Wednesday, 28 March 2012

NETWORKING SECURITY :)

Network security consists of the provisions and policies adopted by a network administrator to prevent and monitor unauthorized access, misuse, modification, or denial of a computer network and network-accessible resources. Network security involves the authorization of access to data in a network, which is controlled by the network administrator. Users choose or are assigned an ID and password or other authenticating information that allows them access to information and programs within their authority. Network security covers a variety of computer networks, both public and private, that are used in everyday jobs conducting transactions and communications among businesses, government agencies and individuals. Networks can be private, such as within a company, and others which might be open to public access. Network security is involved in organizations, enterprises, and other types of institutions. It does as its title explains: It secures the network, as well as protecting and overseeing operations being done. The most common and simple way of protecting a network resource is by assigning it a unique name and a corresponding password.

virus :

A computer virus is a computer program that can replicate itself and spread from one computer to another. The term "virus" is also commonly, but erroneously used, to refer to other types of malware, including but not limited to adware and spyware programs that do not have a reproductive ability.
Viruses can increase their chances of spreading to other computers by infecting files on a network file system or a file system that is accessed by other computers. This is some example of computer virus :
  • Adware
  • Malware
  • Spam
  • Spyware
  • Computer Worms
  • Trojan
                      


cyber crime :

Cyber crime encompasses any criminal act dealing with computers and networks (called hacking). Additionally, cyber crime also includes traditional crimes conducted through the Internet. For example; hate crimes, telemarketing and Internet fraud, identity theft, and credit card account thefts are considered to be cyber crimes when the illegal activities are committed through the use of a computer and the Internet. Type of cyber crime is :
  • THEFT OF TELECOMMUNICATIONS SERVICES
  • COMMUNICATIONS IN FURTHERANCE OF CRIMINAL CONSPIRACIES
  • TELECOMMUNICATIONS PIRACY
  • DISSEMINATION OF OFFENSIVE MATERIALS
  • ELECTRONIC MONEY LAUNDERING AND TAX EVASION
  • ELECTRONIC VANDALISM, TERRORISM AND EXTORTION
  • SALES AND INVESTMENT FRAUD
  • ILLEGAL INTERCEPTION OF TELECOMMUNICATIONS
  • ELECTRONIC FUNDS TRANSFER FRAUD


Hacking :

finding out weaknesses in an established system and exploiting them. A computer hacker is a person who finds out weaknesses in the computer and exploits them. Hackers may be motivated by a multitude of
reasons, such as profit, protest, or challenge. The subculture that has evolved around hackers is often referred to as the computer underground but it is now an open community. While other uses of the word hacker exist that are not related to computer security, they are rarely used in mainstream context. They are subject to the long standing hacker definition controversy about the true meaning of the term hacker. In this controversy, the term hacker is reclaimed by computer programmers who argue that someone breaking into computers is better called a cracker, not making a difference between computer criminals (black hats) and computer security experts (white hats). Some white hat hackers claim that they also deserve the title hacker, and that only black hats should be called crackers. The type of hacker is :
  • White hat
  • Black hat
  • Grey hat
  • Elite hacker
  • Script kiddie
  • Neophyte
  • Blue hat
  • Hacktivist
  • Nation state
  • Bots
             

HOW TO PROTECT YOUR COMPUTER ?

- Keep Your Firewall Turned On:

A firewall helps protect your computer from hackers who might try to gain access to crash it, delete information, or even steal passwords or other sensitive information. Software firewalls are widely recommended for single computers. The software is prepackaged on some operating systems or can be purchased for individual computers. For multiple networked computers, hardware routers typically provide firewall protection.

- Install or Update Your Antivirus Software:

Antivirus software is designed to prevent malicious software programs from embedding on your computer. If it detects malicious code, like a virus or a worm, it works to disarm or remove it. Viruses can infect computers without users' knowledge. Most types of antivirus software can be set up to update automatically.

- Install or Update Your Antispyware Technology:

Spyware is just what it sounds like software that is surreptitiously installed on your computer to let others peer into your activities on the computer. Some spyware collects information about you without your consent or produces unwanted pop-up ads on your web browser. Some operating systems offer free spyware protection, and inexpensive software is readily available for download on the Internet or at your local computer store. Be wary of ads on the Internet offering downloadable antispyware in some cases these products may be fake and may actually contain spyware or other malicious code. It's like buying groceries shop where you trust.

- Keep Your Operating System Up to Date:

Computer operating systems are periodically updated to stay in tune with technology requirements and to fix security holes. Be sure to install the updates to ensure your computer has the latest protection.

- Be Careful What You Download:

Carelessly downloading e-mail attachments can circumvent even the most vigilant anti-virus software. Never open an e-mail attachment from someone you don't know, and be wary of forwarded attachments from people you do know. They may have unwittingly advanced malicious code.

- Turn Off Your Computer:

With the growth of high-speed Internet connections, many opt to leave their computers on and ready for action. The downside is that being "always on" renders computers more susceptible. Beyond firewall protection, which is designed to fend off unwanted attacks, turning the computer off effectively severs an attacker's connection be it spyware or a botnet that employs your computer's resources to reach out to other unwitting users.





- Use Strong Passwords :
Setting a strong password on ALL your accounts makes it more difficult for an attacker to gain access to your computer or resources. See Georgetown University's password guidelines for more information about selecting a strong password.

Sunday, 18 March 2012

This is 3 type of topology of LAN with advantages and disadvantages. I hope can give some information about this to you all ! ;)

What is a Topology?

The physical topology of a network refers to the configuration of cables, computers, and other peripherals. Physical topology should not be confused with logical topology which is the method used to pass information between workstations. Logical topology was discussed in the Protocol chapter.

Main Types of Physical Topologies :

1. Linear Bus :)

A linear bus topology consists of a main run of cable with a terminator at each end. All nodes (file server, workstations, and peripherals) are connected to the linear cable.
Linear Bus topology

Advantages of a Linear Bus Topology :

  • Easy to connect a computer or peripheral to a linear bus.
  • Requires less cable length than a star topology.

Disadvantages of a Linear Bus Topology : 

  • Entire network shuts down if there is a break in the main cable.
  • Terminators are required at both ends of the backbone cable.
  • Difficult to identify the problem if the entire network shuts down.
  • Not meant to be used as a stand-alone solution in a large building.

2. Star :)

A star topology is designed with each node (file server, workstations, and peripherals) connected directly to a central network hub, switch, or concentrator .Data on a star network passes through the hub, switch, or concentrator before continuing to its destination. The hub, switch, or concentrator manages and controls all functions of the network. It also acts as a repeater for the data flow. This configuration is common with twisted pair cable; however, it can also be used with coaxial cable or fiber optic cable.
Star topology

Advantages of a Star Topology : 

  • Easy to install and wire.
  • No disruptions to the network when connecting or removing devices.
  • Easy to detect faults and to remove parts.

Disadvantages of a Star Topology : 

  • Requires more cable length than a linear topology.
  • If the hub, switch, or concentrator fails, nodes attached are disabled.
  • More expensive than linear bus topologies because of the cost of the hubs.

3. Ring :)

The ring topology connects computers on a single circle of cable. Unlike the bus topology, there are no terminated ends. The signals travel around the loop in one direction and pass through each computer, which can act as a repeater to boost the signal and send it on to the next computer. This shows a typical ring topology with one server and four workstations. The failure of one computer can have an impact on the entire network.A network's physical topology is the wire itself. A network's logical topology is the way it carries signals on the wire



Advantages of Ring Topology : 

  1. High performance delivered
  2. Token ring technology reduces the need of server or central hub to manage the workstations
  3. All nodes have equal opportunity to transmit the data

Disadvantages of Bus Topology :

  1. If one node is disrupted then the whole network goes down
  2. It becomes difficult to add/remove nodes
  3. If more than one token is generated then it may cause ambiguity in the sending of both kinds.