telecoms do to allow a huge number of users to use a certain frequency band.

Summary:

1. FDM divides the channel into multiple, but smaller frequency ranges to accommodate more users, while TDM divides a channel by allocating a time period for each channel.

2. TDM provides much better flexibility compared to FDM.

3. FDM proves much better latency compared to TDM.

4. TDM and FDM can be used in tandem.

Definition of Non positional number systems?

In the non positional number system, the value of the number does not depend upon the position of "digits" used to represent the number. Unlike the positional number system, in non positional system every number, as a whole, is represented as a combination of certain specific symbols. Therefore, according to me, there is no such a notion of "digits" in the non positional system.

The classic example of non positional number system is the Roman number system in which the numbers are represented by certain specific symbols:

I for 1

II for 2

X for 10

XX for 20 etc.

Relationship between security cooperation and security assistance?

Security Assistance is the group of programs authorized by the Foreign Assistance Act of 1961, as amended, and the Arms Export Control Act of 1976, as amended, or other related statutes by which the United States provides defense articles, military training, and other defense-related services by grant, loan, credit, or cash sales in furtherance of national policies and objectives.

Security Cooperation is the Department of Defense interactions with foreign defense establishments to build defense relationships that promote specific US security interests, develop allied and friendly military capabilities for self-defense and multinational operations, and provide US forces with peacetime and contingency access to a host nation.