Network Task1
Network Task1
3A).
IPvoid
IBM X-Force
ABUSE
5A). Network Devices:
Hub: A Hub is a inter connects two or
more work stations into a network,
when a computer is on, any one of
the 8 ports transport data, this is
replicated and send out to the
other network.
Repeater: Repeaters is used for the
regenerate the signals and boost up the
signals
Switch: It is a layer 2 Device, unlike hubs,
its reads' source and destination mac address,
it works based on mac address.
Router: It is a layer 3 Device, its work
based on IP Address, it can make
intelligent decision about how to
choose best path through the
network Router interconnects the
two networks It can maintain the
routing table.
Security Devices:
These are security devices: This are specially
designed to monitor all inbound and out
bound network activity; it works based on the
signature.
Firewall:
Firewalls is a network security device either
hardware/software. It provides the secure
connection between the network. It controls
the incoming and outgoing network. Traffic
based on the set of rules It work based on the
IP address and port numbers.
Can: Firewalls can block the invalid packets
and filters traffic based on a defined set filter.
Can’t: Firewalls unable to block virus and
malicious codes. Firewalls are unable to
prevent attacks by malicious users already
behind the firewalls.
IDS and IPS:
IDS: Intrusion Detection System IDS, A device
that analyze whole pocket both header and
payload for known events When a known
event is detected log message is generated
and detailing the event.
IPS: Intrusion Prevention System IPS, A device
that analyze whole pocket both header and
payload for known events When a known
event is detected the pocket is rejected.
6a).
Types of firewalls:
1. Packet filter router firewalls.
2. Application layer firewalls.
3. State Full firewalls.
4. Proxy firewalls.
7a).
Protocols:
Protocols are rules that governs, how the
devices communicate share information
across a network .
8a).
VPN: is a virtual private network, it allows for
information to be securely, across a public
internet or unsecured network.
Two private networks are not
communicated via public internet unless they
use an IP TUNNEL or VPN.
When one Private network wants to
send a packet to another private network,
the first private network encapsulates the
packet in a protocol layer so that the
packet can travel through the public
network.