answersLogoWhite

0

📱

Computer Network Security

Network security is any form of computer security dealing with multiple computers linked through a network. Questions about everything from firewalls to viruses to denial-of-service attacks belong here.

1,030 Questions

What is the difference between a network operating system and a desktop operating system?

Desktop OS is like windows XP professional or home edition, or Mac OS X. Network I believe is either one based on being in a network, like a cloud computing OS; or a server operating system, which tells the computer how to host websites and files in a network, including the internet.

Differentiate between desktop operating system and network operating system?

Assuming you're like the 99% who are using PCs or MACs: An operating system resides on your local computer and it's function is to allow the software to work with the hardware on that machine. A network operating system allows multiple computers to connect to each other, controlling the sharing of devices, files or programs. This resides on a shared computer called a "server". The computer then stores data on the server-side and not the client-side making it faster and more efficient. Instead of running a hundred computers with a full computer that it doesn't use all the resources and replace them with thin clients and gigibit network would make your network infrastructure 10x faster.

What are the latest network operating systems?

The latest commercial network operating systems are Windows Server 2008 R2 and Mac OS X Server Snow Leopard.

What is the relationship between security attacks and security services and security mechanisms in network security?

Security attack--any action that compromises the security of information (In simple terms, attempted to cause damage)

Security Mechanism-- It is a mechanism that is designed to

  • detect
  • prevent
  • recover

from security attack

Security Service--makes use of one or more security mechanism

What are Example of ipsec encryption modes?

There are two modes for IPSec. Transport mode and Tunnel mode. Transport mode is for securing end-to-end communication between two computers and tunnel mode is for securing gateway-to-gateway communication.

Refer the following links for more info.

http://www.omnisecu.com/security/ipsec/ipsec-transport-mode.htm

http://www.omnisecu.com/security/ipsec/ipsec-tunnel-mode.htm

Why is it that handheld operating systems have lesser capabilities as compared to PC operating systems?

i would say it is due to the lack of processing power, memory and storage capabilties of the handheld system in comparison to that of a PC, the Operating system will be comparable to that of older PC operating systems developed for less powerful computers.

Lots of people say that Linux is the best because it wont get so easily overloaded.

What are the three legs of network security?

The three main tenets of security overall area:

  1. Confidentiality
  2. Availability
  3. Integrity

Which access control list permission should you grant the user while following least privilege practices?

Under least privilege principles, a users should be granted full rights to their own files, e.g. create, read, write, modify, delete, execute, etc. The exact rights will depend some on what the underlying OS is. Beyond that, users may also be granted limited privileges to other files to enable them to perform their responsibilities. If they are a member of another group, they may be granted read, write, or execute privileges for "group" files. The way the privileges are assigned will depend on the access control model being used. Will it be Mandatory Access Control, Discretionary Access Control, Role Based Access Control, or some other model? Depending on the model, You may have to define other privileges like "take ownership", "give ownership", or "assign classification". You usually would only want to allow a user to have the "give ownership" rights for their own files, but have a higher arbiter having the "assign classification" rights.

Do you have to reformat when installing an operating system?

No, there is no requirement of reformatting when installing an operating system as you can install more than one operating system on a samePC. So there is no requirement of formatting the older one, even if you are installing a single new operating system only. Then also there is no requirement of reformatting again, formatting decreases the life of PC. ANSWER: Formatting does not decrease the life of your PC. The statement above is correct in that it is not necessary to format before installing an operating system. However, if you are doing a fresh install, formatting gives you a "clean slate" to install the new operating system. Attain the older one, even if you are installing a single new operating system only , then also there is no requirement of reformatting again, formatting decreases the life of PC. GOOD ANSWER: You do not reformat a PC you reformat a Hard Drive Disk. Whether or not you need to reformat your HDD depends on the operating system you wish to install. Some operating systems require different formats like NTFS or FAT32 so sometimes you need to reformat. You can also have more then one operating system on your HDD but to do this you must create a partition. A partition is a reserved area on the HDD which you can dedicate to different things depending on your needs. Generally, when you are installing an operating system you will have to reformat your HDD or create a partition for the operating system to run on. It does not decrease the life of your PC but sometimes during the reformatting process a few megabites will be lost... nothing serious. Most OSes require one partition to be formatted, but that is why you can create multiple partitions.

What are the everyday applications of decoders encoders and multiplexers demultiplexers?

Multiplexer is a device that will select one input and put it through. De- multiplexers will take one signal and broadcast to many devices. Encoder will take a signal and code it with information specific to an application. Decoder will extract the encoded signal to restore in its original form

What operating system would you you use if you want to share resource but no concern for local security?

You don't mention what you mean by "local security".

In general, this is not a question about an Operating System, but a security model. For example, a peer-to-peer network has little regard for security and does allow for local resource sharing.

Peer-to-peer networks can be implemented in most operating systems; it is just a matter of configuration.

Is myfreepaysite safe?

If you find explicit sexual content to be of concern when determining whether or not a site is "safe," then no. By visiting this site you, and/or your family, will be in grave danger of becoming exposed naked adults performing a variety of consensual, pleasure inducing, behaviors intended to entertain other adults.

How long take to upgrade network operating system?

If you are upgrading the network operating system chances are you are upgrading the entire server, because the NOS is usually a piece of the operating system itself. For 'pure' network operating systems such as NetWare, it is similar to upgrading the operating system.

There is no standard "time" to upgrading anything, since every installation is different and different requirements. There are steps one must take before upgrading, including having a plan which includes backups and verification, plus parallel implementation.

The simple answer is that the time it takes to upgrade the software is minimal if you don't plan anything in advance and have no plan to revert if something goes wrong.

What are the requirements of realtime operating systems?

Technically, all operating systems are "realtime." The term realtime just means it happens immediately, versus being delayed. Most operating systems today are actually a blend of realtime and "batch." Batch processing is doing something later, usually waiting until you have more than one thing (a "batch") to do. An example of batch processing is when a company processes your payment. They don't post each payment to their computer system - they wait until all the payments are in for the day (or at least a good number of them) and then post them as a group - so thousands of payments get posted at one time (posted just means processed through some financial system). Some businesses, such as banks, will use both realtime and batch processing for the same items. For example, if you make a deposit with a teller, you will probably be able to go to Starbucks next door, sign on the internet, and see the the deposit posted to your account already. This is "realtime" processing. However...this is probably only a "memo" post. This means it was only posted to the online system so that you can get to it through the internet or telephone. During the night, your deposit will be sent to a central site and batch processed with thousands of other deposits. The night post will be to the "real" posting system for checks, the "Demand Deposit Accounting" system, or DDA. The biggest use "realtime" operating systems is actually in what is called "embedded" systems. These are operating systems and application code that is running on a single board and embedded in something physical - a car, a toaster, a TV set, a DVD player, an IPOD. Today, if it is electronic, it probably has an embedded system (or even several). Embedded systems are primarily realtime operating systems - they collect some statistics in realtime and allow access to them later in batch mode (here are all the errors that occurred on your car since it was last serviced...) but their real job is to control the device they are embedded in - and do it in "realtime" or immediately. This means they must be: - dependable - they must operate in all sorts of conditions - hot, cold, dirty, greasy, noisy, vibrations etc. - timely - they must be fast enough to think about an action, and get it done right away. For example, if you are an embedded system in a car that controls skidding, you must be able to react to the skid in "realtime" - as it is happening, and control brakes, steering and gas as appropriate to what is happening (skid starting, car is curving to right, skid is ending). - flexible - in the previous example, the embedded system to control skids must be able to handle a car going any speed, curving right, left or going straight, know when it is "over compensating" and correct it etc. It must be able to make the same decisions a knowledable human would make in the same circumstances. - sized properly - again, the previous example. The embedded system must be able to recognize and react to thousands of varying facts (speed, direction, condition and status of mechanical systems etc.). You must have a processor fast enough to process the data in realtime, and enough storage to accept, and display, conditions and status of "analog" devices. Note - most realtime systems are in what we know as "analog" devices. This just means they have something mechanical about them. Most parts of a car are analog, as are most TV set these days. This is versus "digital", where parts don't move, signals flow to devices that are able to convert the final result to analog (for instance, a digital TV will receive a broadcast signal, convert it to a certain channel and pass it on to the screen to display. Even screens such as plasma and LCD are ultimately analog - they must decide which dots (pixels) to display, in what color and what shade. The decision can be made digitally, controlling the nuances of the display in realtime.

How deadlock deals with operating system?

A deadlock is a situation wherein two or more competing actions are waiting for the other to finish, and thus neither ever does. It is often seen in a paradox like 'the chicken or the egg'. " When two trains approach each other at a crossing, both shall come to a full stop and neither shall start up again until the other has gone.

What is the name of the kernel component that uses the iptables rules to filter network traffic?

system-config-firewall (FEDORA) or system-config-securitylevel (RHEL), "that is where you build you firewall"

the netfilter component is a set of tables that hold rules that the kernel uses to control network packet filtering. "Fedora and RedHat Enterprise Linux... fifth edition"

Component of operating system?

Components of OS

The operating system comprises a set of software packages that can be used to manage interactions with the hardware. The following elements are generally included in this set of software:

  • The kernel, which represents the operating system's basic functions such as management of memory, processes, files, main inputs/outputs and communication functionality.
  • The shell, allowing communication with the operating system via a control language, letting the user control the peripherals without knowing the characteristics of the hardware used, management of physical addresses, etc.
  • The file system, allowing files to be recorded in a tree structure.

What wireless security protocol provides the highest level of security?

WPA2 AES is the best bet for SOHO network. You can implement safer method using RADIUS server authentification on enterpise level.

Trending Questions
What does KIV stand for in KIV-7? What can automatically detect and deny network access to a host whose traffic patterns appear suspicious? What is the best Security Plus study guide? How to implement security in transient data? What is the difference between distributed operating system and network operating systems? What is transparent firewall? Which level of the OSI model is affected when the telnet and FTP is blocked to prevent disasters caused by hacking? Do Network security focuses on the protection of the details of a particular operation or series of activities? Is availability timely reliable access to data and information services for authorized users? What are the similarities between securing wired and wireless networked systems please help please can someone help me with this I urgently and seriously need help with this can someone please? What are two most popular network operating systems? Why might you need to grant a firewall exception for file and print sharin on a public network? One way to increase security on a network is by installing a? How is encryption commonly used? How do you get into a security enabled network? Which two network security solutions can be used to mitigate DoS attacks? How many Types of network? When you point your web browser to a CGI script you receive an Internal Server Error what is least likely to be the cause of the problem? What is the IDS in the network security tap? What are the common network elements required to form a network?