answersLogoWhite

0

📱

Computer Network Security

Network security is any form of computer security dealing with multiple computers linked through a network. Questions about everything from firewalls to viruses to denial-of-service attacks belong here.

1,030 Questions

What is the drawback of distance vector algorithm?

The distance vector algorithm does not take into account current traffic, type of link, speed of link, type of endpoint routers, etc. It cannot adjust for changes in network traffic and bottlenecks.

What is antispoofing?

  • Using spoofing, an intruder can fake the source address of his packets and make them look like they originated on the trusted hosts.
  • The basic idea of anti-spoofing protection is to create a firewall rule assigned to the external interface of the firewall that examines source address of all packets crossing that interface coming from outside. If the address belongs to the internal network or the firewall itself, the packet is dropped.

Saguaro federal has mainframes for all of its bank and businesses should the company use ethernet or token ring protocol. explain your choice why is this choice appropriate?

Saguaro Federal should use Token ring protocol, as it appears there are multiple locations. Ethernet protocol could be appropriate if everything was located in the same building.

What is perimeter physical security?

Physical Security is the protection we provide for the buildings, property and assets against intruders. When designing a physical security program, the three levels you need to protect are your outer perimeter, your inner perimeter and your interior. The outer perimiter of your property is defined by your actual property lines.

Perimeter security is a set of physical security and programmatic security that provide levels of protection against remote malicious activity.

Perimeter security is enforced in the following areas:

  • Physical Access Control. The security devices and policies that are enforced for physical access control prevent the spread of viruses through portable storage devices, help protect data on the phone and the Subscriber Identity Module (SIM) card.
  • .cab Signing. .cab file signing provides a more secure method of packaging and delivering applications in Windows Mobile Standard. By signing the .cab files for downloads, Windows Mobile Standard can verify the source and integrity of the file.
  • Device Management. The security policies that are enforced for device management help to protect the device from threats that may originate from over-the-air (OTA) downloads or push messages.
  • Microsoft® ActiveSync®. The RAPI policy that is enforced for ActiveSync operations helps to protect against application-level threats.
Removable Storage Card Security

Is port no 80 and 8080 is same?

No, physically they are different numbers. Logically, however, both port 80 and port 8080 listen for HTTP traffic, so logically they are the same.

Port 80 is the standard, production port for HTTP traffic. Port 8080 is a 'test' port for HTTP traffic.

What does a core switch do in a network?

It lets all nodes connected to the network get full available bandwidth on the network.

How do you securely access your computer from the web?

Use a VPN - either configure your own VPN endpoints or use a commercial third party service to connect your system to the web in a secure fashion.

List six different types of vulnerabilities critical for computer network security?

  1. Software defect This is the most common one will encounter. A defect can be in operating system

    software or application software. Defects in the OS are typically more worrisome, but an application defect can be just as troublesome. For example, a defect in a database management system (DBMS) that allows customers' data to be viewed by unauthorized people on the Web is just as damaging as revealing that same data through an OS defect. Examples of typical sofware defects are buffer overflows, design problems that allow access to functions that should be disallowed, allowing malformed input, allowing access to files or data that should be disallowed, and so on.

  2. Clear text data captured It is more true now, that the usage of wifi is a common practice. If user, password, or other data is transmitted across open networks in clear text, it can be intercepted and used. A classic example is the difference between TELNET and SSH. TELNET transmits all data including passwords and login names in clear text. Anyone on the network and have their network card in promiscuous mode, can sniff out the login information and gain access to a system. SSH uses encryption on all traffic and is more secure. The same is true when using FTP instead of SFTP.
  3. Weak passwords Crackable or easily guessable passwords are a common way for hackers to gain initial access to a system. Cracking passwords are much more easier with more people having access to very powerful computers than ever before; and if you can network a host of powerfull computers to crack passwords the possibiulites are great. Because of the fact that linux passwords (and commands) are case sensitive, one should take advantage of this and use both uppercase and lowercase words along with numbers punctuation marks and even spaces. And change it often, atleast once a month.
  4. Spoofing Spoofing occurs when an attacker pretends to be an entity and takes over communication between systems. For example, if SystemA and SystemB are communicating, the attacker could set up SystemC to use SystemB's IP address, hostname, and so on. The hacker could then use a DoS attack to knock SystemB offline and take over the "conversation" with SystemA.
  5. Carelessness Carelessness is a human error that hackers exploit to gain access to a system that is exposed through negligence or stupidity. Two classic examples are using the default password and writing down a password.
  6. Denial of service "A denial-of-service attack (also, DoS attack) is an attack on a computer system or network that causes a loss of service to users, typically the loss of network connectivity and services by consuming the bandwidth of the victim network or overloading the computational resources of the victim system" (from http://en.wikipedia.org/wiki/Denial_of_service). Examples are invalid packet floods, valid packet floods, and service floods such as HTTP attacks.
  7. Access controls restriction This condition occurs when permission to access a resource (a service, file, directory, system) is not properly restricted.

I am sure there are other types of vulnerabilities that should be taken just as seriously as the one mentioned above. However you can never be too secure. So don't only think about conventional methods of attacks and securing your system, chances are like yourself, an attacker is also thinking out of the box to attack your system.

Why should i get hired as a networking manager?

I assume you have networking training and that you want to work in the field... isn't that why anyone wants to be hired in a certain field?

Also - it pays well ...

Does limiting your signal range increase network security?

Yes, it would, because if you limit (reduce) the signal range it won't be visible to a possible attacker.

What is secure networking?

"The many countermeasures put in place to secure the network and the data stored on or travelling over it are referred to as network security. The goal of network security is to protect the network against cyberattacks, hacker attempts, and employee error etc.

Types of Network Security

Access control

Antivirus and anti-malware software.

Application security.

Behavioural analytics.

Data loss prevention

Distributed denial of service prevention.

Email security.

Firewalls.

etc.

For More Information or any need of the services Contact Reliable Infotech Solutions

"

How would you determine your current IP address and default gateway?

Go into command prompt by searching "cmd" in the star menu, or holding the "windows" key and pressing R, then typing in cmd.exe.

In the console, type in "ipconfig" without the quotes.

It will tell you your current IP address and default gateway, which is usually always 192.168.0.1 or 1.1

What software is designed to close logical ports in your computer?

A Firewall. Some systems like Windows come with a sort of firewall, but your will probably find something much better from a third-party company, some of which are free. Sygate used to be good, but I think it's gone now. I've heard Comodo free and Online Armor are good ones available now.

Your 2005 Jaguar s type bluetooth says no phone?

When you are connecting your Bluetooth devise, make sure that you have activated the pairing feature on both your phone and your car. Once you in a pairing state, you enter the pin code in the required field.

What is the minimum category of twisted pair cabling that should be used to support networking?

The minimum category cabling for networking is cat 3 cable. That cable will allow you to transmit and receive on a LAN at a maximum of 10 Mbps.

What is communication overhead?

In the context of computers, communication overhead is those bits of data that must be sent to convey information about, for example, where the information originated and where it is being sent to, how it is to be routed, timestamps, or any other information that is not actually the "payload" representing the actual content to be communicated.

What type of education is needed for a career in network security?

As a Network Security Specialist instructor, this is what I tell my students:

  1. Have an excellent background in networking
  2. Learn the various aspects of security from a security program
  3. It is desirable to have some aspects of software development, notably with scripting
As you can tell, there isn't one way to get the information you need to be a successful security specialist. Although you may concentrate in a certain area, the successful ones need to be a generalist, in many different but related areas.

Is network security a good field to be in?

Yes - recent studies show that the growth in jobs should be around 16 - 20% for 2010, and this is an area that cannot be outsourced. The use of networks is growing all the time, and so is the need for trained professionals.

What are the job responsibilities of desktop engineer?

Answerprovide Tier 3 Support technical support, advanced knownledge of registry, permissions, and drivers and software required.

work with vendors to analyze and troubleshoot solutions

automate software application deployments

provide and recommend solutions to senior management

patch desktops in an enterprise architecture

analyze and troubleshoot windows installers