Posts

Showing posts from January, 2021

Network Operating Systems and Client Software

  A network operating system is a software application that provides a platform for both the functionality of an individual computer and for multiple computers within an interconnected network. Basically, a network operating system controls other software and computer hardware to run applications, share resources, protect data and establish communication. Individual computers run client operating systems, while network systems create the software infrastructure for wireless, local and wide area networks to function. Basic Operating Features Network operating systems support the basic underlying operating features of networks. These include support for processors and the various protocols that allow computers to share data. Many network operating systems can detect hardware within the system to allow for asset discovery within the network. Also, network operating systems support the processing of other software applications that run on both individual computers and within the network. S

How Does Ransomware Take Down an Entire Network

  Ransomware is malicious software that infects your computer and displays messages demanding a fee to be paid in order for your system to work again. This class of malware is a criminal moneymaking scheme that can be installed through deceptive links in an email message, instant message or website. It has the ability to lock a computer screen or encrypt important, predetermined files with a password. Examples of Ransomware Scareware is the simplest type of ransomware. It uses scare tactics or intimidation to trick victims into paying up. It can come in the form of fake antivirus software in which a message suddenly appears claiming your computer has various issues and an online payment is necessary to fix them! The level of this type of attack varies. Sometimes, users may be bombarded with endless alerts and pop-up messages. Other times, the computer will fail to work at all. Yet, another type of ransomware can impersonate a law enforcement agency by opening up a page that appears to

Wireless Connectivity Options for IoT Applications

  In the past, wired networks were considered to be far more secure than wireless networks. Today, however, wireless networks are as secure as wired networks, so long as they are properly configured. According to TechTarget, "When comparing wireless vs. wired security, securing a wireless network is even more important than securing a wired network for one simple reason: Accessing a wireless network does not require physical access to a network jack or cable, as does accessing a wired network. Wireless networks use radio transmissions to carry data between end users and the network and it is difficult to contain those radio waves. Therefore, it’s possible for someone to sit in your office building's lobby or parking lot and eavesdrop on wireless network communications." How can MSPs safeguard wireless networks against unauthorized access? There are several tools that MSPs and IT administrators can use to protect the wireless networks they manage, including: Encryption. En

Cybersecurity Program Management

  Effective information security program management should achieve the outcomes defined in ISG. The necessary goals must be defined in specific, objective and measurable terms. Appropriate metrics should also be put in place to measure whether or not the goals were achieved. If not, it should be known by how much the objectives were missed, and discussion done to improve on performance. Candidates should focus on the following six outcomes, and they should be considered as the basis for developing the objectives of an effective information security program: Strategic alignment: The emphasis here is on organizational information risk, selection of appropriate control objectives and standards, agreement on acceptable risk and risk tolerance and definitions of financial, operational and other constraints. Risk management: Candidates must show a comprehensive understanding of threats the organization faces, its vulnerabilities and risk profile. Candidates must know how to evaluate the pote

Evaluation of WLAN Security and Performance

  In the past, wired networks were considered to be far more secure than wireless networks. Today, however, wireless networks are as secure as wired networks, so long as they are properly configured. "When comparing wireless vs. wired security, securing a wireless network is even more important than securing a wired network for one simple reason: Accessing a wireless network does not require physical access to a network jack or cable, as does accessing a wired network. Wireless networks use radio transmissions to carry data between end users and the network and it is difficult to contain those radio waves. Therefore, it’s possible for someone to sit in your office building's lobby or parking lot and eavesdrop on wireless network communications." How can MSPs safeguard wireless networks against unauthorized access? There are several tools that MSPs and IT administrators can use to protect the wireless networks they manage, including: Encryption. Encryption protects the con

authentication and authorization issues of security management

  Managing a corporate network is becoming harder as it becomes larger and more complex. ii. Network management, it includes not only components that transport information in the network, but also systems that generate traffic in the network. iii. The systems could be hosts, database servers, file servers, or mail servers. In the client-server environment, network control is no longer centralized, but distributed. iv. Computer and telecommunication networks are merging fast into converged network with common modes and media of transportation and distribution. As in the case of broadband networks, the IT manager needs to maintain both types of networks. v. Thus, the data communications manager functions and telecommunication manager functions have been merged to that of the IT manager. vi. With the explosion of information storage and transfer in the modern information era, management of information is also the responsibility of the IT manager, with the title of CIO, Chief Information O

What is Disaster recovery

  Cyber security or information technology security are the techniques of protecting computers, networks, programs and data from unauthorized access or attacks that are aimed for exploitation. Description: Major areas covered in cyber security are: 1) Application Security 2) Information Security 3) Disaster recovery 4) Network Security Application security encompasses measures or counter-measures that are taken during the development life-cycle to protect applications from threats that can come through flaws in the application design, development, deployment, upgrade or maintenance. Some basic techniques used for application security are: a) Input parameter validation, b) User/Role Authentication & Authorization, c) Session management, parameter manipulation & exception management, and d) Auditing and logging. Information security protects information from unauthorized access to avoid identity theft and to protect privacy. Major techniques used to cover this are: a) Identificat

Security Features of Network Operating System

  A network operating system is a software application that provides a platform for both the functionality of an individual computer and for multiple computers within an interconnected network. Basically, a network operating system controls other software and computer hardware to run applications, share resources, protect data and establish communication. Individual computers run client operating systems, while network systems create the software infrastructure for wireless, local and wide area networks to function. Basic Operating Features Network operating systems support the basic underlying operating features of networks. These include support for processors and the various protocols that allow computers to share data. Many network operating systems can detect hardware within the system to allow for asset discovery within the network. Also, network operating systems support the processing of other software applications that run on both individual computers and within the network. S

What is Networking Hardware

  A LAN (Local Area Network) is the most basic form of infrastructure that allows communication between two or more computers. A LAN can be constructed with or without servers and is typically restricted, through the limits of network equipments, by physical location. Any system that allows communication between multiple LAN is called a WAN (Wide Area Network), of which the biggest existing one is the World Wide Web, also known as the Internet. Networking Hardware Networking hardware is a switch that allows a computer to communicate to more than one other computer simultaneously. It can be physically wired through network cables or otherwise (e.g. Wi-Fi). A computer participating in the LAN similarly requires the correct equipment such as network adapters installed. Wired network provides better speed and security compared with wireless. A LAN can also consist of both. Depending on the number of clients in the LAN, functionality and complexity, multiple switches, routers and servers mi

How to create windows environments for Lanmanworkstation

  Fileserving in Windows environments is usually of critical importance. After all, if you can't reach your files or have to wait five minutes every time you browse a share, the heat starts to build up in the IT department. File serving is more than just saving a file to your home directory. I wrote a two-part article on MSTerminalServices.org on file serving and Terminal server environments. I suggest you read that article (Part 1 and Part 2 ) first to get a feel for the proper context of this article. One of the main reasons I wrote that article is that fileserving can easily become a bottleneck if not configured properly, especially in Terminal Server environments. To solve these performance problems, you sometimes have to tune the fileserver (lanmanserver) and the “fileserver-client” (lanmanworkstation). However, this isn’t for the faint of heart and can cause huge problems if you do it wrong. Unfortunately, documentation on these tuning parameters is rather scarce. So in this

What is the Basic Operating Features of networking system

  A network operating system is a software application that provides a platform for both the functionality of an individual computer and for multiple computers within an interconnected network. Basically, a network operating system controls other software and computer hardware to run applications, share resources, protect data and establish communication. Individual computers run client operating systems, while network systems create the software infrastructure for wireless, local and wide area networks to function. Basic Operating Features Network operating systems support the basic underlying operating features of networks. These include support for processors and the various protocols that allow computers to share data. Many network operating systems can detect hardware within the system to allow for asset discovery within the network. Also, network operating systems support the processing of other software applications that run on both individual computers and within the network. S

issues of IT Managers

  Managing a corporate network is becoming harder as it becomes larger and more complex. ii. Network management, it includes not only components that transport information in the network, but also systems that generate traffic in the network. iii. The systems could be hosts, database servers, file servers, or mail servers. In the client-server environment, network control is no longer centralized, but distributed. iv. Computer and telecommunication networks are merging fast into converged network with common modes and media of transportation and distribution. As in the case of broadband networks, the IT manager needs to maintain both types of networks. v. Thus, the data communications manager functions and telecommunication manager functions have been merged to that of the IT manager. vi. With the explosion of information storage and transfer in the modern information era, management of information is also the responsibility of the IT manager, with the title of CIO, Chief Information O

how is configuring wireless security on your router

  When it comes to having a wireless network at your home or business, having wireless security is essential. Having good wireless security can make your wireless network less susceptible to hackers and can make connecting to the network difficult for those who you do not want to have access. Regardless of your wireless router, configuring wireless security on your router merely requires going to the correct section of the administration control panel. Step 1 Type your router's administration control panel address into Internet Explorer. For Linksys/Cisco routers, the address is 192.168.1.1. For D-Link and Netgear routers, the address is either 192.168.0.1 or 192.168.1.1. For other routers the address may be 192.168.1.1, 192.168.0.1 or 192.168.2.1. If none of these work for you, consult your router's user manual. Step 2 Type in your user name and password for the administration control panel of your router, and click "OK." For Linksys/Cisco routers, the default user n