Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Computer Network & Security Expert

DEFINITION - WHAT DOES COMPUTER NETWORKING MEAN?

The Computer networking is an engineering obedience that aims to analyze and study the communication process among the various computing devices or the computer systems that are linked (networked) together to exchange the information and share the resources.

Computer networking depends on theoretical application and the practical implementation of the fields like computer sciences, computer engineering, telecommunication and information technology.

TECHOPEDIA EXPLAINS THE COMPUTER NETWORKING

A router, protocols and the network cards are the essential pillars upon which any network is built. Computer networks are backbone of the modern-day communication. Even public switched the telephone networks are controlled by the computer systems; the most telephonic services are also working with IP (Internet Protocol).

Increasing the scope of communication has led to much advancement in networking field and in its relative industries like the hardware, software manufacturing and the integration. As a result, the most households have access to one or more networks. There are three broad network types:

1) Local Area Network (LAN): It is used to serve a small number of people located in a small geographical space. The client server or peer-to-peer networking methods can be engaged.

 2) Wide Area Network (WAN): The WAN formed to connect a computer with its peripheral resources across a large geographical region.

3) Wireless Local Area Network (WLAN): It is formed without use of the wires or the physical media to connect hosts with server. The data is transferred over the radio transceivers.

CHARACTERISTICS OF THE COMPUTER NETWORK

* It is used to share the resources from one computer to another.

* It creates files and stores them in one computer, access those files from other computers connected over network.

* Connect a printer, a fax machine or scanner to one computer within network and let the other computers of the network use machines available over the network.

EXPLAIN THE NETWORK SECURITY CONCEPTS

The Network security starts with the authenticating, commonly with a username and a password. Since this requires just one detail authenticating the user name -i.e. password- it is sometimes termed the one-factor authentication. With the two-factor authentication, something the user 'has' is also used and with the three-factor authentication, something the user 'is' is also used e.g. a fingerprint or retinal scan.

NETWORK SECURITY

A security policy defines what the people can and cannot do with the network components and the resources.

TYPES OF ATTACK:

The classes of attack might include the passive monitoring of communications, close-in attacks, active network attacks, exploitation by the insiders, and the attacks through service provider. Information systems and the networks offer the attractive targets and should be resistant to attack from the full range of threat agents, from the hackers to the nation-states. A system must be able to limit the damage and recover rapidly when the attacks occur.

There are some types of attack are found. These ares-

Passive Attack: - A passive attack monitors the unencrypted traffic and looks for the lear-text passwords and the sensitive information that can be used in other types of attacks. Passive attacks include the traffic analysis, decrypting weakly encrypted traffic, monitoring of unprotected communications and capturing authentication information such as passwords. Passive interception of network operations enables the adversaries to see upcoming events. Passive attacks result in disclosure of data files or information to an attacker without consent or knowledge of user.

Active Attack: - In this attack attacker tries to bypass or break into the secured systems. This can be done through viruses, stealth, Trojan horses or worms. Active attacks include the attempts to break the protection features, to introduce the malicious code, and to modify or steal information.

Distributed Attack: - The distributed attack requires that adversary introduce the ode, such as a back-door program or Trojan horse, to a "trusted" component or the software that will later be distributed to the many other companies and users Distribution attacks focus on malicious modification of software or hardware at factory or during the distribution.

Insider Attack: - An insider attack involves someone from inside, such as the disgruntled employee, attacking network. Insider attacks can be malicious or no malicious. The Malicious insiders intentionally steal, eavesdrop or damage the information; use information in a deceptive manner; or deny access to the other authorized users. No malicious attacks typically result from the lack of knowledge, carelessness or intentional circumvention of security for such reasons as performing a task.

FIND THE PROFICIENT SUPPORT IN COMPUTER NETWORK & SECURITY AT THE WORLD'S MOST-TRUSTED PLATFORM

Mywordsolution offers you exactly you need in your Computer Network & Security courses if you think that you cannot cope with all the complexities of Computer Network & Security. Our team of dedicated Computer Network & Security specialists, who have been worked in the Computer Network & Security field for a long time, can offer UK, US, Australian, Canadian and word wide students their help in tackling what their Computer Network & Security homework and assignment has to offer them. You just need to specify what kind of Computer Network & Security assignment help you want and what your deadlines are. Once you are done with submission of your Computer Network & Security requirement, our specialists or experts will get back on the job, while at the same time promising things like:

  • Research relevant to your area 
  • The best prices
  • Time on Delivery  
  • Plagiarism free Answers
  • 24x7 Supports
  • End Customer Satisfaction

In addition, the Mywordsolution.com facilitates you to search and find the solution for Computer Network & Security questions, or Computer Network & Security textbooks problems. You can search the questions in Computer Network & Security solution library and download the answers in just little pay of the service.

Computer Science,Computer Network & Security


Recent Computer Network & Security Questions

Discussion bulldefine a packet analyzer and describe its

Discussion: • Define a packet analyzer and describe its use • List commonly used packet analyzers (beyond WireShark) • List best practices for analyzing packets • Describe uses (good and bad, ie. hacker) of a packetanaly ...

1 these assignments need to be properly supported with

1. These assignments need to be properly supported with references to the scientific literature. 2. Use a 12pt font for the body of your assignment. 3. The assignment many be up to four (4) pages long, including any appe ...

Question what is active threat in terms of network security

Question: What is active threat in terms of network security? Provide an example. The response must be typed, single spaced, must be in times new roman font (size 12) and must follow the APA format. Note: minimum 300 wor ...

Question 12326 packet tracer - configuring pap and chap

Question 1 2.3.2.6 Packet Tracer - Configuring PAP and CHAP Authentication Submit your answer as Q1.pka Question 2 2.5.1.2 Packet Tracer - Skills Integration Challenge Submit your answer as Q2.pka Question 3 3.4.2.4 Pack ...

Case study network design for ezy-booksezy-books is a

Case Study: Network Design for EZY-Books EZY-Books is a specialised publisher for customised book publication services based in Brisbane. The company has recently purchased a two-story building in a Brisbane suburb as it ...

Question 12326 packet tracer - configuring pap and chap

Question 1 2.3.2.6 Packet Tracer - Configuring PAP and CHAP Authentication Submit your answer as Q1.pka Question 2 2.5.1.2 Packet Tracer - Skills Integration Challenge Submit your answer as Q2.pka Question 3 3.4.2.4 Pack ...

Security risk assessment executive summarya detailed

SECURITY RISK ASSESSMENT Executive Summary A detailed Information security risk assessment was carried out on Fiji Directories Limited (FDL) during October 15th 2018 to October 24th 2018. FDL, an ATH group company, is a ...

Question do some research and find a case of cyber

Question : Do some research and find a case of cyber harassment or cyberbullying. Explain the case, and discuss the relevant theories of criminal justice associated with the perpetrator(s). Your response should be a mini ...

Question calculate the total time required to transfer a

Question: Calculate the total time required to transfer a 1.5-MB file in the following cases, assuming an RTT of 80 ms, a packet size of 1 KB data, and an initial 2 × RTT of "handshaking" before data is sent: (a) The ban ...

Part auniversity of neverland offers more than 300

Part A University of Neverland offers more than 300 undergraduate programs. The Bachelor of Dreams is one of the highly regarded program offered by the University. The University tries to improve all its programs by intr ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As