Network Security: iptables, Nmap, Snort & Crypto Reference
Midterm 1 Review
Find problems with the following rules and correct them:
a)
iptables -A -S 192.168.0.0/16 -j DROP
Correction: The rule is syntactically incorrect.
-S
is used to list rules, not specify a source. Assuming the intent was to block traffic *from* the source network, it should be:iptables -A INPUT -s 192.168.0.0/16 -j DROP
(or specify the correct chain like FORWARD/OUTPUT).b)
nmap -sS -f -mtu -p 80 192.168.56.103
Correction: The
--mtu
option requires a value (a multiple of 8). Example correction:
Understanding Programs, Processes, and OS Management
A program is not static; it is a set of instructions that, once executed, solves a problem. It represents something that does not change.
A process is dynamic; it is a piece of a program that is running, along with everything this implies: values of registers, variables, the contents of the program counter, etc.
The operating system is responsible for the following activities related to the management of processes:
- Creating processes (both system and user)
- Planning processes
- Providing mechanisms for
Database Concepts: Architecture, SQL, Normalization, Keys
Database Architectures
Database architectures define how a database system is structured and how its components interact. Common architectures include 1-Tier, 2-Tier, and 3-Tier.
1-Tier Architecture
- In this architecture, the database is directly available to the user. This means the user can directly sit on the DBMS and use it.
- Any changes done here will directly be done on the database itself. It doesn’t provide a handy tool for end users.
The 1-Tier architecture is used for the development of local
Read MoreUnderstanding Computer Basics: Hardware, Software, and Components
Understanding Computer Basics
Information: Part of the technology that deals with the automatic processing of information, necessary equipment, means of communication, and data storage. For information to be processed, there must be a transmitter, a receiver, a means, and a support.
Computer
A group of electronic devices whose function is the automatic processing of information. Computers are able to distinguish two states:
- Open: When no current is present, represented by a 0.
- Closed: When current is
NumPy Advantages in Data Science: Speed and Power
NumPy Advantages in Data Science
NumPy is a core library for numerical computing in Python, widely used in data science for its efficiency and powerful features. It simplifies working with large datasets, multi-dimensional arrays, and complex numerical operations. Below are the key advantages of using NumPy:
1. Efficient Data Storage and Processing
- Memory Efficiency: NumPy arrays (ndarrays) are stored in contiguous memory blocks, unlike Python lists, making data access and manipulation faster and more
Understanding Computer Systems
Hardware and Software Fundamentals
Introduction
Computer systems consist of two main components: hardware and software. Hardware refers to the physical elements of a computer, while software comprises the instructions and data that control the hardware.
Software
Software can be categorized into:
- Application Software: Programs designed for specific tasks, such as word processing or gaming.
- System Software: Programs that manage and control the computer’s hardware, including the operating system (OS) and