An intrusion detection system (IDS) is a system that monitors network traffic for suspicious activity and issues alerts when such activity is discovered.
Thursday, November 29, 2018
Network Topology
A network topology is the arrangement of a network, including its nodes and connecting lines. There are two ways of defining network geometry: the physical topology and the logical (or signal) topology.
The most common nodes are computers and peripheral devices. Network topology is illustrated by showing these nodes and their connections using cables. There are a number of different types of network topologies, including point-to-point, bus, star, ring, mesh, tree and hybrid.
The most common nodes are computers and peripheral devices. Network topology is illustrated by showing these nodes and their connections using cables. There are a number of different types of network topologies, including point-to-point, bus, star, ring, mesh, tree and hybrid.
Authentication
Authentication is the process of determining whether someone or
something is who or what it is declared to be. To access most technology
services of Indiana University, you must provide such proof of
identity. Services such as the Central Authentication Service (CAS),
Active Directory, and Duo provide this functionality for most major
systems and applications at IU.
In private and public computer networks (including the
internet), authentication is commonly done through the use of login passwords or passphrases;
knowledge of such is assumed to guarantee that the user is authentic.
Thus, when you are asked to "authenticate" to a system, it usually means
that you enter your username and/or password for that system.
Additional forms of authentication, commonly referred to as two-factor or multifactor authentication, may be layered on top of login credentials. Typically, these methods use a physical token, such as a card or device, to increase security.
Firewall
A firewall is a system designed to prevent unauthorized access to or
from a private network. You can implement a firewall in either
hardware or software form, or a combination of both. Firewalls prevent
unauthorized internet users from accessing private networks
connected to the internet, especially intranets. All messages entering
or leaving the intranet (i.e., the local network to which you are
connected) must pass through the firewall, which examines each message
and blocks those that do not meet the specified security criteria.
Note: In protecting private information, a firewall is considered a first line of defense; it cannot, however, be considered the only such line. Firewalls are generally designed to protect network traffic and connections, and therefore do not attempt to authenticate individual users when determining who can access a particular computer or network.
Several types of firewalls exist:
In Windows and Mac OS X, firewalls are built into the operating system.
Third-party firewall packages also exist, such as Zone Alarm, Norton Personal Firewall, Tiny, Black Ice Protection, and McAfee Personal Firewall. Many of these offer free versions or trials of their commercial versions.
In addition, many home and small office broadband routers have rudimentary firewall capabilities built in. These tend to be simply port/protocol filters, although models with much finer control are available.
Note: In protecting private information, a firewall is considered a first line of defense; it cannot, however, be considered the only such line. Firewalls are generally designed to protect network traffic and connections, and therefore do not attempt to authenticate individual users when determining who can access a particular computer or network.
Several types of firewalls exist:
- Packet filtering: The system examines each packet entering or leaving the network and accepts or rejects it based on user-defined rules. Packet filtering is fairly effective and transparent to users, but it is difficult to configure. In addition, it is susceptible to IP spoofing.
- Circuit-level gateway implementation: This process applies security mechanisms when a TCP or UDP connection is established. Once the connection has been made, packets can flow between the hosts without further checking.
- Acting as a proxy server: A proxyserver is a type of gateway that hides the true network address of the computer(s) connecting through it. A proxy server connects to the internet, makes the requests for pages, connections to servers, etc., and receives the data on behalf of the computer(s) behind it. The firewall capabilities lie in the fact that a proxy can be configured to allow only certain types of traffic to pass (e.g., HTTP files, or web pages). A proxy server has the potential drawback of slowing network performance, since it has to actively analyze and manipulate traffic passing through it.
- Web application firewall: A web application firewall is a hardware appliance, server plug-in, or some other software filter that applies a set of rules to a HTTP conversation. Such rules are generally customized to the application so that many attacks can be identified and blocked.
In Windows and Mac OS X, firewalls are built into the operating system.
Third-party firewall packages also exist, such as Zone Alarm, Norton Personal Firewall, Tiny, Black Ice Protection, and McAfee Personal Firewall. Many of these offer free versions or trials of their commercial versions.
In addition, many home and small office broadband routers have rudimentary firewall capabilities built in. These tend to be simply port/protocol filters, although models with much finer control are available.
Proxy Server
A proxy server, also known as a "proxy" or "application-level gateway", is a computer that acts as a gateway between a local network (for example, all the computers at one company or in one building) and a larger-scale network such as the internet. Proxy servers provide increased performance and security. In some cases, they monitor employees' use of outside resources.
A proxy server works by intercepting connections between sender and receiver. All incoming data enters through one port and is forwarded to the rest of the network via another port. By blocking direct access between two networks, proxy servers make it much more difficult for hackers to get internal addresses and details of a private network.
Some proxy servers are a group of applications or servers that block common internet services. For example, an HTTP proxy intercepts web access, and an SMTP proxy intercepts email. A proxy server uses a network addressing scheme to present one organization-wide IP address to the internet. The server funnels all user requests to the internet and returns responses to the appropriate users. In addition to restricting access from outside, this mechanism can prevent inside users from reaching specific internet resources (for example, certain websites). A proxy server can also be one of the components of a firewall.
Proxies may also cache web pages. Each time an internal user requests a URL from outside, a temporary copy is stored locally. The next time an internal user requests the same URL, the proxy can serve the local copy instead of retrieving the original across the network, improving performance.
Friday, November 23, 2018
Glossary - Information Technology
5G Technology
5G will be the key to unlocking the full potential of IoT and a host of other technologies. Businesses can get a jump on their competition if they apply the power of 5G to their products and services first. This glossary lists 25 5G-related terms and explains their meaning and their importance to the enterprise.
From the glossary:
Throughout history, each new technological advance has precipitated the next advance, in a continuous loop of faster, better, and more powerful technology. This principle has been the cornerstone for the IT industry since its inception. For mobile telecommunication, the next great technological advance in this cycle has been given the moniker fifth-generation (5G) wireless.
Predictably, 5G is going to be a much faster form of wireless mobile communication than its predecessors. But 5G also promises to be more than just faster. The 5G standards being developed promise a telecommunications network that also dramatically improves latency, coverage, capacity, and density.
5G technology will be the key to unlocking the full potential of IoT, real-time mobile streaming, autonomous vehicles, immersive virtual reality, and a slew of other technological advances necessary for a mobile, always connected world—a prime example of technology precipitating more technology.
Businesses that can apply 5G technology to their products and services early in the advancement cycle could get a huge jump on their competition. However, as is often the case in mobile wireless technology, there are varying standards and use cases for 5G, which greatly complicates matters. This glossary lists 25 5G-related terms and explains their meaning and their importance to the enterprise.
Source: TechRepublic
From the glossary:
Throughout history, each new technological advance has precipitated the next advance, in a continuous loop of faster, better, and more powerful technology. This principle has been the cornerstone for the IT industry since its inception. For mobile telecommunication, the next great technological advance in this cycle has been given the moniker fifth-generation (5G) wireless.
Predictably, 5G is going to be a much faster form of wireless mobile communication than its predecessors. But 5G also promises to be more than just faster. The 5G standards being developed promise a telecommunications network that also dramatically improves latency, coverage, capacity, and density.
5G technology will be the key to unlocking the full potential of IoT, real-time mobile streaming, autonomous vehicles, immersive virtual reality, and a slew of other technological advances necessary for a mobile, always connected world—a prime example of technology precipitating more technology.
Businesses that can apply 5G technology to their products and services early in the advancement cycle could get a huge jump on their competition. However, as is often the case in mobile wireless technology, there are varying standards and use cases for 5G, which greatly complicates matters. This glossary lists 25 5G-related terms and explains their meaning and their importance to the enterprise.
Source: TechRepublic
Wednesday, November 14, 2018
Swift Playground Not Displaying Output
Try restart playground and type "Hello". Set the Play/Stop button to "Automatically Run" by right click on the icon (lower left corner. Show the debug area.
Thursday, November 1, 2018
Subscribe to:
Posts (Atom)