Role of ARP,DHCP,ICMP,SNMP, and DNS Services in Network Communication (Essay Sample)
ARP is the direction determined concord used to show the relationships among the IP and MAC directions. For instance, if the IP node knows the direction but doesn't know the MAC address, it is known through the ARP. DHCP is used to give IP addresses to more than one node. The connection between the existing and new nodes connects automatically. ICMP is used to control tasks. Two pcs are connected using the ICMP command. (ANBARASAN, 2017). Through the echo request, if answered by the corresponding pc, it is known to be there. SNMP this service is used to take and arrange data concerning a particular device using IP to alter its peculiarity. Therefore tracking any information is possible. In part, DNS is the service that connects the human being to the internet through the computer's use of domains and IP addresses.source..
Advanced Security System
Week 4 Essay Questions
1 Role of ARP, DHCP, ICMP, SNMP, and DNS services in network communication.
ARP is the direction determined concord used to show the relationships among the IP and MAC directions. For instance, if the IP node knows the direction but doesn't know the MAC address, it is known through the ARP. DHCP is used to give IP addresses to more than one node. The connection between the existing and new nodes connect automatically. ICMP is used to control tasks. Two pcs are connected using the ICMP command. (ANBARASAN, 2017). Through the echo request, if answered by the corresponding pc, it is known to be there. SNMP this service is used to take and arrange data concerning a particular device using IP to alter its peculiarity. Therefore tracking any information is possible. In part, DNS is the service that connects the human being to the internet through the computer's use of domains and IP addresses.
2 Meaning of Bastion host, DMZ, dual-homed firewall, screened subnet roles in blockade architectonics.
A bastion host is a specific computer on a web with the motive of knowing and defending the computer against attackers. For instance, the proxy server is eliminated, remaining with one application that minimizes the hacker's threat. DMZ is the connection between a firm and the web, mostly to add security to the blockade. In that, the given is exposed, but a little is hidden in the DMZ. Dual –homed blockade. This Ethernet is constructed around the main computer and the host. In between, there are strong interfaces. Also, it has the ability to know the IP address of linked computers. Hence it is connected to the web and the inside network. Mostly the system of the networks that are on the inside can link with those that are outside. Therefore safeguarding the computer against the hacker by enhancing security blockade. The screened host is only attached to the blockade's internal web, unlike the dual-homed; hence, the other is prevented from accessing the proxy servers by using a filter. A screened subnet uses screening rooters to separate the inside from the outside web using the border. More so, it acts as a barrier. (Pandey, and Saini 2016).
3 Four main tunneling protocols for providing virtual private web access for remote users and corporate web.
They include the following: PPTP, the VPN is the first to be developed hence being one of the oldest in modern technology. It operates by encrypting data from the pack and distributing them using a channel that it creates on the web connection. Due to its weak security, it is not preferred for safekeeping data.L2TP the VPN combines both the L2TP and IPsec to make data encryption more secure. One encloses the information while the other covers the information making it hard to decrypt. Even it makes it lag compared to its predecessors. SSTP, the VPN is highly secured, making data transportation easy and faster by transporting information through secured sockets channels. The tunnels are secured and make it relatively high to crack when under attack. Lastly, the Open VPN VPN is the best as it uses the open-source code that is checked effectively and often by the security, and more so, it uses the AE 256-bit encryption. Making it hard for the data to be attacked by hostile on the web. (Khan and Gupta, 2013).
1 Suggestions for the improvement of software security.
One can get trained on how to secure the coding process; this will help when there is a need to protect from inside attacks. The action will reduce the time a technician would take before arriving at the scene, and the firewall would be breached. Using the recommended storage for database calls will aid in the protection against SQL attacks by hackers. Hackers tend to use SQL attacks coding commands instead of parameterized. Cleanse the input whereby the one needs to eliminate the XSS and the XSRF cyber-attacks. Hence protection against SQL is enhanced whereby they attack the websites. (Jahan et al. 2017) The use of the integrated source and dynamic application will help secure the data from the hackers and provide the right information about cases of the likelihood of attacks. Integrating powder and reasonable events and mistakes, whereby enhancing the required investigation before the attack using the stem solutions.
2 The database concept of view-based access control, polyinstantiation, data warehousing, and data mining, and online transaction processing
Polyinstantiation; is a computer concept that shows the class of data discovered into objects and has the same identifier. Therefore there is no chance of occurrence of one process affecting the other. Hence the process avoids the other from interfering with another by having the same goals. Data warehousing; this is taking information from various sources that align with the analysis and structure, more it influences the decision process. Majorly it includes sanitizing of information. Data mining; is a process whereby a firm makes the stored information into a more useful form. By this, the com
- A Report on the Payment Card Industry Data Security StandardsDescription: The Payment Card Industry Data Security Standard (PCI DSS) is a recognized set of rules that guides the collection, use and secure storage of information. The Girl Guide is a financial organization which intends to conform to the standards and the IT Department has to come up with the strategy to implement....5 pages/≈1375 words| 3 Sources | APA | IT & Computer Science | Essay |
- Kali LinuxDescription: Kali Linux is a security auditing and penetration testing software developed by Offensive Security Company. The software is Debian based and it is a Linux distribution. Kali Linux was developed to replace BackTrack which had some features which ...4 pages/≈1100 words| 7 Sources | APA | IT & Computer Science | Essay |
- How the Internet Affects the Music IndustryDescription: No one can deny that the Internet has significantly impacted the music business during the last two decades. While the Internet has made music more accessible to the general public (while simultaneously making it more difficult for artists to cash in), it is also a fantastic tool for independent musicians...1 page/≈275 words| 2 Sources | APA | IT & Computer Science | Essay |