The network layer then uses its protocol (IP) and translates that www.yahoo.com into an IP address. The network layer is also in charge for determining the best route through the network in order to get to the IP address destination. The data link layer is, unlike the other two which are virtual, a physical address with is permanently encoded to a device through its network card. The data link layer is a unique identifier to each computer in a network. Thus a MAC address is the only address that will always remain the same, transport and data layer address can change depending on the network.
Case Study For any business ping sweeps and port scans could be a huge security threat if they continue unnoticed. Ping sweeps are performed to find end points on a network. Then a port scan is performed to find an open door into that particular end point or end points. After that anyone can find all kinds of utilities on the internet to exploit these open doors on systems and gain access to important and confidential files on the network. It’s imperative that we not only protect against these types of activities on the network, but that we also conduct them ourselves.
Unit 6 Assignment Cindy Torres Kaplan University IT530 – Computer Networks 6/23/2015 Wireless networks are great addition to any organization, home office and home use but it has to be protected correctly to make sure that intruders do not get in. In my previous job, our wireless network was set up the same way as the other networks and not everyone could connect to it. They would not allow anyone to connect to it, if we had a visitor they had to use one of our computers, if they were going to be doing work for us and needed to use their system the IT depart had to set up a special login to limit their use. They were very strict with the access of their wireless network and think that their current process is great at protecting their networks. At my home office and home set up when it comes to connecting to my wireless we have set it up that all devices, like our smart phones, tablets and other gadgets are connected using a password order to get connected this is done to make sure that our network is protected.
This is achieved by shifting each letter by a number of places in the alphabet. Both the sender and recipient know the secret key, enabling both to encrypt and decrypt all messages by the use of this key. A related issue with secret keys is the exchange over the Internet or a network attempting to prevent them from being hijacked. Once the secret key is retrieved legally or illegally anyone can decrypt the message. An answer to this issue is asymmetric encryption, a two related keys or a key pair.
Authorization - f. grants a user a specific degree of access to a resource 10. domain controller - g. hosts an AD DS domain Multiple Choice Select one or more correct answers for each of the following questions. 1. What is the term used to describe a read-only copy of a user profile stored on a network share? a. mandatory profile b. super-mandatory profile c. roaming profile d. search profile 2. When you create a new user account with the User Accounts control panel, you can only add it to which of the following groups?
d. denial-of-service attack (an example: smurf attack) 4. What type of device guards against an attack in which a hacker modifies the IP source address in the packets he's issuing so that the transmission appears to belong to your network? b. proxy server 5. Which of the following devices can improve performance for certain applications, in addition to enhancing network security? b. proxy server 6.
Skype allows it’s member to not only video chat but also instant message. Calls can also be made to telephone numbers and there is a conference call feature (Wikipedia.com). FaceTime and Skype’s code source cannot be changed. These products are only to be used for what they were created to do. If there are changes to the product, only the manufacture will release the updates for the consumers to upload to the software.
Server computers and other systems that need to be accessed reliably by network clients should be configured with a static IP address. The method of breaking up IP address space into address ranges of flexible size is called Classless Inter-domain Routing. Multiple Choice What must each host on a TCP/IP network be configured with in order to communicate with other hosts? C) IP Addressing What is the process of transmitting TCP/IP traffic from one IP sub-net to another? B) Routing An IP network that is formatted such as 192.168.1.0/25 is referred to as what type of notation?
Software devices used are; firewalls, Host intrusion Prevention Systems (HIPS), and Antivirus/Malware scanners. The concept of “work factor” is an important part of layering and is defined as the amount of effort a hacker, malware, etc. must use to breach the security measures guarding our network. Obviously, the less work they have to do point out that our security isn’t good. Showing that we have strong, layered security around our data and network will convince them to go elsewhere.