Beruflich Dokumente
Kultur Dokumente
Define HTTP, SOCKET, Port Number · How HTTP works? · Describe HTTP request message
with an appropriate figure. · Persistent and non-persistent connections. · Status code · Why
HTTP is Called stateless protocol? ·
Define wireless communication with advantages and disadvantages · Define RF, spectrum,
bandwidth, Data rate · Define Frequency, Period, Wavelength, and Amplitude. · Cellular network
structure. · Multiple access schema · TDMA, CDMA, FDMA, SDMA with figure · Process of
making a call
Why network security is crucial?
All the business organizations should always monitor their computer networks to block potential
unauthorized access and other kind of attacks. It is also important to establish a secured
network and security support system due to the following reasons:
1. To protect Client Data and information : In today’s world, information and identity theft
cases have increased and keeping all your existing client’s data and information safe and
secure is the responsibility of a business organization. The best quality Network security and
support system can help minimize the risk of your business falling a prey to data and
information theft.
2. Keep your Shared Data safe and secure: For Computer systems on a shared network, a
Network Security and support system can help keep shared data and information safe. Different
levels of safety and security can also be placed for specific computers that may have greater
access to data and information than others.
3.Protect Computer systems From Harmful Spyware: Network Security and support
systems can be effectual in protecting your computer systems from harmful viruses and
spyware. This means you won’t have to look out for new, expensive computer systems.
4.To Comply with Ethical Responsibilities and Regulatory Requirements: It is the duty of
every business organization to develop policies and procedures addressing the security and
safety requirements of every business organization. These procedures and policies work for the
safety and security of any organization and are mandatory for any organization working on
computer systems.
5.Increase your Network Performance: Investing in high quality Network Security and support
system facilities will benefit your business organization massively and reduce expenses in the
long run. There will be fewer disasters and less downtimes, which will boost your business
profits.
Firewall:
A firewall is software used to maintain the security of a private network. Firewalls block
unauthorized access to or from private networks and are often employed to prevent
unauthorized Web users or illicit software from gaining access to private networks connected to
the Internet. A firewall may be implemented using hardware, software, or a combination of both.
A firewall is recognized as the first line of defense in securing sensitive information. For better
safety, the data can be encrypted.
Authentication
Authentication is about validating your credentials like User Name/User ID and password to
verify your identity. The system determines whether you are what you say you are using your
credentials. In public and private networks, the system authenticates the user identity via login
passwords. Authentication is usually done by a username and password, and sometimes in
conjunction with factors of authentication, which refers to the various ways to be authenticated.
Authentication factors determine the various elements the system use to verify one’s identity
prior to granting him access to anything from accessing a file to requesting a bank transaction.
A user’s identity can be determined by what he knows, what he has, or what he is. When it
comes to security, at least two or all the three authentication factors must be verified in order to
grant someone access to the system.
Based on the security level, authentication factor can vary from one of the following:
For example, when you enter your ATM card into the ATM machine, the machine asks you to
enter your pin. After you enter the pin correctly, the bank then confirms your identity that the
card really belongs to you and you’re the rightful owner of the card. By validating your ATM card
pin, the bank actually verifies your identity, which is called authentication. It merely identifies
who you are, nothing else.
Authorization
Authorization, on the other hand, occurs after your identity is successfully authenticated by the
system, which ultimately gives you full permission to access the resources such as information,
files, databases, funds, locations, almost anything. In simple terms, authorization determines
your ability to access the system and up to what extent. Once your identity is verified by the
system after successful authentication, you are then authorized to access the resources of the
system.
Authorization is the process to determine whether the authenticated user has access to the
particular resources. It verifies your rights to grant you access to resources such as information,
databases, files, etc. Authorization usually comes after authentication which confirms your
privileges to perform. In simple terms, it’s like giving someone official permission to do
something or anything.
For example, the process of verifying and confirming employees ID and passwords in an
organization is called authentication, but determining which employee has access to which floor
is called authorization. Let’s say you are traveling and you’re about to board a flight. When you
show your ticket and some identification before checking in, you receive a boarding pass which
confirms that the airport authority has authenticated your identity. But that’s not it. A flight
attendant must authorize you to board the flight you’re supposed to be flying on, allowing you
access to the inside of the plane and its resources.
Access to a system is protected by both authentication and authorization. Any attempt to access
the system might be authenticated by entering valid credentials, but it can only be accepted
after successful authorization. If the attempt is authenticated but not authorized, the system will
deny access to the system.
Authentication Authorization
Authentication confirms your identity to grant Authorization determines whether you are
access to the system. authorized to access the resources.
It is the process of validating user credentials It is the process of verifying whether access
to gain user access. is allowed or not.
It determines whether user is what he claims It determines what user can and cannot
to be. access.
Definition of 'Cryptography'
Description: Earlier cryptography was effectively synonymous with encryption but nowadays
cryptography is mainly based on mathematical theory and computer science practice.
Modern cryptography concerns with:
Non-repudiation - Sender cannot deny his/her intentions in the transmission of the information at
a later stage
1. Symmetric-key cryptography
2. Hash functions.
3. Public-key cryptography
Symmetric-key Cryptography: Both the sender and receiver share a single key. The sender
uses this key to encrypt plaintext and send the cipher text to the receiver. On the other side the
receiver applies the same key to decrypt the message and recover the plain text.
Public-Key Cryptography: This is the most revolutionary concept in the last 300-400 years. In
Public-Key Cryptography two related keys (public and private key) are used. Public key may be
freely distributed, while its paired private key, remains a secret. The public key is used for
encryption and for decryption private key is used.
Hash Functions: No key is used in this algorithm. A fixed-length hash value is computed as per
the plain text that makes it impossible for the contents of the plain text to be recovered. Hash
functions are also used by many operating systems to encrypt passwords.
Functions of Cryptography
There are five primary functions of cryptography today:
Privacy/confidentiality: Ensuring that no one can read the message except the
intended receiver.
Authentication: The process of proving one's identity.
Integrity: Assuring the receiver that the received message has not been altered in any
way from the original.
Non-repudiation: A mechanism to prove that the sender really sent this message.
Key exchange: The method by which crypto keys are shared between sender and
receiver.
Making a Call
1.Scan Control Channels: Your cell phone needs to use the "closest" base station
because that's the one with the strongest signal and the one that will give the best
connection. To find the closest base station, your phone checks all control channels and
determines which has the strongest signal.
2. Choose Strongest: Your cell phone chooses the strongest signal and decides to use
that one for placing the call.
3. Send Origination Message: Your cell phone now transmits a very short message
(about 1/4 second) that contains the MIN (Mobile Identification Number, i.e., your cell
phone number), its ESN (Electronic Serial Number), and the number you just dialed.
.
4. Get Channel Assignment: After the cellular service provider verifies that you are a
valid, paying customer (based on the MIN and ESN your phone sent), the base station
sends a Channel Assignment message to your phone (also a short 1/4-second burst).
This message tells your phone where (that is, on which channel) the conversation will
take place.
5. Begin Conversation.