Advert

Biometrics

Last edited by . Total of no comments in the discussion.

Biometrics, or bio-identification, is the practice of measuring physical characteristics of a person to verify their identity. The most common biometric systems measure fingerprints or hand prints. More advanced biometric systems measure the users voice, features of the users eyes, or the geometry of their entire face. Futuristic systems measure the users ears, their smell, or even their DNA itself. Biometrics are more secure than passwords, but they can also be fooled. For example, one hacker discovered that fingerprint readers could be fooled by copying a fingerprint using the goo Read More

Share on:

Packet Fragmentation

Last edited by . Total of 4 comments in the discussion.

Every packet based network has an MTU (Maximum Transmission Unit) size. The MTU is the size of the largest packet that that network can transmit. Packets larger than the allowable MTU must be divided into smaller packets or fragments to enable them to traverse the network. Network Standard MTU Ethernet 1500 Token Ring 4096 Packet Headers Every IP packet has an IP (Internet Protocol) header that stores information about the packet, including: Version IHL Type of Service Total Length Identification Flags Fragment Offset Time to Live Protocol Header Checksum Source Read More

Share on:

Role Based Access Control (RBAC)

Last edited by . Total of no comments in the discussion.

The earliest forms of access control systems assigned privileges to users. These early access control systems allowed the system administrator to enable defined privileges for users like Bob and Doug. The addition of user groups improved that situation. The system administrator could now assign privileges to groups such as Sales or Accounting and add users into those groups. Role Based Access Control (RBAC) is the next evolutionary step in access control. Role Based Access Control (RBAC) enables privileges to be assigned to arbitrary roles. Those roles can then be assigned Read More

Share on:

How Firewall Protection Works

Last edited by . Total of no comments in the discussion.

Firewall protection works by blocking certain types of traffic between a source and a destination. All network traffic has a source, a destination, and a protocol. This protocol is usually TCP, UDP, or ICMP. If this protocol is TCP or UDP, there is a source port and a destination port. Most often the source port is a random port and the destination port is a well-known port number. For example, the destination port for HTTP is 80 and the destination port for DNS is 53. If the protocol is ICMP, Read More

Share on:

ISAKMP

Last edited by . Total of 2 comments in the discussion.

ISAKMP (Internet Security Association and Key Management Protocol) is a protocol for establishing Security Associations (SA) and cryptographic keys in a internet environment. ISAKMP defines the procedures for authenticating a communicating peer, creation and management of Security Associations, key generation techniques, and threat mitigation (e.g. denial of service and replay attacks). ISAKMP typically utilizes IKE for key exchange, although other methods can be implemented. ISAKMP is documented in RFC 2048: Internet Security Association and Key Management Protocol (ISAKMP). ISAKMP under IP (Internet Protocol) is documented in RFC 2407: The Internet Read More

Share on:

Network Attacks

Last edited by . Total of 8 comments in the discussion.

Understanding Network Attacks A network attack can be defined as any method, process, or means used to maliciously attempt to compromise network security. There are a number of reasons that an individual(s) would want to attack corporate networks. The individuals performing network attacks are commonly referred to as network attackers, hackers, or crackers. A few different types of malicious activities that network attackers and hackers perform are summarized here: Illegally using user accounts and privileges Stealing hardware Stealing software Running code to damage systems Running code to damage and corrupt Read More

Share on:

IPsec

Last edited by . Total of no comments in the discussion.

IPSec (IP Security) is a suite of protocols which was designed by Internet Engineering Task Force (IETF) to protect data by signing and encrypting data before it is transmitted over public networks. The IETF Request for Comments (RFCs) 2401-2409 defines the IPSec protocols with regard to security protocols, security associations and key management, and authentication and encryption algorithms. IPSec is a framework of open standards for encrypting TCP/IP traffic within networking environments. IPSec works by encrypting the information contained in IP datagrams through encapsulating. This in turn provides network level Read More

Share on:

Firewalls

Last edited by . Total of 10 comments in the discussion.

A firewall is a software component that restricts unauthorized inward network access. It allows outward information flow. It is set up to control traffic flow between two networks by configured permissions like Allow, Deny, Block, Encrypt, etc. It is normally employed to avoid illegal access to personal computers or corporate networks from external unsafe entities like the Internet. The firewall scrutinizes all the information flowing in and out of the network. If some data do not meet the necessary criterion, it is denied access into the network. A firewall’s key Read More

Share on:

VPN (Virtual Private Network)

Last edited by . Total of 1 comment in the discussion.

VPN A VPN (virtual private network) gives the end-user a secure means of connecting to a remote network over a remote or public Internet connection. The remote network can either be a private LAN such as those used at businesses, schools, the home, or one providing remote services to the user. The best way to conceptualize a VPN is that it creates a virtual tunnel through the Internet to the private network resource(s) located at the opposite end of the connection. The network traffic over the VPN is encrypted providing Read More

Share on:

RADIUS Server

Last edited by . Total of 2 comments in the discussion.

RADIUS (Remote Authentication Dial In User Service) is a system procedure that offers centralized entrance, approval, as well as accounting administration for individuals or computers to add and utilize a network service. Individuals often need “Authentication” when they try to fix to a network. People have to face far more problems while connecting their computers to a telecommunication network. For example, the telco wants to know the computer operator. When the identification is given, it may ask what services the user prefers. Plus, at that moment, the telco collects billing Read More

Share on: