Posts

Showing posts from March 25, 2018

Network Topology

Image
Types of Network Topology Network Topology is the schematic description of a network arrangement, connecting various nodes(sender and receiver) through lines of connection. BUS Topology Bus topology is a network type in which every computer and network device is connected to single cable. When it has exactly two endpoints, then it is called  Linear Bus topology . Features of Bus Topology It transmits data only in one direction. Every device is connected to a single cable Advantages of Bus Topology It is cost effective. Cable required is least compared to other network topology. Used in small networks. It is easy to understand. Easy to expand joining two cables together. Disadvantages of Bus Topology Cables fails then whole network fails. If network traffic is heavy or nodes are more the performance of the network decreases. Cable has a limited length. It is slower than the ring topology. RING Topology It is called ring topology because it form

Network Types

Image
One way to categorize the different types of computer network designs is by their scope or scale. For historical reasons, the networking industry refers to nearly every type of design as some kind of  area network . Common types of area networks are: LAN -  Local Area Network WAN - Wide Area Network WLAN -  Wireless Local Area Network MAN - Metropolitan Area Network SAN - Storage Area Network, System Area Network, Server Area Network, or sometimes Small Area Network CAN - Campus Area Network, Controller Area Network, or sometimes Cluster Area Network PAN - Personal Area Network LAN and WAN are the two primary and best-known categories of area networks, while the others have emerged with technology advances Note that network types differ from  network topologies  (such as bus, ring and star). (See also -  Introduction to Network Topologies .) LAN: Local Area Network A  LAN  connects network devices over a relatively short distance. A networked office building,

What is a Network?

Image
What is a Network? A network consists of two or more computers that are linked in order to share resources (such as printers and CDs), exchange files, or allow electronic communications. The computers on a network may be linked through cables, telephone lines, radio waves, satellites, or infrared light beams. Two very common types of networks include: Local Area Network (LAN) Wide Area Network (WAN) You may also see references to a Metropolitan Area Networks (MAN), a Wireless LAN (WLAN), or a Wireless WAN (WWAN). Local Area Network A Local Area Network (LAN) is a network that is confined to a relatively small area. It is generally limited to a geographic area such as a writing lab, school, or building. Computers connected to a network are broadly categorized as servers or workstations. Servers are generally not used by humans directly, but rather run continuously to provide "services" to the other computers (and their human users) on the network. Services

Types of Cyber Attacks

Image
Types of Cyber Attacks There are many methods of Cyber Attacks from malware injection to phishing to social engineering to the internal stealing of data. Other advanced but common forms are  DDoS Attacks ,  Brute Force attacks , hacking, holding a computer system (or a website) for ransom using direct hack or  Ransomware . Some of them have been listed below: Gaining, or attempting to gain, unauthorized access to a computer system or its data. Disruption or denial of service attacks (DDoS) Hacking a website or mal-facing the site Virus or malware installation Unauthorized use of a computer for processing of data Inappropriate use of computers or applications by employees of a company, in a way that it harms the company. The last one – the inappropriate use of computers or apps by employees – could be deliberate or due to lack of knowledge. One has to figure out the real reason why an employee, for example, tried to enter wrong data or accesses a particular data rec

Types Of Attacks

Image
Types Of Attacks *Active Attack * Passive Attack

Grey Hat Hackers

Image
Grey Hat Hackers As in life, there are grey areas that are neither black nor white. Grey hat hackers are a blend of both black hat and white hat activities. Often, grey hat hackers will look for  vulnerabilities  in a system without the owner’s permission or knowledge. If issues are found, they will report them to the owner, sometimes requesting a small fee to fix the issue. If the owner does not respond or comply, then sometimes the hackers will post the newly found exploit online for the world to see. These types of hackers are not inherently malicious with their intentions; they’re just looking to get something out of their discoveries for themselves. Usually, grey hat hackers will not exploit the found vulnerabilities. However, this type of hacking is still considered illegal because the hacker did not receive permission from the owner prior to attempting to attack the system. Although the word hacker tends to evoke negative connotations when referred to, it is important

White Hat Hackers

Image
White Hat Hackers White hat hackers choose to use their powers for good rather than evil. Also known as “ethical hackers,” white hat hackers can sometimes be paid employees or contractors working for companies as security specialists that attempt to find security holes via hacking.White hat hackers employ the same methods of hacking as black hats, with one exception- they do it with permission from the owner of the system first, which makes the process completely legal. White hat hackers perform penetration testing, test in-place security systems and perform vulnerability assessments for companies. There are even courses, training, conferences and certifications for ethical hacking.

Black Hat Hackers

Image
                                  Black Hat Hackers Like all hackers, black hat hackers usually have extensive knowledge about breaking into computer networks and bypassing security protocols. They are also responsible for writing  malware , which is a method used to gain access to these systems. Their primary motivation is usually for personal or financial gain, but they can also be involved in cyber espionage, protest or perhaps are just addicted to the thrill of cybercrime. Black hat hackers can range from amateurs getting their feet wet by spreading malware, to experienced hackers that aim to steal data, specifically financial information, personal information and login credentials. Not only do black hat hackers seek to steal data, they also seek to modify or destroy data as well.

What is Hacking?

Image
Computer hacking refers to the practice of modifying or altering computer software and hardware to accomplish a goal that is considered to be outside of the creator’s original objective. Those individuals who engage in computer hacking activities are typically referred to as “hackers.” The majority of hackers possess an advanced understanding of computer technology. The typical computer hacker will possess an expert level in a particular computer program and will have advanced abilities in regards to computer programming.   Unlike the majority of computer crimes which are regarded as clear cut in terms of legality issues, computer hacking is somewhat ambiguous and difficult to define. In all forms, however, computer hacking will involve some degree of infringement on the privacy of others or the damaging of a computer-based property such as web pages, software, or files. As a result of this loaded definition, the impact of computer hacking will vary from a simple invasive p

Types Of Hacker

Image
Types Of  Hacker                             * Black Hat Hackers                             * Grey Hat Hackers                             * White Hat Hackers