answersLogoWhite

0

📱

Computer Network Security

Network security is any form of computer security dealing with multiple computers linked through a network. Questions about everything from firewalls to viruses to denial-of-service attacks belong here.

1,030 Questions

What are the common network elements required to form a network?

There are three things that are required to be a network:

  • A sender or transmitter
  • A receiver
  • A medium to transfer information through

For the sender and receiver you must have a NIC (network Interface Card). The medium may be conductive media (cable) or radiated media (wireless).

How does Mobile ad hoc network work without infrastructure?

In an ad-hoc wireless network all of the devices are wireless. There is no need for an infrastructure connection. If you want to transfer a file from one laptop to another there is no need for a wired connection.

Similarly, if you connect a PDA (Personal Digital Assistant) to another device using wireless there would be no need for a wired connection either.

Ad-hoc connections are temporary, and not designed to stay around for long periods of time. They are connections between mobile devices and do not need to connect to other parts of a network.

A wave with what frequencies would have shortest wavelength 10MHz 100MHz 1GHz 100GHz?

For the same speed of a wave (I suppose you are referring to electromagnetic waves), the highest frequency corresponds to the shortest wavelength.

For the same speed of a wave (I suppose you are referring to electromagnetic waves), the highest frequency corresponds to the shortest wavelength.

For the same speed of a wave (I suppose you are referring to electromagnetic waves), the highest frequency corresponds to the shortest wavelength.

For the same speed of a wave (I suppose you are referring to electromagnetic waves), the highest frequency corresponds to the shortest wavelength.

Iptables rule to block traffic from 10.14.34.207?

we can use access control list for block iptables...............and how is possible that the sender dont know that all traffic was blocked

How do you use wireshark for tcp udp analysis?

Fire WireShark, select the Network Adapter you want to scan and it gets to work. By default, WS will scan all data going out or coming in through that adapter. If you want some specific ones, you can always apply a filter.

Can you use AES for encryption and decryption at same hardware?

Using the same (or different) hardware will work with AES as long as the encryption and decryption use the same key. AES relies on the symmetric encryption key which means the same key is used to lock and unlock the data. The hardware that uses it does not matter.

What is a weakness of WEP that is solved by WPA?

WEP uses a technique that allows an attacker to quite easily break the key, since part of the key (IV, or Initialization Vector) is in every packet. WPA does not use the same technique and a good WPA key cannot be guessed in a reasonable amount of time.

The Wired Equivalent Privacy (WEP) protocol was designed to add security to WLANs. WEP was intended to give wireless networks the equivalent level of privacy of a comparable wired network. However, WEP occasionally produces cryptologically weak ciphers that are easily broken with modern tools. A step-by-step description of how the WEP protocol is cracked follows, to give you a better idea of the weakness of WEP and the speed with which it can be compromised:

1. A hacker runs Kismet, a wireless LAN discovery tool, to determine what wireless LANs are in the area. When the hacker discovers the SSID, the channel number it is operating on, and its BSSID (Basic Service Set Identifier- its Ethernet address), he has all the information needed to mount an attack to recover the WEP key.

2. If the SSID is unknown because the WLAN's owner has enabled a mode that hides it (known as SSID Cloaking or SSID Broadcast Disable), the hacker can discover the SSID by waiting for a client to connect, in which case both the client as well as the AP disclose the SSID. Or the hacker can obtain the SSID by forcing an already connected client to disconnect and reconnect. This is done by sending a specially crafted packet pretending to be from the AP that tells the receiving client that it is no longer authenticated. The client has no way to tell that this is not actually coming from the AP, and so it attempts to rectify the problem by disconnecting from the AP and reconnecting, yielding the SSID in the process.

3. The hacker puts his wireless card into a "monitor mode" in which the WLAN card eavesdrops on a WLAN without having to connect to it. He commands the WLAN card to monitor the channel on which the target AP is located, and begins capturing and saving all of the traffic monitored from that AP to disk in a file called a capture file.

4. The software used to capture the data notes the reception of packets encrypted with a weak Initialization Vector (IV), which in cryptography is a value used to initialize a cryptographic process. WEP misuses these IVs in an exploitable way, and when a certain number of weak IVs have been captured, the WEP key can be determined. Roughly 125,000 packets are required to crack most 40-bit WEP keys, and 200,000-250,000 packets for a 128-bit WEP key.

5. On a slow WLAN, capturing the requisite number of weak IVs can take some time. To accelerate the attack, the hacker will next inject a captured WEP frame back into the network to generate more traffic. This takes advantage of the fact that WEP has no "replay protection" mechanism to prevent this. An injection rate of 512 packets per second generally results in the required number of IVs being captured between 10 min for 40-bit and 30 min for 128-bit WEP. If no client is present on the WLAN to generate traffic that can be captured and reinjected, in most cases the attacker's own system can be made to do so.

6. After a sufficient number of IVs is captured, the hacker runs the AirCrack tool, which will attempt to crack and disclose the WEP key.

7. Once the WEP key is known, the hacker can connect to the AP just as a legitimate client would - and the WLAN owner would be none the wiser.

What attacks come from multiple sources instead of a single source?

  1. Attacks from a single source can be easily defeated with an IP block. Thousands of different IPs make this a much more difficult attack to stop.
  2. More sources means more computers. More computers means more computing power. This is especially useful for DoS attacks, where the more requests you can send out the better your attack is.
  3. It's much harder to find the original source of an attacker when there are many attacks from different physical locations.

What are the advantages of the Data Encryption Standard?

These days, the use of DES is not recommended due to the short length of the key. In the past, the advantage was that the encryption made your information confidential unless you had the unlock key.

In today's environment, DES is easily crackable. Going towards the use of AES, or 3DES, would be more desirable.

In which two layers of the osi model do NIC's belong?

NIC's can perform in the Data Link Layer of the OSI model. However, they can also perform services in the Physical Layer.

(Network+ Guide to Networking Answer)
Physical and Data Link layers

Computer dangers and their common causes?

Well I know three computer dangers.

1. Your eyesight can easily decline with extended use of a computer as staring at it for 8 hours will make your eye incapable of receiving light or may damage them by receive too much constant light.

2. It can cause overall addiction to staring at computer and where if someone were to pull the plug it could send them into a coma.

3. If you were to access the Internet and play an addicting game such as Runescape, FreeRealms, Wizard101, or simpler addicting games you could spend excessively long times on the computer and cause ardentis oculorum or burning of the eyes.

What are the main advantages and disadvantages of Single Sign-On solutions?

Advantages of Single-sign on
  • Users select stronger passwords, since the need for multiple passwords and change synchronization is avoided.
  • Inactivity timeout and attempt thresholds are applied uniformly closer to user points of entry.
  • It improves the effectiveness/timeliness of disabling all network/computer accounts for terminated users.
  • It improves an administrator's ability to manage users and user configurations to all associated systems.
  • It reduces administrative overhead in resetting forgotten passwords over multiple platforms and applications.
  • It provides users with the convenience of having to remember only a single set of credentials. This also improves security as users find it easier to remember their credentials and do not have to write them down, allowing for a more efficient user logon process.
  • It reduces the time taken by users to log into multiple applications and platforms.
Disadvantages of Single-Sign on
  • Using only one SSO server can introduce a single point of network failure.
  • Few software solutions accommodate all major operating system environments; a mix of solutions must be tailored to the enterprise's IT architecture and strategic direction.
  • Substantial interface development and maintenance may be necessary, especially in the absence of industry-based standards.
  • The SSO server and other host security must be hardened since Weaknesses can now be exploited across the enterprise.
  • Most SSO-software packages include additional access control features for which purchaser is charged even if they are redundant of any existing controls.

What is meant by CC NA courses?

CCNA is a certificate offered by Cisco, which indicates the individual has an entry-level understanding of networking with Cisco equipment. Therefore, CCNA courses prepare you to take and pass the CCNA exam.

Does the Data Encryption Standard DES have perfect secrecy?

DES is a widely-used method of data encryption using a private key that was judged so difficult to break by the U.S. government that it was restricted for exportation to other countries. There are 72,000,000,000,000,000 (72 quadrillion) possible encryption keys that can be used.

For each given message, the key is chosen at random from among this enormous number of keys.

DiD elements focus on what three areas?

DiD elements focus on what three areas People, operations and defense of the environment This is the answer.....

What is institutional security?

The Department of Public Safety trains and supervises the Institutional Security Officer staff assigned to foot patrol of the campus, as well as those Institutional Security Officers assigned to the security of the residential buildings.

What is security policy in a distributed network environment?

The security policy anything really, whatever your admin enforces. Everything from what programs you are allowed to what wallpaper you have can be controlled through GPO's. Usually you will find the common one are that every computer has to get updates, every computer has to have an AV etc...

What is the meaning of RSA in case of RSA token?

Rivest, Shamir and Adleman, the inventors of the algorithm. Rivest Shamir Adleman (RSA) Authentication Mechanism is used to simplify the security environment for the Flexible Management Topology. It supports the ability to securely and easily register new servers to the Flexible Management topology. With the Flexible Management topology, you can submit and manage administrative jobs, locally or remotely, by using a job manager that manages applications, performs product maintenance, modifies configurations, and controls the application server runtime. The RSA authentication mechanism is only used for server-to-server administrative authentication, such as admin connector and file transfer requests. The

Saturn 2000 station wagon - security system?

I have a problem with a 2000 LW1 saturn. It's an intermittent problem. Ocassionally will not start until today. Today the car had to be towed, it would crank over but not start. The crank position sensor and control module have been changed. The problem is still there. The fuel pressure is at 55 (between 50 and 60) so that rules out fuel pump and fuel filter. Not sure if it is getting spark. I used a spark tester and it didn't look like it was getting a spark. I was told it may be a temp sensor? Not sure what to look at next! Please help!!

Don W

Michigan

Four characteristics of the definition of a confirmation?

1. Receipt 2. written or oral response 3. Independent Third party 4. Requested by the Auditor

How to access a computer over network with message Access Denied?

Cromzie: You're not able to access that computer over the network because you're not authenticated to that certain computer. Access denied meaning you are not authorized, you are not an administrator for that computer. Go control panel\user accounts. then add your user account there.

Any compliance body looks for how complete security cover is established in an organization. Most controls points can be established in limiting access to resources. When workflows are clearly made, it is mandatory to chalk out the exact authority over business systems.