answersLogoWhite

0

📱

Computer Network Security

Network security is any form of computer security dealing with multiple computers linked through a network. Questions about everything from firewalls to viruses to denial-of-service attacks belong here.

1,030 Questions

What is advantages of intrusion detection system?

Basically, instrusion detection -- either software installed on a computer or server or software built into a security appliance -- is for detecting and notifying you of any unuathorized attempt to gain access to your computer or network. There are several different schemes for intrustion detection, all based on some sort of user or machine authentication.

What does wireless network security do?

Because a wireless network is not specific to your home computers, you must secure the network so that other people cannot access your wireless connection. Without security, anyone driving by with a laptop or Ipod could access your internet connection and download items, or even access you personal information. Wireless security puts a password on your internet connection so that only the people you want using your internet will be able to access it.

Example og upper and lower case password?

THIS IS UPPER CASE & this is lower case. So it is basically CAPITAL and small letters.

Why is it important to limit the number of open ports a system?

The more ports you have open on a system the larger the attack surface is. This means the more chances a malicious attacker has to get into your system and do something bad.

It is similar to having holes in a boat - the fewer, the better.

What is the difference between digital and analogue?

This is the part of electronics consisting of such circuits which processes analouge quantities is called analogue electronics. And the part of electronics which provides the data in the form of a maximum and minimum voltage signals i.e. By two voltage levels only is known as digital electronics.

What is the advantage of dynamic routing?

The router needs a routing table, to know where to send IP packets. The purpose of dynamic routing is to update the routing tables automatically. This means you need much less configuration, and the network dynamically adjusts to topology changes (for example, a router is added, or a cable has a bad connection).

What is a common password vulnerability?

There are many things that can make your password vulnerable. Some examples of password vulnerability are not changing the default password on a router, using common words or words that can be easily guessed by someone that knows you, and using the same password for all of your accounts.

What does information security protect information from?

Let's just say you have lots of vital information such as customer specifics, technological discovery that you'd want to implement into your company's operations, etc. You'd want to protect them from being read, which may lead onto them being used. You lose competitive edge over others as the information can be used by others.

There are many forms of attacks available:

hackers

trojans/malware

viruses

espionage

STAFF

There are many forms of information security software/hardware available. From monitoring of incoming/outgoing information on the internet, network gateway security to encryption strategies that stops files being used.

I find that encryption is the most useful one as no matter how much monitoring you do, you cannot stop people from stealing through USB, portable harddrive, etc. Or you'd have to be on constant vigilance when the monitoring software alarms you of the stealing actions.

Some opensource encryption softwares (i.e. free) avaiable on the internet, though I've forgotten the names. These softwares provide single user information security.

Some bigger enterprise security softwares such as EZ-Lock DRM by Digital Commerce Information provides full encryption strategies that allows different range of users, from 10 users to 30000. Its core ability is that users do not have to change any working habits but at the same time having everything encrypted and thus secured.

Others such as Adaptive Network Security from Brandford Network emphasizes on recognizing friends and foes. It integrates and correlates network resources, user information, and device information to automate security and IT operations.

How many bits in an IP V6 address?

128 Bits.

An IPv6 address is made up of 8 fields consisting of 16 bits per field. If you multiply 8 x 16 will get 128 bits.

Each field is separated by colons unlike IPv4 which was separated by dotted decimal notation.

A good link to go to to see the address and how sub-netting is done is on the related links below.

What ways that user can help strengthen security in a network?

- Do not run the computer with local administrator right

- Use strong password and never share it (lock the screen if you have to leave your pc).

- Change password afterwards if you are force to share it.

- Do not use the network for private matters.

- Use a secure VPN to encrypt your work while surfing the web and block attacks.

- Use a recommended anti-virus program such as Norton to block back-doors allowing access to your network from the outside.

- Do not use your network account for private affairs like Mailist, Facebook...etc.

- Do not mess around with antivirus and firewall set by the admin

- Always scan the USB stick after using it on other machines.

What operating system often used for server applications is a scaled-down version of unix?

This unenlightened question is found on many A+ certification exams, First, I will tell you the that they want. Then I will tell you why there is no correct .

The that they want you to write in is "Linux." This is in spite of the fact that Linux scales even higher than Unix and has more features, thereby making most Unix implementations the "scaled-down" operating system.

In order for something to be legally called a "version of Unix", it must undergo a rigorous certification process. No Linux distro has ever undergone this process, and so cannot be called a "version" of Unix. So then you would have to look at what certified Unix systems are commonly used in the server market. The only certified Unix systems still commonly used on the server market are Solaris 10, AIX and Mac OS X. All three of these systems scale very highly, which makes them unsuitable as an .

What are the potential risks for network security?

u may encounter some hackers slip in and watch ur privacy

and may need a tool

Which intermediary devices could be used to implement security between networks?

Security between networks is implemented in an intermediary device (a router or firewall appliance) at the perimeter of the network. The firewall function performed by this device permits only known, trusted data to access the network.

How can you forcibly remove AD from a server and what do you do later Can I get user passwords from the AD database?

dcpromo /forceremoval forcibly remove AD from a Server.

After you use the dcpromo /forceremoval command, all the remaining metadata for the demoted DC is not deleted on the surviving domain controllers, and therefore you must manually remove it by using the NTDSUTIL command.

What is meant by network security?

Answer

Effective Network Security has many layers. It requires security features at the local level (on each individual computer, and on the network level. A network is group of computers that share a common connection and so therefore are on the same network. For example, every computer that connects and uses to your home wifi are on the same network.

A network is a a group of individuals like i said. Therefore, computers themselves must have anti-malware software installed and that software must be frequently updated. Malware that affects a network of computers usually infected one computer initially and then other computers on the network were infected.

Network security also use a firewall. Firewalls monitors which websites (specifically the severs that host them) send data to the computers on the computer. They also monitor the data computers send to websites. Every time you visit a website your computers sends data to a server and that server back to your computer. Network security is important because it protects Fortune 500 companies, government agencies and home networks.

Is there a need of physical security while using cryptography?

Yes. Decrypted or plain text - yet to be encrypted - messages need to be kept securely before they are encrypted and transmitted.

How is encryption commonly used?

Data encryption the process of scrambling stored or transmitted information so that it is unintelligible until it is unscrambled by the intended recipient. Historically, data encryption has been used primarily to protect diplomatic and military secrets from foreign governments. It is also now used increasingly by the financial industry to protect money transfers, by merchants to protect credit-card information in electronic commerce, and by corporations to secure sensitive communications of proprietary information.

All modern cryptography is based on the use of algorithms to scramble (encrypt) the original message, called plaintext, into unintelligible babble, called ciphertext. The operation of the algorithm requires the use of a key. Until 1976 the algorithms were symmetric, that is, the key used to encrypt the plaintext was the same as the key used to decrypt the ciphertext.

What are the Features of network security?

Network security features include:

  • Firewalls: Block unauthorized access.
    
  • Intrusion Detection/Prevention Systems (IDS/IPS): Monitor and stop suspicious activity.
    
  • Encryption: Secures data in transit.
    
  • Access Control: Limits who can access the network.
    
  • VPNs: Create secure remote connections.
    
  • Anti-malware tools: Detect and block malicious software.
    
  • Security policies: Define user behavior and device use rules.
    
  • Network segmentation: Isolates parts of the network to limit breach impact.
    

These features work together to protect data and devices from threats.

What device is used to send data between two networks?

If the message is going between two different networks then it must be routed (this includes different subnets of the same network as well). Routing is done by a router as the device.

How can i reset Pronet PN-54WRT wireless router?

It should have a special little bottom to reset. If you press and hold for 5-35 seconds depending on particular router it will reset all settings to manufacture ones. If you have manual for the router, it's a good time to read it.

What kind of attacks are there in network security?

to name a few you have

main in the middle

denial of service

sql injection

reverse bind

bin shell

arp poisinging

route poising

dns poisoning