Skip to main content

Computer network


A computer network is made up of two or more computers or other intelligent devices connected by communication media (eg, cable or wireless media) to achieve communication. The network computer is used in many aspects of our lives and its applications are growing. Computer networks can be found, for example, at universities, secondary schools and colleges of higher education, while in the business community networks are networks at geographical locations. Government offices use local and state computers, such as military organizations, medical facilities and the internet. The
frequency of computer network attacks and the subsequent burning of news reporting has alerted the public to the vulnerability of computer networks and the risk of not only using them, but also of being dependent on them. Moreover, such activities and reports put society in a state of constant fear that always anticipate the next big and what is involved, and force people to focus on security issues. The biggest fear among professionals, however, is a public with a hundred percent of the total dependence on computers and computer networks being insensitive, having reached a level where they are almost immune, where they appreciated such fears. If this happens, we are professionals and society in general, as the creators of these networks, fail to secure their security. Firewalls are often the strongest defense points on a computer network. They find quite a few attacks, but most attacks know that properly configured firewalls are harder to penetrate, so they look for easier victims. This can take the form of DSL lines in laboratories or small offices that are not firewalls, modems and other remote access systems, Private Branch Exchange (PBX) PBXs, home computers and laptops that are sometimes connected to the corporate network, servers and other internet-based servers, e-mail servers (to perform attacks such as spear phishing) and domain name service (DNS) server accessible from the Internet. All of these usually offer less resistance to attackers than firewalls that offer. That is why it is important that the security of these things is as strong as the firewall.

Comments

Popular posts from this blog

How to set up a passkey for your Apple account

  Passkeys are a new and more secure way to sign in to your Apple account. They are similar to passwords, but they are stored on your device and are not shared with Apple. This makes them more resistant to phishing attacks and other security threats. Passkeys are currently not available for Apple accounts. However, they are expected to be available in a future software update. Set up a passkey for Apple account When passkeys are available, you will be able to set up a passkey for your Apple account by following these steps: 1.     Go to the Settings app on your Apple device. 2.     Tap on your name at the top of the screen. 3.     Tap on "Password & Security." 4.     Tap on "Passkeys." 5.     Tap on "Set Up Passkey." 6.     Follow the on-screen instructions to create a passkey. Once you have created a passkey, you will be able to use it to sign in to your Apple account on...

Requirement for connecting to the Internet

The basic requirements for connecting to the Internet are a computer device. In addition,   you need the following things, to connect to the Internet: (i)           Modem (ii)          Telephone wire (iii)         Internet Service Provider (ISP) (iv)        Internet connection (v)         Web-browsing software Modem (modulator-demodulator) A modem is a device that enables a computer to transmit data over telephone or cable lines. Computer stored information digitally; information transmitted over telephone lines in the form of analog waves. A modem converts between these two forms. A modem can be either internal or external. The internal modem is attached to a slot on the motherboard. The external modem can be placed anywhere outside the system unit and connected to the ...

Approaches of comparative education

  Apollo (1986) identified eight approaches to the study of Comparative Education. They are: 1. Problem Approach or Thematic approach 2. Case study approach 3. Area study approach 4. Historical approach 5. Descriptive approach  6. Philosophical approach  7. International approach and 8.  Gastronomic approach 1. Problem approach or thematic approach —   In this approach the investigator will first of all identify a particular educational problem in his own country. Then, he will begin to look for another country that has the same problem . —   The researcher will also study the education problem of another country in relation to their culture. The researcher will not only study the educational problem of another country but he will also examine the solution applied to such problem by the affected country . 2. Case study approach   —   In this approach, an education comparativist from Nigeria can go to Iraq to study the...