UNIT – 6 Intruders, Intrusion Detection, Password Management
UNIT - 2 SYMMETRIC CIPHERS: Symmetric Cipher Model, Substitution Techniques, Transposition Techniques, Simplified DES, Data encryption standard (DES), The strength of DES, Differential and Linear ...
UNIT - 7 Viruses and related Threats, Virus Countermeasures TEXT BOOK: 1. Cryptography and Network Security, William Stalling, Pearson Education, 2003. REFERENCE BOOKS: 1. Cryptography and...
UNIT - 1 Services, mechanisms and attacks, The OSI security architecture, A model for network security. TEXT BOOK: 1. Cryptography and Network Security, William Stalling, Pearson Education, 200...
J,HJHFull description
AL ICT NOTESFull description
Deskripsi lengkap
Network Assignment Network Design proposal
Network Problems
Basics of Networking
network keperawatan
Descripción completa
network planingFull description
RIP uses hop count OSPF and EIGRP use bandwidth in their calculations BGP uses a varity of options and is used for moving prefixes back an forth TACACS+ uses port 49 and was made by cisco hub and spoke doesnt directly connect 2 remote locations File Transfer Protocol FTP is used to transfer files in a non secure fashion Trivial File Transfer Protocol TFTP requires login, doesnt require credentials, non secure Secure Shell SSH used to securely conect to a host normally through terminal emu lator secture FTP SFTP provides FTP file transfer over SSH connection Secure Copy SCP provides secure file transfer over SSH and offers a files origin al data and time info Logical Link Control LLC is like mac and is layer 2 of osi HSRP and CARP are layer 3 redundancy mechanisms serial cable when connecting through serial ports cross over cable when going through routers straight through when going through switches Main Distribution Frames MDF is like cable racks, used in telecommunications, ma nages wiring Intermediate Distribution Frames IDF manages the wires in an MDF Hosted PBX is a telephone system hosted by a service provider and not a company Virtual PBX is a voip based telephone system hosted by a service provider a smart jack is a network interface device NID that converts between framing for mats and digital circuit PPP is a common protocol found on dedicaed leased lines T1 and T3 are leased lines Gateways intelligently route msgs within a voicemail network DOCSIS data over cable service interface specification needs to be the same as a n ISPs ATMs have a 48 byte payload Media Termination Recommended Jack MTRJ has 2 fiber strands F connector is used in cable tv connections BNC can be used in some ethernet networks DHCP order is discover, offer, request, acknowledge BOOTP came before DHCP and offers less stuff ARP address resolution protocol is used to resolve mac address corresponding to a known IP add. root domain is like .com, .gov, etc, the end of a FQDN EDNS is extension mechanism DNS, its more secure and overcomes size limitations, backwards compatable start of authority SOA is a DNS record that shows contact information of an admi n canonical name CNAME allows multiple DNS records to map to the same IP address native VLAN is the VLAN on an IEEE 802.1Q trunk that does not have tag bytes add ed ISDN is a circuit switched WAN type base-E whatever is 40 km
base-L is 10 km base-S is 300m IBSS is no AP used, BSS is 1 AP used, ESS is more than 1 AP used omnidirectional antenna sends equal power in all directions unidirectional antenna focuses its power in a specific direction yagi antenna is a type of directional antenna sector antenna provides a pie shaped coverage area isotropic antenna that sends equal power in all directions in a sphere and has a gain of 0dbi BAG'n the B and G have 2.4ghz, A and N have 5ghz. B and G also support DSSS 802.11n has 300ft range 802.11b and g have 150ft range 802.1X has highest security marking is a QoS function that alters bits in a frame, cell, or packet queueing is another name for congestive management in a QoS voip has 150ms delay sys logs 7 is debugging, 4 is warning, 1 is altert, 0 ic emergency OTDR can be used to locate a fiber optic cable break throughput tester can simulate heavy network load SNMP agent runs on a managed device, like a server, router, or switch SNMP trap is a message sent from a SNMP managed device the alerts of a signifiga nt event occuring on the managed device tunneling follows a secure communication between a private network and a public network TFA requires 2 authentication types from a user seeking admission to a network ISAKMP is a secure session where IPsec sessions are negotiated PKI uses digital certificates and a certificate authority CA IDS sensor recieves copy of traffic being analyzed and communicate with a securi ty appliance to prevent attack RSSI is a measure of a wireless signals strength PPDIOO is an example of asset management Security Information and Event Manager SIEM gives real time security analysis in formation WIPS stops rogue APs and routers