4 Knowledge Base

 

 TelecomTrainning.net > Knowledge Base
 Viewing KB Article
Good Afternoon, - Please register or - log-in to your account.
Search
Search   Saved Questions   Ask a question
Keywords 
 
Available categories
LTE
100 of Questions in LTE
CCNA Certification
CCNA Sample Q & A (1000 + Q &A)
(Network +) Certification
(Network +) Sample Q & A (1000 + Q &A)
Networking
General/Interview Q& A on Networking
Home Networking
General/Interview Q& A on Networking
VOIP, SIP & Asterisk
Q & A on VOIP,Ethereal, SIP & Asterisk
Telecom Test Equipments
Q & A on Telecom Test Equipment
PSTN / Wireline
General / Interview Q & A on PSTN / Wireline
LTE, Wireless, 3G ,Diameter and HSS
General/Interview Q & A on LTE, Wireless, 3G ,Diameter and HSS
Telecom General
Any Q & A in Telecom in General

Top Questions
Friends, Describe Secure storage and distribution of A-Keys?
How do I monitor SS7 Traffic in spectra2?
what is the difference between E1 signal & Ethernet signal ?
Explain me the difference between a repeater, bridge and router? Relate this to the OSI model.
What is the difference between BRI & PRI ?
Can you tell me about PBGT?
Guys what is the purpose of Umbrella Cell Approach in GSM ?
how can we explain media gateway in MSc?
What is GGSN?
What is the difference between Electrical-tilt and Mechanical-tilt of an antenna?
What is demarc point?
What is BSC?
Can any one explain me how sms flow will work using ss7 network ?( from physical layer to application layer)
Explain SLTA and SLTM messages in MTP3?
why cellphone towers are painted in red and white?
Hi guys what is WAP?
what is EDAp? what is the functions of EDAP?
wat is the difference betweem MSC & GMSC, & MSS & GCS?
What is a circuit id?
what is sdh?

any body tell me how abt network securety?
m8zamm4l 17-October-2008 05:10:40 PM

Comments


www.AnueSystems.com
Posted by crouse


see the link its all about network security
http://www.interhack.net/pubs/network-security/
Posted by Hash007


Network Security should include :
1)- Good Antivirus
2)- Probaly a firewall
3)- Encryption of transmission
4)- Good Network Security Manager
Posted by waqqas1


The networks are computer networks, both public and private, that are used every day to conduct transactions and communications among businesses, government agencies and individuals. The networks are comprised of "nodes", which are "client" terminals (individual user PCs) and one or more "servers" and/or "host" computers. They are linked by communication systems, some of which might be private, such as within a company, and others which might be open to public access. The obvious example of a network system that is open to public access is the Internet, but many private networks also utilize publicly-accessible communications. Today, most companies' host computers can be accessed by their employees whether in their offices over a private communications network, or from their homes or hotel rooms while on the road through normal telephone lines.

Network security involves all activities that organizations, enterprises, and institutions undertake to protect the value and ongoing usability of assets and the integrity and continuity of operations. An effective network security strategy requires identifying threats and then choosing the most effective set of tools to combat them.

Threats to network security include:
Viruses : Computer programs written by devious programmers and designed to replicate themselves and infect computers when triggered by a specific event
Trojan horse programs : Delivery vehicles for destructive code, which appear to be harmless or useful software programs such as games
Vandals : Software applications or applets that cause destruction
Attacks : Including reconnaissance attacks (information-gathering activities to collect data that is later used to compromise networks); access attacks (which exploit network vulnerabilities in order to gain entry to e-mail, databases, or the corporate network); and denial-of-service attacks (which prevent access to part or all of a computer system)
Data interception : Involves eavesdropping on communications or altering data packets being transmitted
Social engineering : Obtaining confidential network security information through nontechnical means, such as posing as a technical support person and asking for people's passwords

Network security tools include:
Antivirus software packages : These packages counter most virus threats if regularly updated and correctly maintained.
Secure network infrastructure : Switches and routers have hardware and software features that support secure connectivity, perimeter security, intrusion protection, identity services, and security management.
Dedicated network security hardware and software-Tools such as firewalls and intrusion detection systems provide protection for all areas of the network and enable secure connections.
Virtual private networks : These networks provide access control and data encryption between two different computers on a network. This allows remote workers to connect to the network without the risk of a hacker or thief intercepting data.
Identity services : These services help to identify users and control their activities and transactions on the network. Services include passwords, digital certificates, and digital authentication keys.
Encryption : Encryption ensures that messages cannot be intercepted or read by anyone other than the authorized recipient.
Security management : This is the glue that holds together the other building blocks of a strong security solution.
Posted by sagitraz

Q&A Rating

Q&A Rating
Rate This Question and Answer

Related Questions
To start Windows 2000 in safe mode while at the boot menu I have to do? Tell me
 
What is the key difference between 'Dedicated Control Channels' and 'Common Control Channels' in GSM RF channels?



Search questions via popularity
Top viewed questions  Top emailed questions  Most printed questions  Most saved questions
 
Copyright © Telecom Training, All Rights Reserved