Unit 6
Unit 6
Unit 6
Whenever computers share resources with client machines they are considered servers.
Server management is the process of monitoring and maintaining servers to operate at peak performance.
Server management also holds the management of hardware, software, security, and backups.
While a traditional, physical server is typically a single server running on a single machine; a virtual server can allow
Virtual servers—also known as virtual machines—can help increase efficiency by enabling more to be done with less
hardware.
They can be more complex to manage than physical servers, but the same server management principles apply to both.
Anyone who manages servers needs to be familiar with a wide range of IT topics like physical vs. virtual servers to
Server management basics include management of hardware, software, security, and backups.
The following are important elements of effective server management any IT strategy or software solution should help
address:
Hardware Topic 2: user management
User management describes the ability for administrators to manage user access to
User management solves the problem of managing user access to various resources.
For example, the marketing team generally requires access to different resources than
Further, an employee on the marketing likely doesn’t need access to internal financial
systems and vice versa, a finance employee isn’t requiring access to Sales force or
Market.
What is a Firewall?
A firewall can be defined as a special type of network security device or a software program that monitors and filters incoming and
It acts as a barrier between internal private networks and external sources (such as the public Internet).
The primary purpose of a firewall is to allow non-threatening traffic and prevent malicious or unwanted data traffic for protecting the
A firewall is a cyber security tool that filters network traffic and helps users block malicious software from accessing the Internet in infected
computers.
Open Access
This means that it is accepting every kind of connection that comes through someone.
In this case, it is not possible to detect threats or attacks coming through our network.
Without a firewall, we make our devices vulnerable to malicious users and other unwanted sources.
Lost or Comprised Data
This means that anyone can access our device and have complete control over it, including the network.
In this case, cybercriminals can easily delete our data or use our personal information for their benefit.
Network Crashes
In the absence of a firewall, anyone could access our network and shut it down.
It may lead us to invest our valuable time and money to get our network working again.
Therefore, it is essential to use firewalls and keep our network, computer, and data safe and secure from unwanted sources.
It then filters the traffic and prevents any such traffic coming from unreliable or suspicious sources.
Typically, firewalls intercept network traffic at a computer's entry point, known as a port.
Firewalls perform this task by allowing or blocking specific data packets (units of communication transferred over a digital network) based
What is antivirus?
Antivirus is an application or software which provides security from the malicious software coming from the internet. An antivirus chases
Detection
Identification
Removal
Antivirus deals with both external threats and internal threats. It is implemented only software not in hardware also.
Firewalls and anti-viruses are systems to protect devices from viruses and other types of Trojans, but there are significant
Based on the vulnerabilities, the main differences between firewalls and anti-viruses are tabulated below:
Types of Firewall-
There are mainly three types of firewalls, such as software firewalls, hardware firewalls, or both, depending on their structure.
Each type of firewall has different functionality but the same purpose.
A hardware firewall is a physical device that attaches between a computer network and a gateway. For example- a broadband
router.
A hardware firewall is sometimes referred to as an Appliance Firewall. On the other hand, a software firewall is a simple program
installed on a computer that works through port numbers and other installed software. This type of firewall is also called a Host
Firewall.
Besides, there are many other types of firewalls depending on their features and the level of security they provide. The following
o Packet-filtering Firewalls
o Circuit-level Gateways
o Proxy Firewall
Packet-filtering Firewalls
It acts like a management program that monitors network traffic and filters incoming packets based on configured security
rules.
These firewalls are designed to block network traffic IP protocols, an IP address, and a port number if a data packet does
not match the established rule-set.
While packet-filtering firewalls can be considered a fast solution without many resource requirements, they also have
some limitations.
Because these types of firewalls do not prevent web-based attacks, they are not the safest.
Circuit-level Gateways
Circuit-level gateways are another simplified type of firewall that can be easily configured to allow or block traffic
without consuming significant computing resources.
These types of firewalls typically operate at the session-level of the OSI model by verifying TCP (Transmission
Control Protocol) connections and sessions.
Circuit-level gateways are designed to ensure that the established sessions are protected.
Like packet-filtering firewalls, these firewalls do not check for actual data, although they inspect information about
transactions.
Therefore, if a data contains malware, but follows the correct TCP connection, it will pass through the gateway.
That is why circuit-level gateways are not considered safe enough to protect our systems.
Proxy firewalls operate at the application layer to filter incoming traffic between your network and the traffic source—hence, the name
“application-level gateway.”
These firewalls are delivered via a cloud-based solution or another proxy device. Rather than letting traffic connect directly, the proxy
firewall first establishes a connection to the source of the traffic and inspects the incoming data packet.
Wireless network security primarily protects a wireless network from unauthorized and malicious access attempts.
Typically, wireless network security is delivered through wireless devices (usually a wireless router/switch) that encrypts and secures
Even if the wireless network security is compromised, the hacker is not able to view the content of the traffic/packet in transit.
Moreover, wireless intrusion detection and prevention systems also enable protection of a wireless network by alerting the wireless
Some of the common algorithms and standards to ensure wireless network security are Wired Equivalent Policy (WEP) and Wireless
In addition to a LAN, there are a few other types of common wireless networks: personal-area network (PAN), metropolitan-area network
LAN
A local-area network is a computer network that exists at a single site, such as an office building. It can be used to connect a variety of
components, such as computers, printers, and data storage devices. LANs consist of components like switches, access points, routers, firewalls,
and Ethernet cables to tie it all together. Wi-Fi is the most commonly known wireless LAN.
PAN
A personal-area network consists of a network centralized around the devices of a single person in a single location. A PAN could have
computers, phones, video game consoles, or other peripheral devices. They are common inside homes and small office buildings. Bluetooth is the
MAN
A metropolitan-area network is a computer network that spans across a city, small geographical area, or business or college campus. One
feature that differentiates a MAN from a LAN is its size. A LAN usually consists of a solitary building or area. A MAN can cover several square
Large companies, for example, may use a MAN if they have a spacious campus and need to manage key components, such as HVAC and
electrical systems.
WAN
A wide-area network covers a very large area, like an entire city, state, or country. In fact, the internet is a WAN. Like the internet, a WAN can
contain smaller networks, including LANs or MANs. Cellular services are the most commonly known wireless WANs.
1. Clients: What we tend to think of as the end user devices are typically called ‘clients’. As the reach of Wi-Fi has expanded, a variety of
devices may be using Wi-Fi to connect the network, including phones, tablets, laptops, desktops, and more. This gives users the ability to
move about the area without sacrificing their bridge to the network.
2. Access Point (AP): An access point (AP) consists of a Wi-Fi that is advertising a network name (known as a Service Set Identifier, or
SSID). Users who connect to this network will typically find their traffic bridged to local-area network (LAN) wired network (like Ethernet)
802.11a
This original amendment added support for the 5 GHz band, allowing transmission up to 54 megabits of data per second. The 802.11a
standard makes use of orthogonal frequency-division multiplexing (OFDM). It splits the radio signal into sub-signals before they get to a receiver.
802.11a is an older standard and has been largely replaced by newer technology.
802.11b
802.11b added faster rates in the 2.4GHz band to the original standard. It can pass up to 11 megabits of data in a second. It uses
complementary code keying (CCK) modulation to achieve better speeds. 802.11b is an older standard and has been largely replaced by newer
technology.
802.11g
802.11g standardized the use of OFDM technology used in 802.11a in the 2.4GHz band. It was backwards compatible with both 802.11 and
802.11b. 802.11g is an older standard and has been largely replaced by newer technology.
802.11n
Once the most popular standard 802.11n was the first time a unified specification covered both the 2.4GHz and 5GHz bands. This protocol
offers better speed when compared to those that came before it by leveraging the idea of transmitting using multiple antennas simultaneously
(usually called Multiple In Multiple Out or MIMO technology). 802.11n is an older standard, but some older devices may still be found in use.
802.11ac
802.11ac was only specified for the 5GHz band. It built upon the mechanisms introduced in 802.11n. While not as revolutionary as 802.11n
was, it still extended speeds and capabilities in the 5GHz band. Most devices currently out in the wild are likely 802.11ac devices.
802.11ac technology was released in two main groups, usually called ‘waves’. The primary difference is that Wave 2 devices have a few more
Advantages:
2. Easy to setup:
It provides global reach by providing networking in places such as rural areas, battlefield, etc… where wiring is not feasible.
4. Flexibility:
5. Cost-effectiveness:
Since it is easy to install and doesn’t require cables, wireless network is relatively cheaper.
Disadvantages:
2. Unreliability
3. More open to interference.
1. Satellite system
3. Wi-Fi
4. Paging system
denial of service attacks - where the intruder floods the network with messages affecting the availability of the network resources
spoofing and session hijacking - where the attacker gains access to network data and resources by assuming the identity of a valid
user
Eavesdropping - where unauthorized third-parties intercept the data being transmitted over the secure network.
1. wireless NIC - it works within the computer device and provides wireless connectivity
2. Access Point - is a device, such as a wireless router, that allows wireless devices to connect to a network.
4. Repeaters - a repeater is an electronic device that receives a signal and re transmits it. Repeaters are used to extend
5. Antennae