answersLogoWhite

0

📱

Computer Network Security

Network security is any form of computer security dealing with multiple computers linked through a network. Questions about everything from firewalls to viruses to denial-of-service attacks belong here.

1,030 Questions

When do you think computer security should be applied or needed?

If a computer ever receives data from any source outside the computer or provides data to an outside recipient - computer security is needed. Since that includes the operator at the keyboard, that means just about every computer needs security. A few devices that have internal computers built into them which receive no outside data and supply no data outside of the device MIGHT get away with no security - but even there some security would be prudent to prevent malicious reprogramming of the internal computer.

When computers were being developed, the main goal was just to get them to work, not to make them "secure". As a consequence there are a lot of avenues to attack computers. The question is not so much IF a computer needs security - it is more a question of HOW MUCH security the computer needs. The degree of security a computer ought to have depends on how valuable the information on the computer is, how critical it is to protect the information from being divulged to unauthorized persons, how important it is that the information remain unaltered (You don't want errors in the data in the computers of the bank where you have an account), how important it is to be able to prove someone sent or received data (for example you want there to be proof that you sent your electronic payments and for the recipients to not be able to deny that they received them), and how critical it is to be able to get data into a computer or out of it when you want to (Any student who had their computer crash just as they were about to print out their term paper can sympathize with this one - just knowing the paper is stored on the computer doesn't help you if you can't get it out. If you include computers that run life support systems, you can see that there are even more critical systems that need to be protected such that they continue to function no matter what).

What brands of network security scanners are available?

There are several brands of network security scanners available including Nmap and Sophos which are both free scanners and GFI Landguard, a top commercial grade scanner.

The need of a computer network in a company or organisation?

There are many reasons:

1. Shared access to an internet connection

2. Shared access to resources (printers, scanners, servers etc).

3. Allows for instant file and information sharing.

4. Allows the creation of specialized resources - for example, having a file server where people's work can be stored and accessed, as opposed to using individual machines.

5. Greatly improves efficiency within a company/organization.

Feel free to add more.

Who is responsible for network security at a company?

The person responsible for the overall security of a company may have different titles, such as CIO (Chief Information Officer) or CSO (Chief Security Officer).

What is the speed of a GUI operating system?

It really depends on the version of the operating system, the version of the GUI (in those cases where the two are separate), and the capabilities of the processor(s) on which it runs. May I suggest improving the question to better target what you're after?

Why do you need internet security?

We transmit a huge amount of personal information over the Internet every day.

Is it safe? The answer is no!

Each of your actions on the network is recorded and can be used by third parties against you.

Learn how to protect your personal data.

The most reliable, cheapest and you will find all your needs there!!

Here`s the link (just remove spaces) h ttps://goo-gl.su/DoCMC

How the page faults are handled by an operating system?

We are have a two dimensional array, A: array[0..199,0..199] of characters. The contents of the array are stored in memory in row-major order starting at memory address 200. (i.e. A[0,0] is at address 200, A[0,1] is at address 201, ... A[0,99] is at address 299, A[1,0] is at address 300, etc.). In our computer each page of memory consists of 400 bytes (1 character takes up 1 byte), and there are three physical frames available to a process, one of which is taken up by the code segment currently being run. Assuming only the code segment page is initially loaded into memory, and an LRU page replacement algorithm is being used, determines how many page faults are caused by the array accesses in the following two code segments: // Code Segment A: for(j=0;j<=199;++j) for(i=0;i<=199;++i) A[i,j] = 'x';

// Code Segment B: for(i=0;i<=199;++i) for(j=0;j<=199;++j) A[i,j] = 'x'; // Code Segment A: for(j=0;j<=199;++j) for(i=0;i<=199;++i) A[i,j] = 'x';


What are the benefits of data stuffing?

The following data fragment occurs in the middle of a data stream for which the byte-stuffing algorithm described in the text is used: A B ESC C ESC FLAG FLAG D. What is the output after stuffing?

Does PDA's generally include network operating system?

A PDA would only include NOS components if they were designed to work on a network, particularly wireless networks. The more inexpensive PDAs do not do that, and have no network software. The higher end PDAs will have the required software in order to connect to a network.

What is the difference between physical security and system security?

Physical security refers to the actual availability of getting at the equipment. This is managed by using locks and other barriers which require authentication, such as a proximity card, retinal scanner, etc. For physical security the authentication techniques must be put at the site of the equipment, such as the telecommunications closet, wiring closet, server room, and so forth. An attacker would have to be in the vicinity to try and attack the equipment.

System security has to require authentication and present barriers to those from remote locations, through the network connections, web applications, and so on. Attackers in that case would not need to be in the area to try and cause problems.

What is the main function of an IP address?

Provide a unique logical address for each device on the network. Each networked device has a globally unique physical address, commonly referred to as the MAC-ID.

While the MAC-ID is guaranteed to be globally unique, it refers to a particular hardware, not to a particular device. For example, your PC's Ethernet MAC-ID will change when the LAN card changes, but its logical address (the IP address) may not have to change at the same time. This allows other devices to continue communicating with your PC even after its MAC-ID changed.

IP addresses are also grouped into subnets, which supports routing. It messages were sent using MAC-ID (physical) addressing, the message must be repeated into every subnet because the destination device could be anywhere.

What are two commonly known methodologies to monitor systems and network security?

to monitor traffic or computers on the natwork and to monitor data being sent on the network

What are different security mechanism in network security?

The process to implement the security properties is known as security mechanism. The various type of mechanism on the basis of properties is as follows:


  • Attack Prevention
  • Attack Avoidance
  • Attack Detection

Attack Prevention: can be defined as a series of security mechanism implemented to prevent or defend against various types of attack before they can actually reach and affect the target systems. An important mechanism is access control which is defined as the process of limiting the access to the resources of the Information System. Access can be implemented at different levels such as the operating system the network and the application layer.

A firewall is also an important access control system that is implemented at the network layer the concept behind firewall is to separate the trusted network from the entrusted network known as internet. The firewall prevents the attack from the outside world against the machines inside the internal network by preventing connection s attempts from the unauthorized entities located outside.

Attack Avoidance: The expansion of connectivity of computers makes the need of protecting the message and message from tampering reading important. This is the technique in which the information is modified in a way that makes is unusable for the attacker. This is performed under the assumption that the attacker may have access to the subject system/information. The sender preprocess the information before it is send through the unsecured system and the same is again post processed on the receiver end systems. This encryption and decryption is perfumed by cryptography mechanism, they are further divided in the following forms:


  • Secret Key Cryptography
  • Public Key Cryptography
  • Hash Functions

Attack Detection: In this mechanism it is assumed that the attacker is able to bypass the installed security measures to access the desired target/information. When such incidents happens attack detection takes the responsibility to report someone that something went wrong somewhere in the system.

Attack detection is not an applicable mechanism instead of that it's a check/measure which will make sure that if anything happened badly in the system then someone should be notified for the same.

What is the difference between distributed operating system and network operating systems?

The network managers are responsible for all the customers, including other networks that they buy and sell electricity to and from. Typically the distributed operating system mostly worries about the local electricity needs, however incompetent behavior is often penalized such as shut down without warning of the distributed system, non-sinusoidal waveform, poor power factor, poor phase matching, over loading interconnecting power lines and high or low voltage operation = the voltage needs to be matched plus or minus about one volt. Neil

Or alternatively, if you meant the two kinds of computer operating systems:

A network OS will share filesystems over several machines, and each computer system schedules their own processes individually. (Windows, OS X)

A distributed OS will also share the scheduling of processes as a collective group for the networked machines. A program running on one system may have subprocesses running on other systems in the network, all cooperating and running as if on the same computer. (maybe GNU Hurd)

Essential properties of network operating system?

a ntwk op. system must have d folliwing properties

1.a protocol eg.TCO/IP

2.ethernet usable

3.properties of a normal client PC or server

How can an operating systems help administrators control a network and manage security?

To Abe able to manage and control a network properly, your computer would have to have server preferences.

Server Operating Systems such as Microsoft Server 2008 can be used for security management over a network, but requires a fair bit of insight to operate and are mostly used by IT professionals only. Group Policy Controls, an Advanced firewall with by the minute updates, Network Access Protection, Network Policy and access System.

Windows 7 has a few network security capibilities built in...

What operating systems do support IPSEC?

Windows 7, Vista, XP Home/Pro, 2000, Server 2003, Server 2008

Linux kernel 2.6 has native ipsec support, so about all modern Linux versions will support it

OpenBSD, NetBSD, FreeBSD, and Dragonfly BSD currently support it

Mac OS X

What is the difference between a network operating system and operating system security?

Network security concentrates on the packets of information flowing between computer systems.

Operating System security controls access to resources on the server itself.

Therefore, the two are looking at different things in terms of security.

Why is client or server network requires a network operating system?

The purpose of a computer network is to allow users to share resources located on other computers, to share hardware devices such as printers and fax machines, to allow applications running on different computers to exchange data and to allow users to communicate electronically. A network operating system (NOS) is a special kind of operating system designed to provide networking functionality. A network operating system should support client-server networking, and include all of the programs needed to manage network resources and create a secure network environment. The most widely used network operating systems today include Microsoft Windows Server, Novell Netware, UNIX and Linux. Most network operating systems.

What is the LAN bridges and internet switches?

Bridges and switches operate at the same OSI layer - layer 2. That means they switch packets based on the destination MAC address. A switch is sometimes called a multi-port bridge.

A bridge has 2 ports, whereas a switch can have many more than that.

What things would be considered prejudiced?

Anything that prefers or deters the rights and priveleges of any group based on race, creed, color, sex or sexual orintation or religion or lack of religion in any way, shape or form should properly be considered a predjudical act.