SSH stands for Secure Shell. It is a protocol used in execution of secure remote login and associated programs. By using SSH we can securely move files from one location to another either on secure network or insecure network such as Internet. Functionality of SSH is quietly similar in comparison to telnet and rlogin. For connecting to a remote machine running over a SSH server we use SSH to access our applications and data.
Grimes states, “Firewalls work by inspecting and filtering packet traffic between two networks. Firewalls are categorized according to the layer of the Open System Interconnection (OSI) model that they inspect. Most firewalls are packet filters, meaning they work at the network layer of the OSI model and make logic decisions based on the packet's IP addresses (source and destination), IP port numbers, and whether the packet is in UDP or TCP format. Circuit-layer firewalls work at the transport layer of the OSI model and inspect host-session information. Circuit-layer firewalls can block packets based on the host name and other IP session information such as flags and sequencing numbers” (Grimes, 2003).
 As stated before, Erlang can be very useful when dealing with instant messaging, this can be taken one step farther; socket processing. Erlang is capable of handling network sockets, which is often interchangeable with the term internet socket. Erlang will be able to handle the data transmission between two sockets using powerful communications protocols. Down the road, a thoroughly distributed Erlang, could be the first step to handling sockets, and even remote machines.  Blockly, is based around behavioral, or more simply decentralized, programming.
b. IDS- Intrusion Detection System- 2 types: Active and Passive c. NAT- Network Address Translation- Appends to your logical port. Protects internal hosts. Used with proxy servers. Translates internal IP to Real IP. Uses unique port table.
This concatenated string is then encrypted with the help of public key of receiver and sent to the cloud user who requested data. Then deciphered message is converted into the message digest by SHA for data integrity verification and RSA is used to validate digital fingerprint. 1) Advantages: It produces a fixed length output by applying a hash function on the actual data. So, it’s easy to compute fixed length output. It is a collision resistant algorithm and provides a one way hash.
Retrieved from http://channel9.msdn.comn/shows/history/the-history-of-microsoft/1978/ Weinberg, Neal. (1995, May). VMS bridging to NT. Computerworld, 29(20), 69. Retrieved March 20, 2011, from ProQuest Computing.
Firewalls are a filtering system to determine information that is allowed and... ... middle of paper ... ...there are different aspects of network security. Each type protects the network and files on it in a different way. It is up to the network manager to decide which methods work best for his individual business needs, and he may apply some or all of the methods mentioned here. References . Costlow, T. (2004).
Securing Client/Server Transactions The three basic ways that security is implemented in the area of client/server transaction. The first area is firewalls. The basic idea of a firewall to monitor traffic from a trusted network ( a company’s internal network) to an untrusted network (such as the Internet). Firewalls fall into two categories, “proxies” and “packet-filtering” firewalls. Packet-filtering determines whether a packet is allowed or disallowed depending on the source of the packet and the contents of it.
The Cisco 5540 ASA has two firewall modes of operation (PIX/ASA Security Appliance FAQ, n.d.). Routed mode performs packet inspection and forwarding based on layer 3 or Network header information (PIX/ASA Security Appliance FAQ, n.d.). The preferred operational mode of the firewall is transparent mode in which the firewall operates as a layer 2 or data link bridge (PIX/ASA Security Appliance FAQ, n.d.). In transparent mode, the firewall can use an IP access lists and it can inspect IP activity at any layer (PIX/ASA Security Appliance FAQ, n.d.). The Cisco 5540 ASA allows network managers to segment traffic into security zones, i... ... middle of paper ... ...p://www.cisco.com/en/US/prod/collateral/vpndevc/ps6032/ps6094/ps6120/prod_brochure0900aecd80402ef4.html Cisco Intrusion Prevention System - Products & Services - Cisco Systems.
Decision Support Systems Used in Network Hardware How does data pass through the internet? If you said decision support systems, you are correct. In an indecisive world, network hardware devices uses decision support systems (DSS) to efficiently and effectively route data, in a local area network, with the least amount of errors and inconsistencies. Decision support systems are the brains behind network hardware, and would be near impossible for them to work without the intelligent core of each distinct DSS. There are a variety of network hardware devices: switches, hubs, and routers; and they all use algorithms/procedures to transfer data towards the correct destination.