10/27/2022 0 Comments Computer network security in hindi pdf![]()
WAF is used to protect the application by filtering and monitoring incoming and outgoing traffic between web application and the internet. On the other hand, asymmetric encryption needs different keys for encryption and decryption. Symmetric encryption requires the same key for encryption and decryption. The user is granted access only after presenting evidence to the authentication device.Ģ6) Explain the difference between asymmetric and symmetric encryption. It is a security process to identify the person who is accessing an online account. TFA stands for Two Factor Authentication. #Computer network security in hindi pdf how to#TLS offers a secure channel between two clients.ĬSRF stands for Cross-Site Request Forgery.Ģ5) What is 2FA? How to implement it for a public website? SSL helps you to track the person you are communicating to. The main difference between these two is that SSL verifies the identity of the sender. It’s a number of internet-connected devices like servers, mobile devices, IoT devices, and PCs that are infected and controlled by malware.Ģ3) What is the main difference between SSL and TLS? This protocol work as an interface between the OSI network and OSI link layer. #Computer network security in hindi pdf mac#It is a protocol used for finding MAC address associated with IPv4 address. The main intention of MITM is to access confidential information. Some of them are as follows:Ī MITM or Man-in-the-Middle is a type of attack where an attacker intercepts communication between two persons. There are various ways to reset BIOS password. Grey hat hackers are computer hacker who sometimes violate ethical standards, but they do not have malicious intent.ġ9) How to reset a password-protected BIOS configuration? They protect the information system of an organization. ![]() White hat hackers or security specialist are specialized in penetration testing. They break into a secure network to modify, steal, or destroy data so that the network can not be used by authorized network users. These hackers can generate malware for personal financial gain or other malicious reasons. This method protects data from interference, snooping, censorship.īlack hat hackers are people who have a good knowledge of breaching network security. It is a network connection method for creating an encrypted and safe connection. Seven different layers of OSI models are as follows: ![]() Hackers use port scanning technique to find information for malicious purposes.ġ4) Name the different layers of the OSI model. It is the technique for identifying open ports and service available on a specific host. There are ways to prevent Brute Force attacks. #Computer network security in hindi pdf software#In many cases, brute force attacks are automated where the software automatically works to login with credentials. Hackers repetitively try all the combinations of credentials. #Computer network security in hindi pdf password#It is a trial-and-error method to find out the right password or PIN. Data leakage occurs via email, optical media, laptops, and USB keys.ġ2) Explain the brute force attack. It is used to protect the information in online transactions and digital payments to maintain data privacy.ĭata leakage is an unauthorized transfer of data to the outside world. It is a technology creating encrypted connections between a web server and a web browser. It monitors the traffic of all device on the network. It monitors suspicious system activities and traffic of a specific device. Traceroute is used to check where the connection breaks or stops or to identify the failure.ĩ) Differentiate between HIDS and NIDS. Traceroute is used mostly when the packet does not reach the destination. It lists all the points that the packet passes through. ![]() Firewalls can also prevent content filtering and remote access. Firewalls are mostly used to protect the system or network from malware, worms, and viruses. A firewall is set on the boundaries of any system or network which monitors and controls network traffic. It is a security system designed for the network.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |