• Home /Exam Details (QP Included) / Main Exam / Optional Subject-Medical Group / Computer Science / Computer Science Notes – On – Network Safeguarding – For W.B.C.S. Examination.
  • Computer Science Notes – On – Network Safeguarding – For W.B.C.S. Examination.
    Posted on October 24th, 2019 in Computer Science
    Tags: , ,

    Computer Science Notes – On – Network Safeguarding – For W.B.C.S. Examination.

    কম্পিউটার সায়েন্স নোট – নেটওয়ার্ক সুরক্ষা – WBCS পরীক্ষা।

    Network devices transport communications required for data and services. These devices include routers, firewalls, switches, servers, and so on. Network devices are perfect targets for cyber criminals.Continue Reading Computer Science Notes – On – Network Safeguarding – For W.B.C.S. Examination.

    Several methods to protect various network devices are as follows:

    • Routers:
      Routers communicate with each other to recognize the most ideal way to convey traffic to various networks. Routers use routing protocols to make routing choices. Routers can also integrate other services. These operations make routers prime targets. The primary threat to network routers are hacking and remote access, attacks against routing protocols. A few strategies to ensure routers are advanced configuration settings, use of secure routing protocols with authentication, and so forth.
    • Switches:
      The main threat to network switches are theft, hacking, attacks against network protocols. Implementation of port security is required to protect network switches. Port security restricts the number of valid MAC addresses permitted on a port. The switch enables access to devices with authorized MAC (Media Access Control) addresses while it declines other MAC addresses. MAC address is an extraordinary identifier given to a network interface controller.
    • Firewalls:
      A firewall filters unapproved or potentially risky traffic from entering the network. Firewall provides basic traffic filtering abilities using access control lists (ACL). Administrators use ACLs to stop traffic or grant just determined traffic on their systems. ACL is a consecutive list of permit or deny statements. Firewalls are a common target of hackers to defeat the firewall protections. The main threat to firewalls is attacks against access control lists. Secure remote access, authentication, and appropriate system updates as needed to protect firewalls.

    For Guidance of WBCS (Exe.) Etc. Preliminary , Main Exam and Interview, Study Mat, Mock Test, Guided by WBCS Gr A Officers , Online and Classroom, Call 9674493673, or mail us at – mailus@wbcsmadeeasy.in
    Visit our you tube channel WBCSMadeEasy™ You tube Channel
    Please subscribe here to get all future updates on this post/page/category/website
    "WBCS

    Leave a Reply

    Your email address will not be published. Required fields are marked *

    This site uses Akismet to reduce spam. Learn how your comment data is processed.

     WBCS Foundation Course Classroom Online 2024 2025 WBCS Preliminary Exam Mock Test WBCS Main Exam Mock Test WBCS Main Language Bengali English Nepali Hindi Descriptive Paper