显示标签为“cisco switch”的博文。显示所有博文
显示标签为“cisco switch”的博文。显示所有博文

2012年4月10日星期二

Network Security: Types of Network Threats and Attacks

Where there is a network, wired or cisco wireless; there are threats. Some people are easily put off setting up a home or office network with the fear that anything stored in their hard drive could be accessed by neighbors or hackers. The types of potential threats to network security are always evolving.

If the cisco security of the network is compromised, there could be serious consequences, such as loss of privacy, and theft of information.

When it comes to network security, the main concern is making sure that any wireless connections are protected against unauthorized access.

Most business transactions are done over the Internet, In addition, the rise of mobile commerce and wireless networks demands that security solutions become flawlessly integrated, more transparent, and more flexible.

The Internet has grown over the years and still growing, this is due to the flexibility of its design. Network attack tools and methods have evolved. Back in the days when a hacker had to have sophisticated computer, programming, and networking knowledge to make use of rudimentary tools and basic attacks. Nowadays, network hackers, methods and tools has improved tremendously, hackers no longer required the same level of sophisticated knowledge. People who previously would not have participated in computer crime are now able to do so.


Types of Network Threats and Attacks
As the types of threats, attacks, and exploits grow, various terms have been used to describe the individuals involved. Some of the most common terms are as follows:
i. White hat- These are network attackers who looks for vulnerabilities in systems or networks and then reports these vulnerabilities to the owners of the system so that they can be fixed. They are ethically opposed to the abuse of computer systems. A white hat generally focuses on securing IT systems.

ii. Hacker- This is a general term that is used to describe a computer programming expert. These are normally used in a negative way to describe an individual that attempts to gain unauthorized access to network resources with malicious intent.

iii. Black hat or Cracker- The opposite of White Hat, this term is used to describe those individuals who use their knowledge of computer systems and progremming skills to break into systems or networks that they are not authorized to use, this of course is done usually for personal or financial gain.

iv. Phreaker- Thisterms is often used to describe an individual who manipulates the phone network in a bid to perform a function that is not allowed. The phreaker breaks into the phone network, usually through a payphone, to make free or illegal long distance calls.

v.Spammer- This is often used cisco to describe the persons who sends large quantities of unsolicited e-mail messages. Spammers often use viruses to take control of home computers and use them to send out their bulk messages.

Vi.Phisher- Uses e-mail or other means to trick others into providing sensitive information, such as credit card numbers or passwords. A phisher masquerades as a trusted party that would have a legitimate need for the sensitive information.



read more:cisco network hardware

2011年6月21日星期二

Router? Switch? Be Clear the Difference Between Router and Switch.

When someone talk about wholesale Cisco router and switch with me, I’m very confused about this. Router Switch? What are they? What are they used for? Oh, My Lady Gaga, complicated.
However, after I have found some details of switch router, it seems a little interesting. Because both router and switch are tightly related to network, to internet. If you have PCs, if you need to email to somebody, or if you want to chat with friends, they are necessarily contained. Haha, eager to get more information of router and switch. I search many details and “the difference between routers cisco and switch” through Google. Now, I’d like share some key info about router and switch.

 
What’s a router-switch? A router is a more sophisticated network device than either a switch or a hub. It is a device that forwards data packets across computer networks, and perform the data "traffic directing" functions on the Internet. On the Internet or on a large corporate network, for example, routers serve as intermediate destinations for network traffic. These routers receive TCP/IP packets, look inside each packet to identify the source and target IP addresses, then forward these packets as needed to ensure the data reaches its final destination. Routers for home networks (often called broadband routers) also can join multiple networks. These routers are designed specifically to join the home (LAN) to the Internet (WAN) for the purpose of Internet connection sharing. In contrast, neither hubs nor switches are capable of joining multiple networks or sharing an Internet connection.
And switch? A network switch or switching hub is a computer networking device that connects network segments. The term commonly refers to a multi-port network bridge that processes and routes data at the data link layer (layer 2) of the OSI model. By paying attention to the traffic that comes across it, it can "learn" where particular addresses are. For example, if it sees traffic from machine A coming in on port 2, it now knows that machine A is connected to that port and that traffic to machine A needs to only be sent to that port and not any of the others.
The two pieces of equipment (router and switch) look so similar and perform some similar functions, but each has its own distinct function to perform on a network. To be simple, switches create a network. Routers connect networks. A router links computers to the Internet, so users can share the connection. A router acts as a dispatcher, choosing the best path for information to travel so it's received quickly.
So what do you need? Buy cisco router or switch? After got these above, you can make sure that which you need. And more information of Cisco sale, you can visit RouterSwitch.com