Welcome, Guest: Register On Nairaland / LOGIN! / Trending / Recent / NewStats: 3,218,481 members, 8,038,051 topics. Date: Friday, 27 December 2024 at 06:56 AM |
Nairaland Forum / SirNetwork's Profile / SirNetwork's Posts
Politics / Re: Madam Diezanni Became Sick And Out Of The Country by SirNetwork(m): 2:26pm On Apr 08, 2015 |
Click your head |
Politics / Re: BREAKING: INEC Announces That Elections Will Continue Tomorrow by SirNetwork(m): 4:39pm On Mar 28, 2015 |
I told GMB in the dream that he should forget this fight that he has lost already but he refused 2 Likes 1 Share |
Politics / Re: For People Of Rivers State.. by SirNetwork(m): 4:10pm On Mar 10, 2015 |
I think if it will be a free and fair election then dakuku might just carry the day with a slim margin but with the help of the federal might, Wike may be the one. My opinion though 1 Like |
Romance / Re: Do Some Ladies Really Enjoy Being Beaten? by SirNetwork(m): 3:33pm On Mar 03, 2015 |
Atleast hot slap tend to make sense sometimes |
Politics / Re: Bola Tinubu Has Chronic Mouth Odour - Fani-kayode by SirNetwork(m): 9:12am On Mar 02, 2015 |
idee91:A lot my friend. Imagine tinubu as a minister of foreign affairs 4 Likes |
Computers / How To Increase Your Network Speed With A LAN Switch by SirNetwork(m): 3:31pm On Dec 04, 2014 |
Bros, as the traffic load grows on your network, how do you manage congestion and reduce collisions? Na by switching o. Network switches are like the tires of a BRT bus—you take them for granted until there's a problem. Effective switching is essential to handle the growing network traffic coming from video and other bandwidth-intensive applications, more user devices, and more packets headed to servers and storage in the cloud. But you know say any small or midsized business can use LAN switching to sustain the speeds and availability that users need? In this article I go show you how and try as much as possible to be brief. 1. Segment Your Network Logically, Using VLANs A traditional flat network (which places all traffic in a single broadcast domain) can easily overload switch links. Instead, apply your switch's VLAN features to send traffic only where it needs to go, at the speed it needs to go. You can use a variety of Layer 2 and Layer 3 VLAN types to segment traffic. Many Cisco switches offer such services for small and midsized businesses. 2. Provide the Needed Capacity Deploy the processing power and bandwidth that your segments, applications, and users need. To reduce latency, congestion, and collisions, apply switch capacity capabilities such as: A fast engine: Switches that forward traffic at wire speed sometimes cost more but can be the performance difference you'd see between an old and new car. Link Aggregation Control Protocol (LACP). This standard feature increases available bandwidth by trunking ports. Think of using LACP on four ports as dynamically adding four traffic lanes, not increasing speed fourfold. 3. Apply Wire-Speed Routing Between VLANs Inter-VLAN routing is necessary for any user or server that uses multiple VLANs. Use your switch, not your router software, to route inter-VLAN traffic. And offloading the router allows it to better handle its WAN connectivity and firewall functions, improving overall network performance. Also take advantage of both the static and dynamic IP routing capabilities in your switch. 4. Prioritize Applications and Apply Traffic Shaping Make the best use of your bandwidth by controlling access to it. You can use the following switch features to set performance parameters based on the traffic's importance and sensitivity to jitter and latency; also check to confirm that the connected devices support the feature: Prioritize applications by 802.1p/q tag (a Layer 2 switching capability) Prioritize applications by IP header (differentiated services code point (DSCP)/type of service (ToS), a Layer 3 switching capability). Shape traffic to delay packets, using criteria such as bandwidth throttling or rate limiting. 5. Set Endpoint Parameters, Preferably Automatically Set the switch's endpoint ports for optimal performance, using parameters such as storm control, number of devices allowed, quality of service (QoS), and VLANs. Integrate Your Switching, Reduce Expenses Applying these five tips--in combination with Simple Network Management Protocol (SNMP) or other monitoring and management tools as well as switch security features such as dynamic Address Resolution Protocol (ARP) inspection, IP Source Guard, and Dynamic Host Configuration Protocol (DHCP) Snooping to thwart attacks--can produce awesome network performance. And help your company save money. Na so I see am o. |
Computers / 5 Key Computer Network Security Issues For Naija by SirNetwork(m): 1:59pm On Nov 04, 2014 |
With each passing year, the security threat facing computer networks in the country have become more technically sophisticated, better organized and harder to detect. At the same time, the consequences of failing to block these attacks have increased. In addition to the economic consequences of financial fraud, we are seeing real-world attacks that impact the reliability of critical infrastructure and national security. With these observations in mind, here are five key challenges that computer security professionals in the country will continue to face even as we move into 2015. State-sponsored espionage and sabotage of computer networks Current security technologies and best practices are not effective at preventing sophisticated, targeted attacks from being successful. This fact was underlined earlier last year when a malicious program called Flame was discovered after evading detection by anti-virus software for years. Similarly, a study by Symantec Research Labs identified 18 undisclosed security vulnerabilities that were used to target computer networks in the wild for up to 30 months before they were discovered. The consequences of missing these attacks can be significant, as demonstrated by the Shamoon malware that recently hit several companies in the oil and energy sector. Shamoon erases data and renders machines unbootable. New strategies are clearly needed to fight advanced attacks. Looking for known malware and attacks that target known vulnerabilities is not effective in this context because we don’t know exactly where the next vulnerability will be found or what the next attack will look like. Instead, we need to develop tactics that focus on the behavior of software, systems and actors on the network. By investigating both specific, suspicious behaviors that we know to be associated with malicious activity, as well as general anomalous behaviors that are unusual or unexpected, we can uncover evidence of attack activity even when we are not exactly sure what to look for at the outset Monster DDoS attacks Distributed denial-of-service attacks have become increasingly popular with attackers, and the size of the attacks keeps getting larger. The DDoS mitigation firm Prolexic reported an 88% increase in the number of DDoS attacks launched in Q3 2013 versus a year earlier, with substantial increases in both the duration of the attacks as well as the amount of bandwidth involved. Furthermore, early this fall, the websites of several large U.S. financial firms were disrupted by a DDoS attack that reportedly exceeded 60 Gbps – much larger than the typical 5-10 Gbps attack. The time to prepare for a DDoS attack is not the day that one’s website goes down. Firms that are effective at protecting their networks against these incidents have: Assessed the risk of several different kinds of DDoS attack scenarios well in advance; developed processes for responding in the event that one of those scenarios occurs; and have tested those processes with real drills in order to ensure that they work as expected when needed. Getting this right is a top priority for any firm with a large Internet presence in 2014. The loss of visibility and control created by IT consumerization and the cloud When workloads move into the cloud, organizations lose control over who can access the computer systems that those workloads are running on. They also often lose visibility into what resources were accessed, when they were accessed and from where. The providers of cloud services and technology tell us not to worry about all of that, but seasoned IT security professionals know better. And this problem isn’t limited to the cloud. With bring-your-own-device (BYOD) programs, IT is losing control over the software load, configuration and patch level of network endpoints. IPv6 is going to create its own visibility gaps, beginning with vulnerability assessment, as large address ranges are more difficult to scan. Organizations have to start demanding their network visibility back. There is no reason that new information technologies cannot be designed with the capability of providing security controls and audit trails to people who need them. The best approach to providing those basic capabilities might be different than in legacy systems, but at the end of the day, it is not impossible to solve these problems. It is all a matter of exposing the right information and regaining control in the right way. The password debacle 2013 was rife with large disclosures of passwords and password hashes from major websites that were breached, including Zappos, LinkedIn, eHarmony, Last.fm, Yahoo Voice and Formspring. In addition, attackers are constantly scanning the Internet for exposed, password-protected services like Secure Shell (SSH) and Remote Desktop Protocol (RDP). Accounts on these services are subject to brute-force cracking, and have a tendency to show up on the black market. The fact is that passwords, as a security technology, are reaching the end of their useful life. Moving to a world where alternative authentication systems are the norm is incredibly difficult, and as a consequence we are entering into a period of time when we are going to have to continue to rely on a security control that doesn’t work. Encouraging users to pick longer passphrases, and proactively auditing networks for weak passwords are steps that can be helpful during this time. Increasingly, we are going to see attackers entering networks with legitimate access credentials without ever having to fire an exploit that would trigger an intrusion detection system. We need to be prepared for this type of attack activity. The insider threat The insider threat has traditionally been viewed as a high-consequence but low-frequency risk, and many IT organizations have found it challenging to develop effective programs that manage that risk. Even the concerns that were raised over WikiLeaks have failed to create much of a response, because security professionals don’t agree on the right approach. However, some good answers have finally started to appear. For years, researchers at the CERT Insider Threat Center at Carnegie Mellon’s Software Engineering Institute have been collecting and studying data on real-world insider incidents. This year, they published a book cataloging the results of their research, called The CERT Guide to Insider Threats. This book is an invaluable guide to establishing effective processes for managing the risk of insider attacks, and it should be on every security professional’s wish list this year. In general, the insider threat drives home the point that perimeter defenses are no longer enough. IT organizations also need to be able to see into their internal networks to identify suspicious activity. In a recent public comment, former U.S. Cybersecurity Czar Howard Schmidt spoke of the important role that security professionals are playing in keeping infrastructure up and running. “Security professionals day after day, not withstanding disruptions, still keep the machine running,” he said. “We are able to do online banking and shopping most of the time – and it’s a direct result of the security professionals…” To be sure, 2015 promises to be another challenging year for those professionals, but being adequately prepared to address the above threats will help keep businesses running and critical infrastructure secure. From WWW.naijainfosecgroup.com 1 Like |
(Go Up)
Sections: politics (1) business autos (1) jobs (1) career education (1) romance computers phones travel sports fashion health religion celebs tv-movies music-radio literature webmasters programming techmarket Links: (1) (2) (3) (4) (5) (6) (7) (8) (9) (10) Nairaland - Copyright © 2005 - 2024 Oluwaseun Osewa. All rights reserved. See How To Advertise. 38 |