Home > Computer Networks

Firewalls

Firewalls Are Use To Protect A Network's Data And Resources From Outside Access And Threats. A Firewall Is Used As A Barrier Between A Internal Network Of An Organisation Ana Another Network(May Be Public Internet Or Another Network Of The Same Organisation). Since The Primary Function Of The Firewall Is To

Read More

Digital Signature

Digital Signature Is Equivalent to A Handwritten Signature. It Is an Electronic Verification of The Sender Digital Signature. a Digital Signature Serves Three Purposes.   1.Authentication A Digital Signature Is the Receiver Reason to Believe the Message Was Created and Sent by The Claimed Sender. 2.Non-Repudiation  With Digital Signature the Sender Cannot Deny Having Sent

Read More

Types Of Cryptography

There Are Two Types Of Encryption That Are Used, These Are Symmetric Key And Public Key. Encryption Is Important Part Of Computing, In Order To Put Your Files Secure Communication, You Need To Use Encryption, Encryption Is Process Of Taking Data And Coding It Into A Form That Cannot Read By

Read More

Protection Against Network Threats

Protection Against Network Threats - If Confidential Or Accuracy Of Information Is Of Any Value At All It Should Be Protected To An Appropriate Level. If The Unauthorised Disclosure Or Alteration Of The Information Could Result In Any Negative Impact, It Should Be Secured. However, The Means To Achieve The Requisite Protection

Read More

Network Security

It Is Very Important To Have Security To Your Computer Network. Network Security Is Nothing But Giving Security For The Network To Avoid Unauthorised Access. Absolute Security (Total Security) If You Unplug Your Computer From The Network Or If You Switch Off The Power Supply Or If You Lock You're And Put's

Read More

Types And Sources Of Network Threats

Denail OF Service(DoS), Unauthorised Access, Executing Commands Illicitly, Confidential Breaches, Destructive Behavior Are The Types And Sources Of Network Threats.   Denial Of Service(Dos) It Is A Cyber Attack On A Specific Server Or A Network With The Intended Purpose Of Disrupting Normal Operation. DoS Attack Floods The Target With Constant Flood Of

Read More

HUBS,Switches,Gateways,Routers,Bridges : Network Works

Network Works Using HUB, SWITCH, ROUTER. All These Three Devices Are Similar But There Is A Difference In The Way They Handle Data. So Lets Understand About These Three. HUB The Purpose Of A Hub Is To Connect All Of Your Network Devices Together On A Internal Network. It Is A Device

Read More

Application Layer Protocols

Application Layer Protocols Are Classified Into 1) Common Application Specific Elements(CASE) 2) Specific Applications Specific Elements(SASE), Application Layer Is The Top Most Layer Of OSI Model With Which User Can Interact Directly. Application Layer Provides Services To The User. Common Application Specific Elements And Specific Application Specific Elements Are Commonly Required

Read More

Internet Protocol IP Addressing And Subnetting

IP Addressing And Subnetting - You Need IP Address For Your Computer To Communicate With Another Computer With IP Address, In Simple Words, Every Computer Should Have IP Address, So That Computers Can Interconnect To Send And Receive Data. But What Is IP Addressing? IP Address Is 32 Bit. Which Consists Of Four

Read More

Internet Protocol

Internet Protocol Address Is Given For Every Computer To Identify It In The Network. You Have Your Name For Your Body Similarly Computer Have Internet Protocol Address. To Transfer Data To A Computer From Your Computer, You Have To The IP Address Of That Computer. Every Computer Has A Unique IP Address. To Connect

Read More