In today’s world it is very rare to find a business or an organisation that is not reliant on a computer network of some sort, whether it is a hospital, a school, large bookstore, small shop or even a home business. This sets a challenge for IT professionals around the world, especially with the increased number of network attacks that are happening every day. The challenge is how to keep these networks secure?
What is network security?
Network security to IT professionals doesn’t mean that a network is 100% secure because that is impossible unless you completely disconnect your network from the outside world and even that doesn’t protect the network from internal attacks or the physical theft of the computer and the data inside it. The only way to have 100% security is to power off all computers and for businesses these days that isn’t an effective decision. Continue reading Uses of free Unix-based Security Tools to Develope Secure Systems – Part 1
Coaxial cable – was used on networks in the olden days, however today’s networks moved on to faster and tougher cables. This is not to say that coaxial cables will no longer be encountered as some networks that used this type of cable might still do so because their environment is still the same and so they feel that there’s no need to upgrade.
Image via Wikipedia
The above figure shows an example of a coaxial cable, which looks similar to the cables used for TVs.
There are two types of this cable Thick and Thin coaxial, although the two are no longer popular; out of the two thin coaxial is more popular. It’s about 0.25 inches in diameter and has a max length of about 185 meters and they use the BNC connector.
Continue reading 3. Media and Connectors Part 2
68A and 568B Standard
The Telecommunications Industry Association (TIA) and the Electronics Industry Association (EIA) have designed a wiring standard called 568A and 568B, which is used for the RJ-45 connectors on a UTP/STP cable. The number 568 refers to the order the wires within the Cat 5, Cat 3 and Cat 6 cables are terminated and attached to the connector. Both standards (568A and 568B) are the same in terms of the signal with a slight difference in the order the pins are terminated. They’re both used for patch cords in Ethernet networks. To be able to make these cables (in case you have to) you need to know which order to connect the wires to the connector. The following figure illustrates this, the pin numbers are read left to right while the connector tab facing down.
By clicking on the networking menu above you’ll find a page that aims at providing tutorials on various networking topics. At the moment I’m trying to provide tutorials that help those preparing for any of the certifications such as CompTIA Network + to reinforce the materials they’ve studied. The topics I’m planning to discuss are as follows:
- Network +
- Security +
- CCNA Networking
- CCNA Security
After finishing with these I’ll then focus on the main topic of the site, which is Information Security and can be tracked from this home page (front main page of the site). Some of the topics I’m planning on discussing here are:
- Information Security principles (cryptography)
- Network Security
- Systems Security
- Applications Security
- Intrusion Detection
So please be patient with me as amongst other things (looking for employment, family life, etc) it took me a while to get familiar with the interface to set this site up because it is my first site or blog.
Administrators must have solid knowledge of the logical standards and the physical media used on today’s networks.
Logical standards define the characteristics such as the configuration of the network, the speed at which they operate and how devices access the network.
Physical media refers to the cabling and connectors used to create the network.
The above two define and dictate the maximum distance between devices, the capability of media to withstand outside interference and even how much space is required in wiring closets and equipment cabinets. Choosing the correct media is very important because they form the foundation for the entire network.
When working with any media, you must be aware of the factors that influence its suitability for a given network implementation.
Interference, transmission speed, media length and installation and repair are some of the most common factors that affect media.
Media Interference (EMI) – common sources of EMI (electromagnetic Interference) are:
- Computer Monitors.
- Fluorescent light fixtures.
- Basically anything that creates an electromagnetic field.
Continue reading 2. Media and Connectors
A network can be any connected devices. It can be as small as two computers or as complex as a multisite network such as a telecommunications infrastructure that contains 100s if not 1000s of computers that are connected together.
The common uses of a network are:
- Communication – video conferencing, email, chats, learning, etc…
- Sharing Hardware – printers, scanners, storage…
- Sharing data – files.
- Sharing applications – Microsoft word, spread sheet, specialised software, etc.
- Data Backup and retrieval
1.1 Types of Networks
1.1.1 LANs and WANs
They types of network used are dictated by the number of locations they span.
LANs – Local Area Networks are restricted to a single location (building, office, school).
WANs – Wide Area Networks spread over multiple geographic locations. They are slower than LANs and more expensive and they tend to use different technologies to connect LANs together to create an internetwork.
Continue reading 1. Introduction to Computer Networks
Information systems have become very important in every business not only that, today you can hardly find a business, organisation or even home businesses that doesn’t have a computer network of some sort. These businesses have become very dependent on these systems for their daily day-to-day operations. Thus the effectiveness of organisation’s business performance has become greatly dependant on the availability, reliability and security of these computers and the networks they’re connected to.
Continue reading Introduction