answersLogoWhite

0

📱

Computer Network Security

Network security is any form of computer security dealing with multiple computers linked through a network. Questions about everything from firewalls to viruses to denial-of-service attacks belong here.

1,030 Questions

What are advantage of access control list?

An access control lists specifies the various users and what level of access they have. If you activate an access control list in a application, the various components of the application will be accessed based on the level of access permitted to them and the access level specified in the access control list for the currently logged in user.

Which two layers of the OSI model do NICs belong?

Primarily in the Physical (first) layer to be the transciever for the Line, but many cards

these days also have acceleration and cache MAC-IP addresses and and speed up

ARP requests and translation to IP Addresses which are at the Link (second) Level.

How do you find passwords to email addresses?

The whole point of a password is that it remains known only to the person who chose it for his or her own account. Once you start giving out your password, other people can interfere with your email - possibly deleting mail before you can read it, or sending out mail pretending to be you. It's not a good idea.

Does not constitute mandatory changing of a cipher lock combination?

The computer network security does not constitute the mandatory changing of the cipher lock combination.

What are the three approaches to wireless security?

The three ways a wireless network can be secured and safe. First, by enabling WEP or WPA/WPA2 wireless security key or password on the router. Second, by enabling wireless MAC filter. And third, by disabling the SSID Broadcast of the router.

How can one ensure that they have firewall network security?

in order to ensure ones firewall network security one must first turn on the firewall settings on ones computer. However to be certain the firewall is effective there are a few basic checks one can do to give reassurance. most computer have a firewall setting that uses the internet to check automatically for updates. these updates should be installed regularly. it is also suggested in order to obtain the best protection that the firewall be operated in 'stealth mode'

How salami attack work?

Salami attack- This financial crime works by taking small amounts of money over an extended period. For the attacker to be successful, he must remove an amount so small that it will go unnoticed.

What is the difference between network security and web security?

There are so many different conflicting definitions about Information Security out there; however there are clear censuses amongst the field's professionals and leaders on the following definition writing by Michael Chahino (Managing Director of Network Operations and Information Security) and Jason Marchant (Chief Security Officer):

INFORMATION SECURITY is a discipline governing the framework for the continuous cycle of safeguarding information and ensuring related regulatory compliance.

- Discipline

• a branch of instruction and learning such as history, finance, economics

- Framework

• a frame or structure composed of parts fitted together documenting the methodology of incident identification, mitigation, and resolution much like the scientific method

- Cycle

• a series of processes that are repeated in a precise and deliberate manner

- Information

• electronic, printed, audible, visual, memorized

- Compliance

• ensuring that the institution is in compliance with applicable laws, regulations, and contractual agreements

Source(s):

Chahino, Michael and Marchant, Jason (2010). Computer Security Institute (CSI) 2010 Annual Conference http://www.csiannual.com/

___________________________________________________________

Old answer: network security deals with protecting the network whilst information security deals with protecting the information transmitted over the network.

Hope you get some meaning from what I said.

_______________________________________________

Information security solutions have focused on preventing external threats such as viruses, hackers and worms through perimeter solutions that include firewalls and antivirus software. While still aware of outside threats, companies are now coming to understand they can no longer ignore inside violations concerning data at rest. So information security and privacy is of atmost importance whether it is internal or external.

What is difference between switch bridge?

Switches and Bridges are pretty similar, both operate at the Data Link layer (just above Physical) and both can filter data so that only the appropriate segment or host receives a transmission. Both filter packets based on the physical address (AKA MAC - Media Access Control - address) of the sender/receiver although newer switches sometimes include the capabilities of a router and can forward data based on IP address (operating at the Network Layer) and are referred to as IP Switches. Often the desired results could be achieved using either a switch or a bridge but *in general* bridges are used to extend the distance capabilities of the network while minimizing overall traffic, and switches are used to primarily for their filtering capabilities to create multiple, smaller virtual LAN's out of one large LAN for easier management/administration (V-Lan's).

The main difference between them is --->

Bridge can connect only TWO networks/ LANs/ Hosts, means bridge has only TWO ports. While...

Switch can connect more than TWO networks/ LANs/ Hosts because switch has more than TWO ports.

Or you can say that a bridge with more than TWO ports is known as a Switch.

The IEEE specs define bridges... and those bridges have tons of ports, not just two. The difference bridge/switch is mainly marketing.

What are the most common tools used in network security management?

WFilter is an Internet filtering software that can help organizations to monitor and manage all Internet behaviors on their networks.You only need to install WFilter in one computer to monitor your whole network.

* Monitor and archive all Internet activities including web surfing, Email contents, chatting contents, transferred files and so on.

* Filter certain websites, emails, messengers and file transfers.

* Block P2P software, online stream, Internet games, stock software and others.

* Real time monitor of online messengers, web surfing, file transfers and all

Who offers network security courses?

Network security courses are offered at many educational institutions in nearly every country. They can be found in universities, colleges and targeted limited courses. Inquiring at a local institution is the best place to start.

What are the advantages of IPX and SPX?

sorry, there are over 9000 differences so i cant list them all

What is the job of a network security consultant?

A network security consultant's job is to analyze the possible security risks displayed by the hiring company's computer network. They report on risks discovered, advise as to the severity of these risks, and determine an appropriate plan of action to minimize or eliminate threats to a network's smooth and safe operation.

Which cable use between PC to Console port of Router?

A rollover cable with a RJ-45 connector will plug into a console port on a Cisco device, the other end can be a DB-9 connector or another RJ-45 that can plug into an adapter.

What is IP Host address?

The host is the last part of an IP address

Concept of IP multicasting?

The idea is to send a message to several recipients at once. On the backbone of the network, a message might be sent only once; later, when the paths to the recipients separate, several copies are made. This can help save bandwidth of the Internet backbone (or other, smaller, networks), in certain circumstances. Multicasting is especially useful if the same information is to be sent to all recipients at the same time. A typical case might be a live radio or television broadcast over the Internet.

The idea is to send a message to several recipients at once. On the backbone of the network, a message might be sent only once; later, when the paths to the recipients separate, several copies are made. This can help save bandwidth of the Internet backbone (or other, smaller, networks), in certain circumstances. Multicasting is especially useful if the same information is to be sent to all recipients at the same time. A typical case might be a live radio or television broadcast over the Internet.

The idea is to send a message to several recipients at once. On the backbone of the network, a message might be sent only once; later, when the paths to the recipients separate, several copies are made. This can help save bandwidth of the Internet backbone (or other, smaller, networks), in certain circumstances. Multicasting is especially useful if the same information is to be sent to all recipients at the same time. A typical case might be a live radio or television broadcast over the Internet.

The idea is to send a message to several recipients at once. On the backbone of the network, a message might be sent only once; later, when the paths to the recipients separate, several copies are made. This can help save bandwidth of the Internet backbone (or other, smaller, networks), in certain circumstances. Multicasting is especially useful if the same information is to be sent to all recipients at the same time. A typical case might be a live radio or television broadcast over the Internet.

Which Frame Relay flow control mechanism is used to signal routers that they should reduce the flow rate frames?

If there is a congestion in one direction, the FECN (forward explicit congestion notification) bit is set to inform routers in the forward direction (from the point of view of the traffic) about the congestion. Also, eventually some frames will travel back to the origin; in that case, the BECN (backword explicit congestion notification) bit is also set to inform the origin about the congestion.

What is the maximum number of icmp packet can be captured?

The limit on the number of packets that a capture program can save usually depends on how much disk space you have, since that is where the captured packets will be stored.

What is the most popular symmetric encryption system used over the Web?

The most common hybrid system is based on the Diffie-Hellman key exchange, which is a method for exchanging private keys using public key encryption. Diffie-Hellman key exchange uses asymmetric encryption to exchange session keys. These are limited-use symmetric keys for temporary communications; they allow two entities to conduct quick, efficient, secure communications based on symmetric encryption, which is more efficient than asymmetric encryption for sending messages. Diffie_Hellman provides the foundation for subsequent developments in public key encryption. It protects data from exposure to third parties, which is sometimes a problem when keys are exchanged out-of-land.

9 Which provides stronger security for a wireless network WEP or WPA?

WPA, which stands for Wi-fi Protected Access.

WEP, which stands for Wired Equivalent Privacy.

Therefore, It just depends on the type of network you have. You seem to have a wireless network, so a WPA Encryption would be best until the IEEE's 802.11i standard encryption comes out.

What is data protection and data security?

Data protection refers to a set of techniques and procedures for ensuring the privacy, availability, and integrity of your information. It's also known as data security or information privacy. Any organisation that gathers, processes, or stores sensitive data must have a data protection plan.

To learn more about data science please visit- Learnbay.co

What kind of encryption is used with 802.11n?

WEP is kind of old so I'm guessing WPA or WPA2

Moose

The original standard released in 1999 was WEP. WEP uses the stream cipher RC4 for confidentiality. Exploitable weaknesses in this protocol prompted the development of WPA.

WPA was introduced as an interim solution while the 802.11i standard was developed. WPA added Temporal Key Integrity Protocol (TKIP) to WEP. TKIP encryption replaces WEP's 40-bit or 128-bit encryption key that must be manually entered on wireless access points and devices and does not change. TKIP is a 128-bit per-packet key, meaning that it dynamically generates a new key for each packet and thus prevents collisions.

WPA2 - also known as IEEE 802.11i-2004 replaced the TKIP encryption protocol of WPA with CCMP to provide additional security. CCMP is an AES-based encryption mechanism that is stronger than TKIP. (CCMP is sometimes referred to simply as AES instead of CCMP.) Equipment developed under 802.11i was backwards compatible with earlier equipment and supported the use of WPA and WEP.

802.11n requires AES encryption to be enabled on WLANs used by 802.11n clients.