Difference between point to point and end to end connection?
One connection involves pointy things; the other involves blunt thing. Hence, 'point to point' and 'end to end'.
Not really. I'm just being stupid. LOL(:
What is difference between ssl session and ssl connection?
A ssl connection is a transport services that provides a acceptable type of service and A type is created by the Protocol, and it defines a set of cryptographic security parameters which can be shared among multiple connections.
What is the difference between operating system security and network security?
operating system security concerns about vulnerabilities on specific operating system
network system security concerns about vulnerabilities of the entire network regrdless how diverse or complex the network is.
What are the drawbacks of des algorithm?
The Data Encryption Standard (DES) is a block cipher that uses a symmetric key (shared secret) algorithm. DES is now considered to be insecure for many applications. This is chiefly due to the 56-bit key size being too small; in January, 1999, a group of computer experts collaborated to publicly break a DES key in 22 hours and 15 minutes. There are also some analytical results which demonstrate theoretical weaknesses in the cipher, although they are infeasible to mount in practice. The algorithm is believed to be practically secure in the form of "Triple DES". Triple DES uses a "key bundle" which comprises three DES keys, K1, K2 and K3, each of 56 bits (excluding parity bits).
The encryption algorithm is: ciphertext = EK3(DK2(EK1(plaintext)))
in other words, DES encrypt with K1, DES decrypt with K2, then DES encrypt with K3.
Decryption is the reverse: plaintext = DK1(EK2(DK3(ciphertext)))
in other words, decrypt with K3, encrypt with K2, then decrypt with K1.
Each triple encryption encrypts one block of 64 bits of data. The strongest application of Triple DES is to use 3 independent keys so that you get 3 x 56 = 168 independent key bits, but it is not uncommon to simplify the operation by just using two keys, making K1 and K3 the same but making sure K2 is independent of K1. This second Keying option provides less security than using 3 independent keys, with 2 x 56 = 112 key bits. This second option is stronger than simply DES encrypting twice, e.g. with K1 and K2, because it protects against meet-in-the-middle attacks.
In recent years, the DES cipher has been superseded by the Advanced Encryption Standard (AES). Furthermore, DES has been withdrawn as a standard by NIST (previously known as NBS).
A firewall policy should only be concerned with in-bound (ingress) traffic. True False?
No - firewalls should include rules for both inbound AND outbound traffic to adequately protect networks.
How the quality of service and security achieved in IPV6?
IPV6 only allows more nodes (~64K times as many) on the internet than the existing IPV4 does. It has no effect on security.
What does the CIA triad stand for?
From a computer security perspective it stands for "Confidentiality, Integrity, Availability".
In general terms this means:
Confidentiality - are only those who should be able to get the information able to get it.
Integrity - are changes to data limited to only those that are authorized and intended.
Availability - can you get to the information when you want to.
Encryption is converting plain text into cipher text . Yes, encryption can be cracked and then the text can be decrypted.
How can you make your computer completely anonymous to everyone?
Use a proxy or VPN to mask your IP address from outsiders.
What are some common network security risks?
One common network sercurity risk is poor network policy that leads to password leaks. Networks can also be vulnerable to hacker attacks and eavesdropping risks.
What happens to the system if there is no internal battery in the motherboard?
CMOS (complementary metal-oxide-semiconductor) usually describes a small amount of memory on a computer motherboard that stores the BIOS settings. Powered by a small battery, the CMOS also stores time and date details, etc. If the time and date on the computer is wrong whenever the computer is booted up, then a failing CMOS battery is a likely cause - and needs to be replaced.
If there wasn't a CMOS battery, or it is a dud, mains power could possibly (as happened on an old laptop of mine, so time ago!) be used to run the computer, but time and date will need to be updated manually on each reboot.
Which programs provide managed network security?
Managed network security is offered by companies such as McAfee, Steadfast Networks, Sophos, WatchGuard, Pala Alto Networks and Cisco. One can find further information on the respective official websites for these companies.
What is the purpose of using Microsoft Active Sync?
Active Sync is used to share and synchronize data between desktop and laptop computers. Now it can also be used with tablet PC's. It was first introduced in 1996.
What is a network security policy?
A network security policy is an agreement from the network security provider stating their rules and terms for their product. It also states how their policies are enforced.
How can you protect yourself from DoS attacks?
A ddos attack is usually hitting a certain "host" which in this case it seems like it would be YOU. Now if this was YOU, they can only get your ISP - ex (Ip address - 72.115.203) They can get this various ways;
1. From a website that you visit (usually a non-secure webpage- with php scripts- pretty much a person knowing who is visiting the site.
2. Using a game/server to contact others - (example Ventrillo, Teamspeak, Skype, Even msn)
3. Or getting you to download a file; which can be a rat, which to be completely honest, even NORTON- and other firewalls wont tell you when you actually download one of these, its almost like a virus, so its completely un-detectable, if the person actually knows what they are doing.
Now after you have avoiding that - here is a way if you still want to visit those website; or contact them via those ways
There are things called proxy's - which give off a "fake" unusable IP address and when somebody tries to send packets - its sending it to a blank host, so I would use the proxy whenever visitng,playing, or contacting these people/server.
Another thing you can request is for your IP to change, from your ISP - Internet Service Provider (ex. TimeWarner Cable) usually has a fee - but it's worth it if your contstanly under attack
Legal Matters- What I would do is just DDoS them back...but that is Illegal; So the best route would be to contact your ISP and have them put a track on it
If you need anything else email me at mustbetrippin712@live.com
What does a sniffer program do?
A packet sniffer uses a network connection in promiscuous mode to receive and record packets that were not intended for that computer.
This can be used by a network administrator to monitor a network and find potential security problems. It can also be used by a hacker to access privileged information that is sent un-encrypted through the network.
Incident.
Indicators
What are two invalid IP addresses on each subnet?
The first and last IP address on each network.
e.g. In a classful class C network, the IP addresses x.x.x.0 and x.x.x.255 are invalid and cannot be assigned to a network interface card.
x.x.x.0 is the network address for the subnet.
x.x.x.255 is the network broadcast address for the subnet.