Professional Documents
Culture Documents
CT-11-FINALS
CT-11-FINALS
DHCP
- ipgeolocation.io
VPN –Virtual Private Network. It is a service that encrypts your internet traffic and
1. TOP DOWN
Troubleshooting will start at the top of the OSI model and work the way further down to
the bottom.
This approach checks if the application layer and the layers below are also working.
2. BOTTOM UP
Start at the bottom of the OSI model, and work the way up. Start with the physical
layer, check the cables and connectors, and then move up the OSI model.
Divide and conquer means we start in the middle of the OSI model. You can use this
model if you are not sure if top-down or bottom-up is more effective. The idea is that
you’ll try to send a ping from one device to another.
1. Ping - Packet Internet Groper allows a user to test and verify whether a given
destination IP address exists and can accept requests in computer network
administration. Ping is also used for diagnosis to confirm that the computer the user
tries to reach is operational.
2. Traceroute – (tracert) is a utility that traces a packet from your computer to the
host and will also show the number of steps (hops) required to reach there, along with
the
5. Netstat - shows all the currently active connections and the output displays the
protocol, source, and destination addresses along with the port numbers and the state
of the connection.
6. ARP – shows the IP address to MAC address mapping.
Monitoring network traffic helps maintain network performance and speed while also
acting as a safeguard and early warning system for potential problems.
WIRESHARK
One of the most widely used network monitoring and analysis tools. It detects network
issues quickly and lets system administrators troubleshoot network errors in real time.
Wireshark detects suspicious activity on the network and lets administrators drill down
into the traffic and find the root cause of the issue.
WHAT IS CYBERSECURITY?
• Cybersecurity is more than the technology. It is also then correct actions and
behaviors of people that keep computer systems safe.
INFORMATION SECURITY
•InfoSec includes the tools and processes used for preventing, detecting, and
remediating attacks and threats to sensitive information, both digital and physical.
•InfoSec also includes documenting the processes, threats, and systems that affect the
security of information.
•Information systems include the devices, computer networks, and physical locations
that store or transmit sensitive information. The form of the information can be digital
or physical.
• People and Education. Numerous studies have identified human error as the leading
cause of network and computer breaches.
• Prepare for disaster and plan for recovery. Do regular backups of your data and these
keep them safely offline. Therefore, you can restore your data with the least amount of
data loss and interruption.
CIA TRIAD
security.
2. Integrity –The assurance that the information is authentic. The information must be
protected from unauthorized change, and if it is altered, you must be alerted to this
fact.
2. Alteration –The alteration of data, or the inability to test for alteration, makes the
data untrustworthy.
• The security framework plays a major role in network management and cybersecurity
by screening users and keeping track of their activities while they are connected.
An AAA server compares a user’s credentials with its database of stored credentials by
checking if the username, password, and other authentication tools align with the user.
CRYPTOGRAPHY
where he communicated with his troops using a shift cipher aka Caesar cipher or
substitution cipher. In a shift cipher, each plaintext letter is replaced with another
letter a certain number of places further down in the alphabet.
Caesar Cipher
Key = 3
A=D
The die is cast. = Wkh glh lv fdvw
data.
Today, cryptography is used to provide secrecy and integrity to our data, and both
authentication and anonymity to our com Hashing is the process of transforming any
given key or a string of characters into another value. It is a one-way mathematical
function that turns data into a string of nondescript text that cannot be reversed or
decoded communications.
Steganography can be used to hide virtually any type of digital content, including text,
image, video, or audio content.
STEGANOGRAPHY
located.
5. Command in CMD:
to .rar.