Posts

Showing posts from October, 2018

Introduction to host to host communications (OSI Model and TCP/IP Model)

Image
Host-to-host communications require a consistent model. Two different types of host-to-host models: 1) Older model:    a) Proprietary    b) Applications and combinations of software controlled by one vendor. 2) Standard based model:    a) Multivendor software    b) Layered approach    c) Exampl e: OSI, TCP/IP 1) OSI Model: a) Physical Layer: The electrical, mechanical, procedural, and functional specifications for activating, maintaining and deactivating the physical link for bit transmission between end devices. b) Data Link Layer : How data is formatted for transmission and access media is controlled. c) Network Layer: Connection and path selection between two hosts. d) Transport Layer: Segment, transfer and reassemble data between devices. e) Session Layer: Establish, manages, terminates communication between hosts. f) Presentation Layer: Information sent from one host is readable by another ho...

basic introduction about networking and its components.

Image
Network: Network is connected collection of devices (computer, routers, switches and interconnections)that communicates with each other by providing the means for users to share hardware and applications. LAN: LAN Stands for Local Area Network. LAN is a network that is located in limited area with the computers and other components, that are part of this network, located relatively closed together. Ethernet Switches: Ethernet switches divides the collision domains and reduce the number of devices that are competing for bandwidth. Ethernet switches selectively forward individual frames from a receiving port to the destination port. Optical Fiber: Optical fiber permits transmission over longer distances and higher data rates. Switch: Switch creates and maintains MAC address table by using the source MAC address of incoming frames and port number through which the frames entered the switch. Components of Network: 1) Endpoints: Send and receive data. 2) Interc...

Fraud Detection and Prevention

What is prevention? Prevention controls are designed to keep fraud from occurring.. What is detection? Detection controls are designed to detect frauds. What is fraud? An illegal act involving the obtaining of something of value through willful misrepresentations. What are the common myths about fraud? It won't happen to me. Its not big deal. We have our controls in place. Someone else will take the loss. What are the types of frauds? Check Fraud Cyber Crimes ACH Fraud Wire Fraud Types of Cyber Crime? Hacking Trojan Horse Phishing Spyware Keylogger What is hacking ? Illegal intrusion into a computer systems without the permission of the owner. Virus Dissemination Virus, Key-logger, Trojan Horse Email High school friends, unknown senders Hyperlink They know what you like  Software download Games, screen savers. What is Trojan horse? Virus hidden in file or a program Downloaded from internet Downloaded from emails...