StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

A Network Security System - Essay Example

Cite this document
Summary
This paper 'A Network Security System' tells us that in computing, a firewall refers to a network security system that controls the incoming and outgoing network traffic based on an applied rule set. It establishes a barrier between a trusted, secure internal network, with another network, assumed not secure and not trusted. …
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER98.9% of users find it useful
A Network Security System
Read Text Preview

Extract of sample "A Network Security System"

Additionally, Netstat can be used to show sockets that are listening to your system.  Netstat can be used to help determine if there are unauthorized outlets open to or from your system, which could indicate malicious activity being directed towards your system.

System CT is a command-line utility that is used to control various aspects of services on a system (start or stop, run at startup).  It is used to introspect the state of the system and service manager.

Major options used

System ctlg

-t, --type= The argument is usually a comma-separated list of unit types such as service and socket

--state= a comma-separated list should be used as the argument for unit LOAD, SUB, or ACTIVE status. The specified states are shown when the units are listed.

-p,--property= Used when teaching unit/manager properties with show command, limit the display to certain features as specified by the argument

-a,--all  Used when listing groups, showing all loaded units and inactive units regardless of their state. Also shows all properties regardless of whether they are set or not. The list group files command is often used in listing all units.

--runtime: used with enable, disable or edit, it makes changes temporarily and are lost on reboot

 

Netstat options

-a = used to display active TCP connections with the listening state and UDP ports being that is being listened.

-b = shows the process actual file name

-e = used as a switch to display statistics about the network connection.

-f = makes the command display the fully qualified domain name (FQDN), and foreign IP addresses are applicable.

-n = used to prevent Netstat from attempting to determine hostnames for external IP addresses.

-o = used for troubleshooting tasks and displays the PID associated with any displayed connection.

-s = used to show detailed statistics by protocol.

-t + shows the current TCP Chimney offload state in the place of the displayed TCP state.

-x = shows all network direct listeners, connections, and endpoints.

Firewall options

The firewall uses many options specifically for certain tasks. There are options for administrator accounts, anti-virus, audit, downloads, DNS, amongst others.

 

These commands can be used on various operating systems and can be applied to any network issues, and system administrators and network and internet administrators can use them.

In troubleshooting common system errors, these commands are easier to use and understand.

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“LAB #9 Essay Example | Topics and Well Written Essays - 500 words”, n.d.)
LAB #9 Essay Example | Topics and Well Written Essays - 500 words. Retrieved from https://studentshare.org/information-technology/1685686-lab-9
(LAB #9 Essay Example | Topics and Well Written Essays - 500 Words)
LAB #9 Essay Example | Topics and Well Written Essays - 500 Words. https://studentshare.org/information-technology/1685686-lab-9.
“LAB #9 Essay Example | Topics and Well Written Essays - 500 Words”, n.d. https://studentshare.org/information-technology/1685686-lab-9.
  • Cited: 0 times

CHECK THESE SAMPLES OF A Network Security System

Network Security

This research paper "network security" could perfectly demonstrate that during the last few decades several technologies have emerged additionally throughout the whole globe and networking technology is certainly the most amazing achievement in this era.... In this regard, network security comprises the measures a company can take to protect its computer network.... In this regard, network security comprises the measures a company can take to protect its computer network, and it is a prime concern for every company that uses computers....
13 Pages (3250 words) Research Paper

Computer Network Security System

The need for computer network security system raised when a couple of incidents occurred in the USA.... network security is essential component as now-a-days information is computers are connected worldwide.... he advent of world wide web has complicated the computer network security as the computer network are linked worldwide and it would a daunting task to predict the assault made on your computer system.... In the decade, a 25-year-old hacker named Kevin Mitnick began tapping into the e-mail system used by computer security managers at both Digital Equipment Corp....
5 Pages (1250 words) Essay

A Network Intrusion Detection System and Security Attacks

Intrusion detection systems (IDS) can effectively provide network security by preventing, detecting, and possibly fighting attacks.... The paper "a network Intrusion Detection System and Security Attacks" gives detailed information about the mark IDS technique, a system based interruption recognition framework.... a network Intrusion Detection System monitors networks for intrusions and attacks reporting any anomalies to the administrator.... It tracks bundles streaming over the whole system by indiscriminate operation mode....
7 Pages (1750 words) Assignment

Network Security Attack Methodologies

Thus, the security system attackers and hackers are now using the information obtained after penetrating through the security systems to attack the target individuals or organizations and defraud them.... This essay "network security Attack Methodologies" is about the current computer network security systems which are faced by numerous attacks, thus creating the need for robust means of protecting the systems against threats and potential attacks....
7 Pages (1750 words) Essay

Network Security-Intrusion Detection System

The essay "network security-Intrusion Detection System" will try to look at the two processes Host-based and Network-based Intrusion Detection Systems, how effective these two approaches for the Intrusion Detection system for any organization and will also cover various guidelines for Intrusion Detection Systems deployment, operation, and maintenance.... It is basically a type of security management system which gathers and analyzes information from various areas within a computer or a network to identify possible security breaches....
16 Pages (4000 words) Essay

Network Security System

This case study "network security system" evaluates the network topology in the institution in terms of efficiency and safety and provides the best alternative or option for maintaining the security apparatus.... It specifically outlines the installation of a Perimeter network security system.... It specifically outlines the installation of a Perimeter network security system based on Cisco devices.... The security system will entail various components installed to monitor and control the traffic flow....
8 Pages (2000 words) Case Study

System and Network Security

The author of the paper "System and network security" will begin with the statement that the world is becoming extensively interconnected with the ever-increasing adoption of the internet and networking technologies in almost all industries in the modern world.... Consequently, network security has become a major concern that has been accorded great significance.... network security is tackled in a multifaceted manner, which seeks to curb network vulnerabilities arising from internet architecture and security methods that are prone to manipulation as well as end-user interaction with internet services in which data processing methods can be compromised (Fry & Nystrom, 2009)....
13 Pages (3250 words) Report

The Use of Social Media and Community

he hardware components that make a network are the hosts or servers, clients, and circuits.... By the 1970s, many telecommunication industries had already been interested in using computer networks with the x25 being the first telecommunication network (Peterson and Davie, 2011).... However, the computer industry approach was slightly different with the development of the Local Area network (LAN).... computer network is made up of a collection of several computers, printers, as well other equipment that gets connected to get the computers to communicate together....
14 Pages (3500 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us