Network+Security

Backups

What is backup?

Back up is when you make a copy of your work.

It is common sense to back up your work and to have a extra copies of your work but actually not many people actually do this.

You should save your work every 5 minutes so you don’t lose your work in case of a malfunction. You should save more than version of your work, because if your work gets corrupted or deleted it would be easier to recover your work, you don’t have start from scratch.

Other than saving your file just on your computer your should also saved your work on another piece of hardware, for example a external hard drive.

Encryption

Encryption is when you scramble data and only certain people would be able to read it. The person who is reading it has a secret key know what is says

Access rights

Access right is when the network administrator set up users that are allowed to access the network.

The administrator could set up folders that everyone can read and write, some folder that can be only read not write. some folders that you just cant access. You can access these folder because you don’t have high enough access level. it usual would say “You do not have sufficient access rights” or something similar to the sentence.

You could also get access right by joining a group, when you are in that group you get the same access right as the rest of the member.

Transaction logs

Transaction logs are basically a journal used by databases or a database management system that records all file movements and actions executed by the database, this is helpful in events of fatal hardware crash and allows for some data to still be recovered. When a database doesn’t shut down properly, it can easily review its current storage and check the transaction logs to ensure there aren’t any discrepancies and to guarantee ACID control. A transaction log consists of a log sequence number, a unique serial number generated by each log, a Prev LSN which is a link to a previous log, an ID number which refers to the transaction that happened while generating said log and type which refers to what type of log it actually is. Aforementioned WPA

The WPA and/or WPA II stands for WI FI PROTECTED ACCESS, was invented by the wi fi alliance to help prevent unwanted users from entering a wireless LAN, it involves a password and a possible account name, there is a flow in WPA that allows it to be accessed through a flaw in the firmware hence the creation of the WPA II.

WEP

The wired equivalent privacy was a much earlier and substantially less secure version of the WPA for wireless network, researchers and hackers have found that this encryption system is severely flawed and is seldom used on wireless LANs as of current.

Advantages and disadvantages

Wireless networks are usually less encrypted and less secure than a wired connection and this still stands because the wep & wpa are much easier to break into that a wired encryption and is still glitchy and can cause problems.

Firewalls

Firewalls are one of the older technologies; It on a basic scale is a program that filters out a certain type of data from entering a local area network. Firewalls have 3 current generations each doing a different, the first generation is a packet blocker, the 1st generation will filter out any packet matching a no-go packet and blocks potential malicious data, the 2nd generation “stateful” filters were developed by the telecom company at & T, these can block packets and trace their location and their origin which is noticeably more advanced by the second generation, the third and most advanced generation is the 3rd generation application layer filter, not only does this do everything the 1st 2 do they also prevent unwanted transfer protocols from happening and prevent packets joining together to form a malicious script or application.

Advantages and disadvantages

One of the key advantages of firewalls is its ability to filter out unwanted data and prevent unauthorized access to important or confidential data but is also its disadvantage because it can block wanted data and have things that it cant block out due to lack of information about a certain malicious packet. Log-ins and passwords

Log-in names and passwords form the basis of communication on the internet and form the term called “account”, the log-in and password method is used by social networks and internet websites for many reasons and has existed before the days of widespread internet. The account usually involves creating an internet name, usually an alias or nickname and tying an email or password to that account allowing a user to log onto certain websites and forms an internet identity. Account names or log-ins are very varied through the internet and almost no 2 people have identical names around the internet several involving the use of the internet language 1337 and numbers at the end. Account names are usually very vague and hard to understand and cryptic along with having no meaning so it is hard to judge what type of person just by an account name. Passwords are a short string of characters used for security purposes to ensure nobody can log on instead of the intended user and cause damage to a particular site, passwords usually range from 5 – 20 characters in length and almost all characters are allowed, for a secure password, it is usually better to have at least 1 form of punctuation and at least one number.

Advantages and disadvantages

The best advantage of the log in system is that is relatively easy to set up and more reliable than an IP based account, using a password has the advantage of being secure and hard to get at if you do make a good one but a user can forget and passwords can be lost