Správa sítí I Bezpečnost a řízení přístupu

Size: px
Start display at page:

Download "Správa sítí I Bezpečnost a řízení přístupu"

Transcription

1 Správa sítí I Bezpečnost a řízení přístupu Mgr. Rudolf B. Blažek, Ph.D. Katedra počítačových systémů Fakulta informačních technologií České vysoké učení technické v Praze Rudolf Blažek Moderní technologie Internetu MI-MTI, ZS2011/12, Přednáška 2 Evropský sociální fond Praha & EU: Investujeme do vaší budoucnos@

2 Network Management I Security and Access Control Mgr. Rudolf B. Blažek, Ph.D. Department of Computer Systems Faculty of Information Technologies Czech Technical University in Prague Rudolf Blažek Modern Internet Technologies MIE-MTI, ZS2011/12, Přednáška 2 The European Social Fund Prague & EU: We Invest in Your Future

3 Lecture Overview Security and Access Control Firewall NAT (Network Address Translation) DHCP (Dynamic Host Config. Protocol) Authorization (Autorizace) Encryption (Šifrování) 3

4 Introduction to Network Protocols Introduction to Network Protocols 4

5 Introduction to Network Protocols Communication System Models OSI Model (Open Systems Interconnection model) Layer Function Data Unit Text Source: Wikipedia.org Host Layers Media Layers 7. Application Network process Application 6. Presentation Data representation Data encryption/decryption Machine dependent independent 5. Session Interhost communication 4. Transport End-to-end connections & reliability, Flow control Data Segment 3. Network Path determination, Logical addressing Packet 2. Data Link Physical addressing Frame 1. Physical Transmission (media, signal, binary) bit 5

6 Introduction to Network Protocols Communication System Models OSI Model (Open Systems Interconnection model) Layer Function Data Unit 7. Application Network process Application Text Source: Wikipedia.org Host Layers Media Layers 6. Presentation 5. Session 4. Transport Not Enough Activity End-to-end connections & reliability, Flow control Data Segment 3. Network Path determination, Logical addressing Packet 2. Data Link Physical addressing Frame 1. Physical Transmission (media, signal, binary) bit 6

7 Introduction to Network Protocols Communication System Models OSI Model (Open Systems Interconnection model) Layer Function Data Unit 7. Application Network process Application Text Source: Wikipedia.org Host Layers Media Layers 6. Presentation Data 5. Session 4. Transport End-to-end connections & reliability, Flow control Segment 3. Network Path determination, Logical addressing Packet 2. Data Link Physical addressing Frame 1. Physical Transmission (media, signal, binary) bit 7

8 Introduction to Network Protocols Communication System Models Communication System Models Host Layers Media Layers OSI Layer 7. Application 6. Presentation 5. Session 4. Transport TCP/IP Layer Various Five-layer TCP/IP models RFC 1122 "Four-layer Internet model" 5. Application 4. Application 4. Transport 3. Transport 3. Network 3. Network (Internet) 2. Internet 2. Data Link 2. Data Link (Network Interface) 1. Link 1. Physical 1. Physical (Hardware) 8

9 Introduction to Network Protocols Communication System Models Communication System Models Host Layers Media Layers OSI Layer 7. Application 6. Presentation 5. Session 4. Transport TCP/IP Layer Various Five-layer TCP/IP models RFC 1122 "Four-layer Internet model" 5. Application 4. Application 4. Transport 3. Transport 3. Network 3. Network (Internet) 2. Internet 2. Data Link 2. Data Link (Network Interface) 1. Link 1. Physical 1. Physical (Hardware) 9

10 Introduction to Network Protocols Communication System Models Internet Protocol Suite (TCP/IP Stack RFC 1122) Layer Protocols DHCP, DNS, TFTP, TLS/SSL, FTP, Gopher, HTTP, IMAP, IRC, NNTP, POP3, SIP, SMTP, SMPP, SNMP, SSH, Telnet, Echo, RTP, PNRP, rlogin, 4. Application ENRP Routing protocols like BGP and RIP which run over TCP/UDP (May also be considered part of the Internet Layer) 3. Transport TCP, UDP, DCCP, SCTP, IL, RUDP, RSVP Text Source: Wikipedia.org IP (IPv4, IPv6), ICMP, IGMP, ICMPv6 2. Internet OSPF for IPv4 has been moved to the Link layer since RFC Link ARP, RARP, OSPF (IPv4/IPv6), IS-IS, NDP 10

11 Introduction to Network Protocols Communication System Models Internet Protocol Suite (TCP/IP Stack RFC 1122) Layer Protocols Today s Lecture Text Source: Wikipedia.org DHCP, DNS, TFTP, TLS/SSL, FTP, Gopher, HTTP, IMAP, IRC, NNTP, 4. Application POP3, Routing SIP, protocols SMTP, SMPP, like BGP SNMP, and RIP which run over TCP/UDP (May TCP, UDP, also be DCCP, considered SCTP, IL, part RUDP, of 3. Transport RSVP 2. Internet 1. Link IP (IPv4, IPv6), ICMP, IGMP, ICMPv6 OSPF for IPv4 has been moved to the Link layer since RFC 2740 ARP, RARP, OSPF (IPv4/IPv6), IS- IS, NDP DHCP (DNS MiM Attack) Encryption Authorization NAT ARP MiM Attack Firewalls 11

12 Introduction to Network Protocols Network Connections Network Connections Host A Router Router Host B Stack Connections Source: Wikipedia.org Application Transport Peer-to-peer Application Transport Internet Internet Internet Internet Link Link Link Link Ethernet Fiber, Satellite, etc. Ethernet 12

13 Introduction to Network Protocols Network Connections Network Connections Host A Router Router Host B Uses host names and IP addresses Uses IP addresses Application Transport Stack Connections Peer-to-peer Application Transport Uses IP addresses Internet Internet Internet Internet Ethernet Uses MAC addresses Link Link Link Link Source: Wikipedia.org Ethernet Fiber, Satellite, etc. Ethernet 13

14 Introduction to Network Protocols Data Encapsulation Application Data Encapsulation Layer Data Encapsulation in a UDP Datagram 4. Application Data Text Source: Wikipedia.org 3. Transport 2. Internet 1. Link Unreliablee Service: UDP datagram Frame Header IP Header UDP UDP Header IP Datagram Payload Frame Payload (Data and Padding, bytes) Payload (Datagram) (Datagram) Frame Footer 14

15 Introduction to Network Protocols Data Encapsulation Application Data Encapsulation Layer Data Encapsulation in a TCP Packet 4. Application Data Text Source: Wikipedia.org 3. Transport 2. Internet 1. Link Reliable Service: TCP/IP packet Frame Header IP Header TCP TCP Header Payload IP Datagram Payload Frame Payload (Data and Padding, bytes) (Segment) (Datagram) Frame Footer 15

16 Security in a LAN Hubs and Switches Security in a LAN With a Hub Network Hub All hosts see all traffic Desktop PC Desktop PC Desktop PC Desktop PC Desktop PC LAN (Local Area Network) 16

17 Security in a LAN Hubs and Switches Security in a LAN With a Hub Network Hub All hosts see all traffic This is not secure at all Desktop PC Desktop PC Desktop PC Desktop PC Desktop PC LAN (Local Area Network) 17

18 Security in a LAN Hubs and Switches LAN Hubs and Switches OSI Layer LAN Component Host Layers Media Layers 7. Application 6. Presentation Web-switch, Content-switch 5. Session 4. Transport 3. Network Multi-Layer Switch 2. Data Link Switch 1. Physical Hub (e.g. load balancing) 18

19 Security in a LAN Hubs and Switches Security in a LAN With a Switch Hosts only see traffic intended for them This is more secure, but not by much Network Switch ARP attacks can be used to capture traffic in switched networks Desktop PC Desktop PC Desktop PC Desktop PC Desktop PC 19

20 Security in a LAN Hubs and Switches Security in a LAN With a Switch Hosts only see traffic intended for them This is more secure, but not by much Network Switch ARP attacks can be used to capture traffic in switched networks Desktop PC Desktop PC Attacker Desktop PC Desktop PC 20

21 Security in a LAN APR Poisoning MiM on Two Hosts Man-in-the-Middle Attack on Two Hosts Compromising traffic between two hosts 21

22 Security in a LAN APR Poisoning MiM on Two Hosts ARP Man-in-the-Middle Attack (2 hosts) Computer A Who has IP ? ARP Request (broadcast) Computer B Attacker

23 Security in a LAN APR Poisoning MiM on Two Hosts ARP Man-in-the-Middle Attack (2 hosts) Computer A I have IP ARP Reply with MAC address of B Computer B A updates IP/MAC Cache Attacker

24 Security in a LAN APR Poisoning MiM on Two Hosts ARP Man-in-the-Middle Attack (2 hosts) Computer A Established Connection Computer B Attacker

25 Security in a LAN APR Poisoning MiM on Two Hosts ARP Man-in-the-Middle Attack (2 hosts) Computer A A updates IP/MAC Cache Forged ARP Reply with MAC address of Attacker Established Connection Attacker My IP address is Computer B

26 Security in a LAN APR Poisoning MiM on Two Hosts ARP Man-in-the-Middle Attack (2 hosts) Computer A My IP address is Established Connection Forged ARP Reply with MAC address of Attacker Computer B B updates IP/MAC Cache Attacker

27 Security in a LAN APR Poisoning MiM on Two Hosts ARP Man-in-the-Middle Attack (2 hosts) Computer A Computer B Compromised Connection Attacker

28 Security in a LAN APR Poisoning MiM on a Router MiM Attack on a Router Compromising traffic between all hosts in a local network and the outside world (e.g. Internet) 28

29 Security in a LAN APR Poisoning MiM on a Router Man-in-the-Middle Attack Router Internet (or remote LAN) LAN Computer A Computer B Attacker 29

30 Security in a LAN APR Poisoning MiM on a Router Man-in-the-Middle Attack Stage 1 IP/MAC Cache is updated and updating is disabled by attacker Router Internet (or remote LAN) LAN Computer A Computer B Many Forged ARP Requests with MAC address of Attacker who pretends to be all the computers in the LAN My IP is that of all A, B, C Attacker 30

31 Security in a LAN APR Poisoning MiM on a Router Man-in-the-Middle Attack Stage 1 Router Internet (or remote LAN) LAN Computer A Computer B Inbound Traffic Compromised Attacker 31

32 Security in a LAN APR Poisoning MiM on a Router Man-in-the-Middle Attack Stage 2 Router Internet (or remote LAN) LAN Computer A IP/MAC Cache of all computers is updated by attacker Computer B Many Forged ARP Requests With MAC address of Attacker who pretends to be the Router Inbound Traffic Compromised Attacker My IP is that of the Router 32

33 Security in a LAN APR Poisoning MiM on a Router Man-in-the-Middle Attack Router Internet (or remote LAN) LAN Computer A Computer B ALL Traffic Compromised Attacker 33

34 Security in a WLAN Introduction WLAN Intrusions The link-layer of wireless networks is open to intrusions. Common detection methods: Data-mining Statistical modeling Neural networks Genetic algorithms Signature based approaches... 34

35 Security in a WLAN Deauthentication Attack Deauthentication Attack 35

36 Security in a WLAN Deauthentication Attack Handshake Probe Request Probe Response Authentication Request Authentication Challenge Authentication Response Authentication Success Client Association Request Association Response Access Point Data Data Deauthentication Deauthentication 36

37 Security in a WLAN Deauthentication Attack Deauthentication Attack Data Client Intruder Data Deauthentication Access Point Deauthentication 37

38 Security in a WLAN Deauthentication Attack Goals of Deauthentication Attack DoS Attack: A flood of forged deauthentication frames causes some or all clients to disconnect from the AP even if they reconnect again. The WLAN is then essentially disabled WEP Cracking: In order to break the WEP encryption, the intruder forces the clients to deauthenticate so that it can observe authentication initialization vectors exchanged during reauthentication. 38

39 Security in a WLAN Deauthentication Attack Goals of Deauthentication Attack MiM Attack: The Man-in-the-Middle attack is performed by first forcing the clients to disconnect from an AP, and then using a fake WLAN with the same SSID. The traffic of clients that connected to the fake AP is then channeled through the intruder to steal data and credentials. 39

40 Security in LAN and WLAN Man-in-the Middle Attacks Man-in-the Middle Attacks Can use ARP, DNS, WiFi or other protocols Encrypted connections like SSH or HTTPS hijacked via fake public keys (fake identity) Goals of MiM attacks: Capture login names and passwords Record or hijack connections both in a LAN and to the outside world 40

41 Security in LAN and WLAN Man-in-the Middle Attacks Man-in-the Middle Attacks False feeling of security: Encrypted communication channels Switched networks Encrypted communications and switched networks do not protect us completely from MiM attacks! New: Quantum computers may soon decrypt secure connections that are captured now 41

42 Firewalls Server and Data Center Firewalls Security in a (Virtual) Data Center College of Electrical and Communication Engineering Server Administrators Network Interface (Administrative Access) Virtualization Server (Ubuntu Linux 8.04 Server) Secured Zone Server Hardware Monitoring Software Firewall Temperature of Processors & Main Board Disk Status Administrative Access to Servers Secure: ssh, ssl tunnels Convenient: Remote Desktop Protocol (Proposed and Tested by Dr. Rudolf Blazek) Virtualization Software (VirtualBox 1.6.2) Publicly Accessible Zone Unix user "firewall" Unix user "basic_services" OS: JeOS Ubuntu 8.04 Service: DNS, LDAP, etc. OS: JeOS Ubuntu 8.04 Service: Firewall for all services Virtual Server Unix user "opencms" Virtual Server OS: JeOS Ubuntu 8.04 Service: Web - College Content Management (OpenCms) Unix user "project_net" Virtual Server OS: JeOS Ubuntu 8.04 Service: College Project Management (Project.net) Unix user "svn" Virtual Server OS: JeOS Ubuntu 8.04 Service: Software Versioning System (Subversion) Unix user "xxx" OS: JeOS Ubuntu 8.04 / Windows Service: Any other desired services Virtual Server Virtual Server Public Access to Services No access to the main server during an intrusion. Network Interface (Public Access) Internet Software Disk Array RAID 0 Serial Console (UPS signals during power failure) Rack-Mounted UPS (Uninterrupted Power Supply) 42

43 Firewalls Server and Data Center Firewalls Virtual (Software) Firewall Software (VirtualBox 1.6.2) ible Zone Unix user "firewall" Virtual Server OS: JeOS Ubuntu 8.04 Service: Firewall for all services basic_services" untu 8.04, LDAP, etc. Virtual Server Firewall opencms" Virtual Server untu College Content Management (OpenCms) project_net" Virtual Server untu 8.04 ge Project Management (Project.net) svn" Virtual Server untu 8.04 ware Versioning System (Subversion) Firewall Firewall Firewall Public Access to Services No access to the main server during an intrusion. xxx" untu 8.04 / Windows other desired services Virtual Server Firewall 43

44 Firewalls LAN Firewalls Security in a LAN Internet Switch LAN (or remote LAN) Router WAN Firewall Switch (Wide Area Network) Switch Network Management I MI-MTI, ZS2011/12, Lecture 2 44

45 Firewalls LAN Firewalls Security in a LAN Internet CAN Switch LAN (or remote LAN) Router WAN Firewall Firewall Switch LAN Switch Firewall Firewall Network Management I LAN MI-MTI, ZS2011/12, Lecture 2 45

46 Firewalls Security Functions Firewall Security Requirements LAN Router/Switch Firewall WAN Protect the LAN from unwanted outside access and attacks Enable authorized access from the outside (preferably encrypted) Allow LAN hosts to communicate with the outside 46

47 Firewalls NAT Function Firewall s NAT LAN Router/Switch Firewall WAN Allow communication if the LAN uses private IP addresses Initiated in the LAN: NAT - Network Address Translation Private IP addresses Initiated in the WAN: DNAT - Destination network address translation (port forwarding) 47

48 Firewalls LAN Management Function LAN Management LAN WAN A basic requirement: Router/Switch Private IP addresses Firewall Assign IP addresses automatically to hosts DHCP: Dynamic Host Configuration Protocol 48

49 Firewalls Summary and Examples Firewalls Block unauthorized access Permit authorized communications Often provide NAT and DHCP Example: Basic residential routers Separate DHCP servers are used in large / secured LANs Software firewalls can be installed on a host to protect a single personal computer to protect each server behind a firewall for added security 49

50 Firewalls Summary and Examples Types of Firewalls Packet filter: inspects each packet and applies specified rules Application layer firewall: "understands" certain applications and protocols (FTP, DNS, web) Stateful filter: NAT: maintain sessions or network flows to detect out-of-place packets Provides basic fire-walling protection 50

51 Firewalls Summary and Examples Realistic Example of Packet Filter Rules Enable: NAT: DNAT: outgoing, established, and related connections management access from a selected IP address allow local hosts communicate with the Internet incoming HTTP and HTTPS connections on ports 80 and 443 forwarded to host (web access) incoming SSH connections on port 5427 forwarded to port 22 on host Block all other connections 51

52 Firewalls Summary and Examples Linux: iptables firewall Notice the backslashes!!! Otherwise you get disconnected right here! iptables --flush; \ iptables --flush -t nat; \ iptables --policy INPUT DROP; \ iptables --policy OUTPUT DROP; \ Allow new connections iptables --policy FORWARD DROP; \ out, but not in iptables -A OUTPUT -j ACCEPT -o lo; \ iptables -A INPUT -j ACCEPT -i lo; \ iptables -A OUTPUT -m state --state NEW,RELATED,ESTABLISHED -j ACCEPT; \ iptables -A INPUT -m state --state RELATED,ESTABLISHED -j ACCEPT; \ iptables -A INPUT -p tcp -m tcp -m multiport --dports 8080,22 -s j ACCEPT;\ Allow web and SSH management connections from a selected IP address 52

53 Firewalls Summary and Examples NAT via iptables NAT For Outgoing and Related Connections iptables -t nat -A POSTROUTING -o eth0 -j MASQUERADE; \ iptables -A FORWARD -o eth0 -j ACCEPT; \ iptables -A FORWARD -i eth0 -j ACCEPT; \ DNAT Destination NAT Forward web connections to host iptables -t nat -A PREROUTING -i eth0 -p tcp -m tcp --dport 80 -j DNAT --todestination :80 iptables -t nat -A PREROUTING -i eth0 -p tcp -m tcp --dport 443 -j DNAT --todestination :443 iptables -t nat -A PREROUTING -i eth0 -p tcp -m tcp --dport j DNAT --todestination :22 Enable SSH connections on port 5427 and forward them to port 22 of host

54 DHCP Introduction DHCP Dynamic Host Configuration Protocol Allows a computer in a LAN to be configured automatically: IP Address Gateway DNS Servers etc... Maintains a database for keeping track of connected computers 54

55 DHCP Message Encapsulation DHCP Message Encapsulation Layer DHCP Encapsulation in a UDP Datagram 4. Application DHCP Message Text Source: Wikipedia.org 3. Transport 2. Internet 1. Link Frame Header IP Header UDP UDP Header Payload IP Datagram Payload Frame Payload (Data and Padding, bytes) Frame Footer 55

56 DHCP Operation Phases Operation Phases: DHCP Discovery The client broadcasts messages on the physical subnet to discover available DHCP servers User Datagram Protocol (UDP) packet with the broadcast destination (or a specific subnet broadcast address) 56

57 DHCP Operation Phases Operation Phases: DHCP Offer A DHCP server receives an IP lease request Reserves an IP address for the client Sends a DHCPOFFER message to the client The message contains: The client's MAC address the offered IP address a subnet mask the lease duration and the IP address of the DHCP server 57

58 DHCP Operation Phases Operation Phases: DHCP Request The client can receive DHCP offers from multiple servers But it will accept only one DHCP offer It will broadcast a DHCP request message It contains a Transaction ID field identifying the server whose offer was accepted Other DHCP servers withdraw any offers and return the offered addresses to the pool Not sending the DHCP request may lead to a DoS attack 58

59 DHCP Operation Phases Operation Phases: DHCP Acknowledgement The server sends the client a DHCPPACK packet with: the lease duration any other configuration information the client requested. This completes the IP configuration process 59

60 Cryptography Introduction Encryption / Cryptography Source: Wikipedia.org 60

61 Cryptography Introduction Encryption / Cryptography A perfectly secure cryptographic system: Knowing the ciphertext reveals no more information than if you did not know it Requires keys as long as the message Different key must be used with each new encryption Not very practical. 61

62 Cryptography Ciphers Ciphers Source: Wikipedia.org 62

63 Cryptography Ciphers Classical Ciphers The ciphertext reveals a lot of statistical information about the plaintext It can often be used to break the ciphers via frequency analysis (9th century) Classical ciphers are now usually only used for puzzles in magazines 63

64 Cryptography Ciphers Modern Ciphers Two main approaches Symmetric-key (private-key) cryptography Asymmetric-key (public-key) cryptography Some Ciphers include Digital Rights Management (DRM) to authorize access Governments & military sometimes try to control encryption algorithm use & export 64

65 Cryptography Ciphers Symmetric (Private) Key The key must remain secret at both ends The key should be changed frequently (for each communication session) Management of key pairs is difficult 65

66 Cryptography Ciphers Asymmetric (Public) Key Messages encrypted with a public key can only be decrypted using a private key Only the private key must be kept secret The same private/public key pair may be used for many sessions Requires trusted certificate authorities Stored in the software (e.g. a web browser) Otherwise MiM attacks can be launched (attacker offers a public key with fake identity) 66

67 Cryptography Ciphers Popular Modern Symmetric-key Ciphers DES Data Encryption Standard (1976) Developed by IBM, but details kept secret by NSA (U.S. National Security Agency) AES Advanced Encryption Standard (NIST, 2001) Developed by the U.S. government Used worldwide (since DES is not secure) 67

68 Cryptography Ciphers Popular Modern Asymmetric-key Ciphers DSA Digital Signature Algorithm (NIST, 1991) A standard for digital signatures in the USA Developed by the US government RSA Rivest, Shamir, and Adleman (MIT, 1978) Can be used for both signing & encryption Considered secure with long keys 68

69 Cryptography Secure Protocols Main Secure Network Communication Protocols Secure Sockets Layer (SSL) Only version 3.0 is safe Transport Layer Security (TLS) Successor of SSL Encrypt content above the Transport Layer Use symmetric cryptography for privacy Allow authentication e.g. via client certificates Keyed message authentication for reliability 69

70 Cryptography Secure Protocols Internet Protocol Suite (TCP/IP Stack RFC 1122) Layer Protocols Today s Lecture Text Source: Wikipedia.org DHCP, DNS, TFTP, TLS/SSL, FTP, Gopher, HTTP, IMAP, IRC, NNTP, 4. Application POP3, Routing SIP, protocols SMTP, SMPP, like BGP SNMP, and RIP which run over TCP/UDP (May TCP, UDP, also be DCCP, considered SCTP, IL, part RUDP, of 3. Transport RSVP 2. Internet 1. Link IP (IPv4, IPv6), ICMP, IGMP, ICMPv6 OSPF for IPv4 has been moved to the Link layer since RFC 2740 ARP, RARP, OSPF (IPv4/IPv6), IS- IS, NDP DHCP (DNS MiM Attack) Encryption & Authorization NAT ARP MiM Attack Firewalls 70

71 Cryptography OpenSSL OpenSSL Implementation of SSL and TLS protocols Open source Available on most platforms Full-strength general purpose cryptography library 71

72 Cryptography OpenSSL OpenSSL: Generating Keys RSA Private/Public Key Pair (Size 2048 bits) Protected by password openssl genrsa -des3 -out privkey.pem 2048 Without password protection openssl genrsa -out privkey.pem 2048 DSA Private/Public Key Pair 2048 bits, with password openssl dsaparam -out dsaparam.pem 2048 openssl gendsa -des3 -out privkey.pem dsaparam.pem 72

Intrusion Techniques

Intrusion Techniques Intrusion Techniques Mgr. Rudolf B. Blažek, Ph.D. Department of Systems Faculty of Information Technologies Czech Technical University in Prague Rudolf Blažek 2010-2011 Network Security MI-SIB, ZS 2011/12,

More information

OFTP2 kurs Odette File r Transfer ansfer Pr otocol

OFTP2 kurs Odette File r Transfer ansfer Pr otocol OFTP2 kurs Odette File Transfer Protocol 2 Version 0.8 Main data flows in between Trading Partners in various Business structures Bilateral Value chain Value network Flow of files in B2B EDI, sketch EDI

More information

Network Intrusion Goals and Methods

Network Intrusion Goals and Methods Network Intrusion Goals and Methods Mgr. Rudolf B. Blažek, Ph.D. Department of Computer Systems Faculty of Information Technologies Czech Technical University in Prague Rudolf Blažek 2010-2011 Network

More information

Network Security. Thierry Sans

Network Security. Thierry Sans Network Security Thierry Sans HTTP SMTP DNS BGP The Protocol Stack Application TCP UDP Transport IPv4 IPv6 ICMP Network ARP Link Ethernet WiFi The attacker is capable of confidentiality integrity availability

More information

Int ernet w orking. Internet Security. Literature: Forouzan: TCP/IP Protocol Suite : Ch 28

Int ernet w orking. Internet Security. Literature: Forouzan: TCP/IP Protocol Suite : Ch 28 Int ernet w orking Internet Security Literature: Forouzan: TCP/IP Protocol Suite : Ch 28 Internet Security Internet security is difficult Internet protocols were not originally designed for security The

More information

Interconnecting Cisco Networking Devices Part 1 (ICND1) Course Overview

Interconnecting Cisco Networking Devices Part 1 (ICND1) Course Overview Interconnecting Cisco Networking Devices Part 1 (ICND1) Course Overview This course will teach students about building a simple network, establishing internet connectivity, managing network device security,

More information

ECE 435 Network Engineering Lecture 23

ECE 435 Network Engineering Lecture 23 ECE 435 Network Engineering Lecture 23 Vince Weaver http://web.eece.maine.edu/~vweaver vincent.weaver@maine.edu 30 November 2017 HW#11 will be posted Announcements Don t forget projects next week Presentation

More information

Lecture 33. Firewalls. Firewall Locations in the Network. Castle and Moat Analogy. Firewall Types. Firewall: Illustration. Security April 15, 2005

Lecture 33. Firewalls. Firewall Locations in the Network. Castle and Moat Analogy. Firewall Types. Firewall: Illustration. Security April 15, 2005 Firewalls Lecture 33 Security April 15, 2005 Idea: separate local network from the Internet Trusted hosts and networks Intranet Firewall DMZ Router Demilitarized Zone: publicly accessible servers and networks

More information

TCP/IP Networking. Training Details. About Training. About Training. What You'll Learn. Training Time : 9 Hours. Capacity : 12

TCP/IP Networking. Training Details. About Training. About Training. What You'll Learn. Training Time : 9 Hours. Capacity : 12 TCP/IP Networking Training Details Training Time : 9 Hours Capacity : 12 Prerequisites : There are no prerequisites for this course. About Training About Training TCP/IP is the globally accepted group

More information

A+ Guide to Software: Managing, Maintaining, and Troubleshooting, 5e. Chapter 8 Networking Essentials

A+ Guide to Software: Managing, Maintaining, and Troubleshooting, 5e. Chapter 8 Networking Essentials A+ Guide to Software: Managing, Maintaining, and Troubleshooting, 5e Chapter 8 Networking Essentials Objectives Learn about the protocols and standards Windows uses for networking Learn how to connect

More information

Copyleft 2005, Binnur Kurt. Objectives

Copyleft 2005, Binnur Kurt. Objectives 1 ing Fundamentals Copyleft 2005, Binnur Kurt Objectives Define basic networking terms Describe some commonly used network applications Describe the main purposes and functions of computer networking Describe

More information

Statistical Aspects of Intrusion Detection

Statistical Aspects of Intrusion Detection Statistical Aspects of Intrusion Detection Mgr. Rudolf B. Blažek, Ph.D. Department of Computer Systems Faculty of Information Technologies Czech Technical University in Prague Rudolf Blažek 2010-2011 Network

More information

ECE 435 Network Engineering Lecture 23

ECE 435 Network Engineering Lecture 23 ECE 435 Network Engineering Lecture 23 Vince Weaver http://web.eece.maine.edu/~vweaver vincent.weaver@maine.edu 4 December 2018 Announcements HW#9 graded Don t forget projects next week Presentation schedule

More information

Threat Pragmatics & Cryptography Basics. PacNOG July, 2017 Suva, Fiji

Threat Pragmatics & Cryptography Basics. PacNOG July, 2017 Suva, Fiji Threat Pragmatics & Cryptography Basics PacNOG20 3-7 July, 2017 Suva, Fiji Issue Date: [31-12-2015] Revision: [V.1] Why Security? The Internet was initially designed for connectivity Trust is assumed,

More information

Distributed Systems. 27. Firewalls and Virtual Private Networks Paul Krzyzanowski. Rutgers University. Fall 2013

Distributed Systems. 27. Firewalls and Virtual Private Networks Paul Krzyzanowski. Rutgers University. Fall 2013 Distributed Systems 27. Firewalls and Virtual Private Networks Paul Krzyzanowski Rutgers University Fall 2013 November 25, 2013 2013 Paul Krzyzanowski 1 Network Security Goals Confidentiality: sensitive

More information

Integrating the Hardware Management Console s Broadband Remote Support Facility into your Enterprise

Integrating the Hardware Management Console s Broadband Remote Support Facility into your Enterprise System z Integrating the Hardware Management Console s Broadband Remote Support Facility into your Enterprise SC28-6880-00 System z Integrating the Hardware Management Console s Broadband Remote Support

More information

MTA_98-366_Vindicator930

MTA_98-366_Vindicator930 MTA_98-366_Vindicator930 Number: 98-366 Passing Score: 700 Time Limit: 45 min File Version: 1.0 http://www.gratisexam.com/ Microsoft Technology Associate Networking Fundamentals MTA 98-366 Exam A QUESTION

More information

CIT 380: Securing Computer Systems. Network Security Concepts

CIT 380: Securing Computer Systems. Network Security Concepts CIT 380: Securing Computer Systems Network Security Concepts Topics 1. Protocols and Layers 2. Layer 2 Network Concepts 3. MAC Spoofing 4. ARP 5. ARP Spoofing 6. Network Sniffing Protocols A protocol defines

More information

Network Security and Cryptography. 2 September Marking Scheme

Network Security and Cryptography. 2 September Marking Scheme Network Security and Cryptography 2 September 2015 Marking Scheme This marking scheme has been prepared as a guide only to markers. This is not a set of model answers, or the exclusive answers to the questions,

More information

Domain 1.0 Network Technologies

Domain 1.0 Network Technologies ExamForce.com CompTIA Network+ N10-004 Study Guide 1 Domain 1.0 Network Technologies Chapter 1 1.1 Explain the function of common networking protocols TCP TCP is a connection oriented protocol that provides

More information

E&CE 358: Tutorial 1. Instructor: Sherman (Xuemin) Shen TA: Miao Wang

E&CE 358: Tutorial 1. Instructor: Sherman (Xuemin) Shen TA: Miao Wang E&CE 358: Tutorial 1 Instructor: Sherman (Xuemin) Shen TA: Miao Wang Email: m59wang@uwaterloo.ca 1 About Tutorials TA: Miao Wang Office: EIT 3133; Tutorials: Th 4:30 5:20 pm Topics Supplementary knowledge

More information

Computer Networks SYLLABUS CHAPTER - 2 : NETWORK LAYER CHAPTER - 3 : INTERNETWORKING

Computer Networks SYLLABUS CHAPTER - 2 : NETWORK LAYER CHAPTER - 3 : INTERNETWORKING i SYLLABUS UNIT - 1 CHAPTER - 1 : INTRODUCTION Uses of Computer Networks, Network Hardware, Network Software, Reference Models (ISO-OSI, TCP/IP). CHAPTER - 2 : NETWORK LAYER Network Layer Design Issues,

More information

Hands-On TCP/IP Networking

Hands-On TCP/IP Networking Hands-On Course Description In this Hands-On TCP/IP course, the student will work on a live TCP/IP network, reinforcing the discussed subject material. TCP/IP is the communications protocol suite on which

More information

IPSec. Dr.Talal Alkharobi. IPsec (IP security)

IPSec. Dr.Talal Alkharobi. IPsec (IP security) IPSec IPsec (IP security) 2 A suite of protocols for securing Internet Protocol (IP) communications by authenticating and/or encrypting each IP packet in a data stream. IPsec also includes protocols for

More information

Layer 4: UDP, TCP, and others. based on Chapter 9 of CompTIA Network+ Exam Guide, 4th ed., Mike Meyers

Layer 4: UDP, TCP, and others. based on Chapter 9 of CompTIA Network+ Exam Guide, 4th ed., Mike Meyers Layer 4: UDP, TCP, and others based on Chapter 9 of CompTIA Network+ Exam Guide, 4th ed., Mike Meyers Concepts application set transport set High-level, "Application Set" protocols deal only with how handled

More information

Networks and Communications MS216 - Course Outline -

Networks and Communications MS216 - Course Outline - Networks and Communications MS216 - Course Outline - Objective Lecturer Times Overall Learning Outcomes Format Programme(s) The objective of this course is to develop in students an understanding of the

More information

Interconnecting Cisco Networking Devices Part1 ( ICND1) Exam.

Interconnecting Cisco Networking Devices Part1 ( ICND1) Exam. Cisco 640-822 Interconnecting Cisco Networking Devices Part1 ( ICND1) Exam TYPE: DEMO http://www.examskey.com/640-822.html Examskey Cisco 640-822 exam demo product is here for you to test quality of the

More information

Software Engineering 4C03 Answer Key

Software Engineering 4C03 Answer Key Software Engineering 4C03 Answer Key DAY CLASS Dr. William M. Farmer DURATION OF EXAMINATION: 2 Hours MCMASTER UNIVERSITY FINAL EXAMINATION April 2002 (1) [2 pts.] Conventional encryption cannot be used

More information

Lecture 08: Networking services: there s no place like

Lecture 08: Networking services: there s no place like Lecture 08: services: there s no place like 127.0.0.1 Hands-on Unix system administration DeCal 2012-10-15 1 / 22 About Common records Other records 2 / 22 About About Common records Other records Domain

More information

Advanced Security and Mobile Networks

Advanced Security and Mobile Networks WJ Buchanan. ASMN (1) Advanced Security and Mobile Networks Unit 1: Network Security Application Presentation Session Transport Network Data Link Physical OSI Application Transport Internet Internet model

More information

Lecture-4. TCP/IP-Overview:

Lecture-4. TCP/IP-Overview: Lecture-4 TCP/IP-Overview: The history goes back to ARPANET a research network sponsored by DoD US Govt. It eventually connected hundreds of universities and govt installations, using leased telephone

More information

TCP/IP Protocol Suite and IP Addressing

TCP/IP Protocol Suite and IP Addressing TCP/IP Protocol Suite and IP Addressing CCNA 1 v3 Module 9 10/11/2005 NESCOT CATC 1 Introduction to TCP/IP U.S. DoD created the TCP/IP model. Provides reliable data transmission to any destination under

More information

SE 4C03 Winter Final Examination Answer Key. Instructor: William M. Farmer

SE 4C03 Winter Final Examination Answer Key. Instructor: William M. Farmer SE 4C03 Winter 2003 Final Examination Answer Key Instructor: William M. Farmer (1) [2 pts.] Both the source and destination IP addresses are used to route IP datagrams. Is this statement true or false?

More information

exam. Number: Passing Score: 800 Time Limit: 120 min CISCO Interconnecting Cisco Networking Devices Part 1 (ICND)

exam. Number: Passing Score: 800 Time Limit: 120 min CISCO Interconnecting Cisco Networking Devices Part 1 (ICND) 100-105.exam Number: 100-105 Passing Score: 800 Time Limit: 120 min CISCO 100-105 Interconnecting Cisco Networking Devices Part 1 (ICND) Exam A QUESTION 1 Which route source code represents the routing

More information

( A ) 1. WAP is a (A) protocol (B) hardware (C) software (D) network architecture

( A ) 1. WAP is a (A) protocol (B) hardware (C) software (D) network architecture CS 742 Computer Communication Networks Final Exam - Name: Fall 2003 Part 1: (75 points - 3 points for each problem) ( A ) 1. WAP is a (A) protocol (B) hardware (C) software (D) network architecture ( C

More information

Introduction to Networking

Introduction to Networking Introduction to Networking Chapters 1 and 2 Outline Computer Network Fundamentals Defining a Network Networks Defined by Geography Networks Defined by Topology Networks Defined by Resource Location OSI

More information

Networking interview questions

Networking interview questions Networking interview questions What is LAN? LAN is a computer network that spans a relatively small area. Most LANs are confined to a single building or group of buildings. However, one LAN can be connected

More information

06/02/ Local & Metropolitan Area Networks. 0. Overview. Terminology ACOE322. Lecture 8 Network Security

06/02/ Local & Metropolitan Area Networks. 0. Overview. Terminology ACOE322. Lecture 8 Network Security 1 Local & Metropolitan Area Networks ACOE322 Lecture 8 Network Security Dr. L. Christofi 1 0. Overview As the knowledge of computer networking and protocols has become more widespread, so the threat of

More information

Protocol Architecture (2) Suguru Yamaguchi Nara Institute of Science and Technology Department of Information Science

Protocol Architecture (2) Suguru Yamaguchi Nara Institute of Science and Technology Department of Information Science Protocol Architecture (2) Suguru Yamaguchi Nara Institute of Science and Technology Department of Information Science History of computer network protocol development in 20 th century. Development of hierarchical

More information

Introduction to Computer Networks. CS 166: Introduction to Computer Systems Security

Introduction to Computer Networks. CS 166: Introduction to Computer Systems Security Introduction to Computer Networks CS 166: Introduction to Computer Systems Security Network Communication Communication in modern networks is characterized by the following fundamental principles Packet

More information

This course prepares candidates for the CompTIA Network+ examination (2018 Objectives) N

This course prepares candidates for the CompTIA Network+ examination (2018 Objectives) N CompTIA Network+ (Exam N10-007) Course Description: CompTIA Network+ is the first certification IT professionals specializing in network administration and support should earn. Network+ is aimed at IT

More information

Identify the features of network and client operating systems (Windows, NetWare, Linux, Mac OS)

Identify the features of network and client operating systems (Windows, NetWare, Linux, Mac OS) Course Outline Network+ Duration: 5 days (30 hours) Learning Objectives: Install and configure a network card Define the concepts of network layers Understand and implement the TCP/IP protocol Install

More information

Mobile MOUSe ROUTING AND SWITCHING FUNDAMENTALS ONLINE COURSE OUTLINE

Mobile MOUSe ROUTING AND SWITCHING FUNDAMENTALS ONLINE COURSE OUTLINE Mobile MOUSe ROUTING AND SWITCHING FUNDAMENTALS ONLINE COURSE OUTLINE COURSE TITLE ROUTING AND SWITCHING FUNDAMENTALS COURSE DURATION 16 Hour(s) of Self-Paced Interactive Training COURSE OVERVIEW In the

More information

Networks Fall This exam consists of 10 problems on the following 13 pages.

Networks Fall This exam consists of 10 problems on the following 13 pages. CSCI 466 Final Networks Fall 2011 Name: This exam consists of 10 problems on the following 13 pages. You may use your two- sided hand- written 8 ½ x 11 note sheet during the exam and a calculator. No other

More information

General Important Protocols for Examination of IA Examination 2018

General Important Protocols for Examination of IA Examination 2018 Protocol General Important Protocols for Examination of IA Examination 2018 DNS - Domain Name System - translates network address (such as IP addresses) into terms understood by humans (such as Domain

More information

Computer Network Programming. The Transport Layer. Dr. Sam Hsu Computer Science & Engineering Florida Atlantic University

Computer Network Programming. The Transport Layer. Dr. Sam Hsu Computer Science & Engineering Florida Atlantic University Computer Network Programming The Transport Layer Dr. Sam Hsu Computer Science & Engineering Florida Atlantic University The Transport Layer The Big Picture Overview of TCP/IP protocols TCP Packet Exchanges

More information

Appendix B Policies and Filters

Appendix B Policies and Filters Appendix B Policies and Filters NOTE: This appendix does not describe Access Control Lists (ACLs) or IPX SAP ACLs, which are additional methods for filtering packets. See Software-Based IP Access Control

More information

TCP/IP Fundamentals. Introduction. Practice Practice : Name. Date Period

TCP/IP Fundamentals. Introduction. Practice Practice : Name. Date Period Name Date Period TCP/IP Fundamentals Introduction For the Network+ Certification exam, you should be able to identify the class of an IP address, an APIPA IP address, and a private IP address as well as

More information

CSc 466/566. Computer Security. 18 : Network Security Introduction

CSc 466/566. Computer Security. 18 : Network Security Introduction 1/81 CSc 466/566 Computer Security 18 : Network Security Introduction Version: 2012/05/03 13:57:28 Department of Computer Science University of Arizona collberg@gmail.com Copyright c 2012 Christian Collberg

More information

Computer Networks (Unit wise Questions)

Computer Networks (Unit wise Questions) Unit I Unit II 1. What are different transmission modes?[4] 2. Encode the following binary data stream into Manchester and differential Manchester codes 1 1 0 0 1 0 1 0 [8] 3. What are different topologies

More information

Wireless-G Router User s Guide

Wireless-G Router User s Guide Wireless-G Router User s Guide 1 Table of Contents Chapter 1: Introduction Installing Your Router System Requirements Installation Instructions Chapter 2: Preparing Your Network Preparing Your Network

More information

Interconnecting Networks with TCP/IP. 2000, Cisco Systems, Inc. 8-1

Interconnecting Networks with TCP/IP. 2000, Cisco Systems, Inc. 8-1 Interconnecting Networks with TCP/IP 2000, Cisco Systems, Inc. 8-1 Objectives Upon completion of this chapter you will be able to perform the following tasks: Identify the IP protocol stack, its protocol

More information

key distribution requirements for public key algorithms asymmetric (or public) key algorithms

key distribution requirements for public key algorithms asymmetric (or public) key algorithms topics: cis3.2 electronic commerce 24 april 2006 lecture # 22 internet security (part 2) finish from last time: symmetric (single key) and asymmetric (public key) methods different cryptographic systems

More information

Study Guide. Module Two

Study Guide. Module Two Module Two Study Guide Study Guide Contents Part One -- Textbook Questions Part Two -- Assignment Questions Part Three -- Vocabulary Chapter 4 Data Link Layer What is the function of the data link layer?

More information

Network Access Layer Internet Layer Transport Layer Application Layer. Presentation. Transport. Physical

Network Access Layer Internet Layer Transport Layer Application Layer. Presentation. Transport. Physical TCP/IP AND INTERNET ADDRESSING TCP/IP (TRANSMISSION CONTROL PROTOCOL/INTERNET PROTOCOL) TCP/IP is the most common networking protocol suite used in the world, each computer or node connected to the internet

More information

SYLLABUS. osmania university CHAPTER - 3 : MEDIUM ACCESS CONTROL (MAC) SUBLAYER Standards, Bluetooth, Bridges and Routers.

SYLLABUS. osmania university CHAPTER - 3 : MEDIUM ACCESS CONTROL (MAC) SUBLAYER Standards, Bluetooth, Bridges and Routers. Contents i SYLLABUS osmania university UNIT - I CHAPTER - 1 : INTRODUCTION Data Communication, Network Topologies : LAN, WAN, MAN, Types : Bus, Star, Ring, Hybrid, Line Configurations, Reference Models

More information

CSC 6575: Internet Security Fall Attacks on Different OSI Layer Protocols OSI Layer Basic Attacks at Lower Layers

CSC 6575: Internet Security Fall Attacks on Different OSI Layer Protocols OSI Layer Basic Attacks at Lower Layers CSC 6575: Internet Security Fall 2017 Attacks on Different OSI Layer Protocols OSI Layer Basic Attacks at Lower Layers Mohammad Ashiqur Rahman Department of Computer Science College of Engineering Tennessee

More information

Solved MCQ of Computer networking. Set-1

Solved MCQ of Computer networking. Set-1 Solved MCQ of Computer networking Set-1 1. The computer network is A) Network computer with cable B) Network computer without cable C) Both of the above D) None of the above 2. FDDI used which type of

More information

Chapter 2. Switch Concepts and Configuration. Part II

Chapter 2. Switch Concepts and Configuration. Part II Chapter 2 Switch Concepts and Configuration Part II CCNA3-1 Chapter 2-2 Switch Concepts and Configuration Configuring Switch Security MAC Address Flooding Passwords Spoofing Attacks Console Security Tools

More information

Assignment - 1 Chap. 1 Wired LAN s

Assignment - 1 Chap. 1 Wired LAN s Assignment - 1 Chap. 1 Wired LAN s 1. (1 Mark) 1. Draw the frame format of Ethernet. 2. What is unicast, multicast and broadcast address? 3. State the purpose of CRC field. 2. (5 Marks) 1. Explain how

More information

CSC 4900 Computer Networks: Security Protocols (2)

CSC 4900 Computer Networks: Security Protocols (2) CSC 4900 Computer Networks: Security Protocols (2) Professor Henry Carter Fall 2017 Chapter 8 roadmap 8.1 What is network security? 8.2 Principles of cryptography 8.3 Message Integrity 8.4 End point Authentication

More information

access link basic service set (BSS) broadband cable ad hoc wireless network Address Resolution Protocol (ARP) broadcast broadcast domain

access link basic service set (BSS) broadband cable ad hoc wireless network Address Resolution Protocol (ARP) broadcast broadcast domain G l o s s a r y A access link A port on a switch that is used to link to an individual device. Most ports on switches are access links. ad hoc wireless network Offers equal sharing between devices without

More information

Lesson 5 TCP/IP suite, TCP and UDP Protocols. Chapter-4 L05: "Internet of Things ", Raj Kamal, Publs.: McGraw-Hill Education

Lesson 5 TCP/IP suite, TCP and UDP Protocols. Chapter-4 L05: Internet of Things , Raj Kamal, Publs.: McGraw-Hill Education Lesson 5 TCP/IP suite, TCP and UDP Protocols 1 TCP/IP Suite: Application layer protocols TCP/IP Suite set of protocols with layers for the Internet TCP/IP communication 5 layers: L7, L4, L3, L2 and L1

More information

Review: Networking Fall Final

Review: Networking Fall Final Review: Networking Fall Final Question 1 of 43 You have implemented a network where each device provides shared files with all other devices on the network. What type of network do you have? Peer to peer

More information

Stream Control Transmission Protocol - Wikipedia, the free encyclopedia

Stream Control Transmission Protocol - Wikipedia, the free encyclopedia Page 1 of 9 Stream Control Transmission Protocol From Wikipedia, the free encyclopedia In the field of The five-layer TCP/IP model 5. Application layer DHCP DNS FTP Gopher HTTP IMAP4 IRC NNTP XMPP MIME

More information

Fundamental Questions to Answer About Computer Networking, Jan 2009 Prof. Ying-Dar Lin,

Fundamental Questions to Answer About Computer Networking, Jan 2009 Prof. Ying-Dar Lin, Fundamental Questions to Answer About Computer Networking, Jan 2009 Prof. Ying-Dar Lin, ydlin@cs.nctu.edu.tw Chapter 1: Introduction 1. How does Internet scale to billions of hosts? (Describe what structure

More information

Application Note. Providing Secure Remote Access to Industrial Control Systems Using McAfee Firewall Enterprise (Sidewinder )

Application Note. Providing Secure Remote Access to Industrial Control Systems Using McAfee Firewall Enterprise (Sidewinder ) Application Note Providing Secure Remote Access to Industrial Control Systems Using McAfee Firewall Enterprise (Sidewinder ) This document describes how to configure McAfee Firewall Enterprise to provide

More information

Computer Forensics: Investigating Network Intrusions and Cybercrime, 2nd Edition. Chapter 2 Investigating Network Traffic

Computer Forensics: Investigating Network Intrusions and Cybercrime, 2nd Edition. Chapter 2 Investigating Network Traffic Computer Forensics: Investigating Network Intrusions and Cybercrime, 2nd Edition Chapter 2 Investigating Network Traffic Objectives After completing this chapter, you should be able to: Understand network

More information

On Distributed Communications, Rand Report RM-3420-PR, Paul Baran, August 1964

On Distributed Communications, Rand Report RM-3420-PR, Paul Baran, August 1964 The requirements for a future all-digital-data distributed network which provides common user service for a wide range of users having different requirements is considered. The use of a standard format

More information

Cisco 1: Networking Fundamentals

Cisco 1: Networking Fundamentals Western Technical College 10150110 Cisco 1: Networking Fundamentals Course Outcome Summary Course Information Description Career Cluster Instructional Level Total Credits 3.00 Total Hours 90.00 This course

More information

VoIP / RoIP for Technicians

VoIP / RoIP for Technicians Phase 4 Design, Inc VoIP / RoIP for Technicians Presented by Dave Grant Phase 4 Design, Inc dave@phase4.org 2017 Phase 4 Design, Inc Notes 2 2017, Phase 4 Design, Inc. Table of Contents What are we going

More information

20-CS Cyber Defense Overview Fall, Network Basics

20-CS Cyber Defense Overview Fall, Network Basics 20-CS-5155 6055 Cyber Defense Overview Fall, 2017 Network Basics Who Are The Attackers? Hackers: do it for fun or to alert a sysadmin Criminals: do it for monetary gain Malicious insiders: ignores perimeter

More information

Cryptography (Overview)

Cryptography (Overview) Cryptography (Overview) Some history Caesar cipher, rot13 substitution ciphers, etc. Enigma (Turing) Modern secret key cryptography DES, AES Public key cryptography RSA, digital signatures Cryptography

More information

while the LAN interface is in the DMZ. You can control access to the WAN port using either ACLs on the upstream router, or the built-in netfilter

while the LAN interface is in the DMZ. You can control access to the WAN port using either ACLs on the upstream router, or the built-in netfilter When the LAN interface is in a private IP DMZ, you can write the firewall rule-set to restrict the number of hosts the VBP can communicate with to only those devices. This enhances security. You can also

More information

THE INTERNET PROTOCOL INTERFACES

THE INTERNET PROTOCOL INTERFACES THE INTERNET PROTOCOL The Internet Protocol Stefan D. Bruda Winter 2018 A (connectionless) network protocol Designed for use in interconnected systems of packet-switched computer communication networks

More information

Reti di Calcolatori I

Reti di Calcolatori I Reti di Calcolatori I Prof. Roberto Canonico Dipartimento di Ingegneria Elettrica e delle Tecnologie dell Informazione Corso di Laurea in Ingegneria delle Telecomunicazioni Corso di Laurea in Ingegneria

More information

Fireware-Essentials. Number: Fireware Essentials Passing Score: 800 Time Limit: 120 min File Version: 7.

Fireware-Essentials.  Number: Fireware Essentials Passing Score: 800 Time Limit: 120 min File Version: 7. Fireware-Essentials Number: Fireware Essentials Passing Score: 800 Time Limit: 120 min File Version: 7.0 http://www.gratisexam.com/ Fireware Essentials Fireware Essentials Exam Exam A QUESTION 1 Which

More information

CS 356 Internet Security Protocols. Fall 2013

CS 356 Internet Security Protocols. Fall 2013 CS 356 Internet Security Protocols Fall 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists Chapter 5

More information

The Internet Protocol

The Internet Protocol The Internet Protocol Stefan D. Bruda Winter 2018 THE INTERNET PROTOCOL A (connectionless) network layer protocol Designed for use in interconnected systems of packet-switched computer communication networks

More information

ch02 True/False Indicate whether the statement is true or false.

ch02 True/False Indicate whether the statement is true or false. ch02 True/False Indicate whether the statement is true or false. 1. No matter what medium connects computers on a network copper wires, fiber-optic cables, or a wireless setup the same protocol must be

More information

7 Filtering and Firewalling

7 Filtering and Firewalling 7 Filtering and Firewalling 7.1 Introduction Security is becoming a major concern in IT, and A major concern in networking and the Internet, and wireless systems are probably more open to abuse than any

More information

Networking Fundamentals

Networking Fundamentals Networking Fundamentals Network Startup Resource Center www.nsrc.org These materials are licensed under the Creative Commons Attribution-NonCommercial 4.0 International license (http://creativecommons.org/licenses/by-nc/4.0/)

More information

Exam Questions SY0-401

Exam Questions SY0-401 Exam Questions SY0-401 CompTIA Security+ Certification https://www.2passeasy.com/dumps/sy0-401/ 1. A company has implemented PPTP as a VPN solution. Which of the following ports would need to be opened

More information

Lecture 17 Overview. Last Lecture. Wide Area Networking (2) This Lecture. Internet Protocol (1) Source: chapters 2.2, 2.3,18.4, 19.1, 9.

Lecture 17 Overview. Last Lecture. Wide Area Networking (2) This Lecture. Internet Protocol (1) Source: chapters 2.2, 2.3,18.4, 19.1, 9. Lecture 17 Overview Last Lecture Wide Area Networking (2) This Lecture Internet Protocol (1) Source: chapters 2.2, 2.3,18.4, 19.1, 9.2 Next Lecture Internet Protocol (2) Source: chapters 19.1, 19.2, 22,1

More information

Cisco Interconnecting Cisco Networking Devices Part 1.

Cisco Interconnecting Cisco Networking Devices Part 1. Cisco 100-105 Interconnecting Cisco Networking Devices Part 1 http://killexams.com/pass4sure/exam-detail/100-105 Question: 323 Refer to the exhibit. SwitchA receives the frame with the addressing shown.

More information

Introduction to Networks

Introduction to Networks Introduction to Networks Khaled Harras School of Computer Science Carnegie Mellon University 15-349 Computer and Network Security Fall 2012 Some material borrowed from Hui Zhang and Adrian Perrig 1 Early

More information

Protocols, Technologies and Standards Secure network protocols for the OSI stack P2.1 WLAN Security WPA, WPA2, IEEE i, IEEE 802.1X P2.

Protocols, Technologies and Standards Secure network protocols for the OSI stack P2.1 WLAN Security WPA, WPA2, IEEE i, IEEE 802.1X P2. P2 Protocols, Technologies and Standards Secure network protocols for the OSI stack P2.1 WLAN Security WPA, WPA2, IEEE 802.11i, IEEE 802.1X P2.2 IP Security IPsec transport mode (host-to-host), ESP and

More information

Chapter 2. Communicating Over The Network. CCNA1-1 Chapter 2

Chapter 2. Communicating Over The Network. CCNA1-1 Chapter 2 Chapter 2 Communicating Over The Network CCNA1-1 Chapter 2 Communicating Over the Network The Platform for Communications CCNA1-2 Chapter 2 Elements of Communication People communicate in many different

More information

Advanced Security and Forensic Computing

Advanced Security and Forensic Computing Advanced Security and Forensic Computing Unit 2: Network Security Elements Dr Dr Bill Buchanan, Reader, School of of Computing. >Unit 2: 2: Network Security Elements Advanced Security and Forensic Computing

More information

ipro-04n Security Configuration Guide

ipro-04n Security Configuration Guide Disclaimer: The contents of these notes does not specifically relate to any release of Firmware and may change without notice Status: uncontrolled 1 Introduction...5 2 Security package...6 2.1 Basic network

More information

TCP /IP Fundamentals Mr. Cantu

TCP /IP Fundamentals Mr. Cantu TCP /IP Fundamentals Mr. Cantu OSI Model and TCP/IP Model Comparison TCP / IP Protocols (Application Layer) The TCP/IP subprotocols listed in this layer are services that support a number of network functions:

More information

Gigabit SSL VPN Security Router

Gigabit SSL VPN Security Router As Internet becomes essential for business, the crucial solution to prevent your Internet connection from failure is to have more than one connection. PLANET is the ideal to help the SMBs increase the

More information

Networking and Health Information Exchange: ISO Open System Interconnection (OSI)

Networking and Health Information Exchange: ISO Open System Interconnection (OSI) Networking and Health Information Exchange: ISO Open System Interconnection (OSI) Lecture 4 Audio Transcript Slide 1 Welcome to Networking and Health Information Exchange, ISO Open System Interconnection

More information

When does it work? Packet Sniffers. INFO Lecture 8. Content 24/03/2009

When does it work? Packet Sniffers. INFO Lecture 8. Content 24/03/2009 Packet Sniffers INFO 404 - Lecture 8 24/03/2009 nfoukia@infoscience.otago.ac.nz Definition Sniffer Capabilities How does it work? When does it work? Preventing Sniffing Detection of Sniffing References

More information

ENEE 457: Computer Systems Security 11/07/16. Lecture 18 Computer Networking Basics

ENEE 457: Computer Systems Security 11/07/16. Lecture 18 Computer Networking Basics ENEE 457: Computer Systems Security 11/07/16 Lecture 18 Computer Networking Basics Charalampos (Babis) Papamanthou Department of Electrical and Computer Engineering University of Maryland, College Park

More information

The Internet Protocol (IP)

The Internet Protocol (IP) The Internet Protocol (IP) The Blood of the Internet (C) Herbert Haas 2005/03/11 "Information Superhighway is really an acronym for 'Interactive Network For Organizing, Retrieving, Manipulating, Accessing

More information

ICS 351: Networking Protocols

ICS 351: Networking Protocols ICS 351: Networking Protocols IP packet forwarding application layer: DNS, HTTP transport layer: TCP and UDP network layer: IP, ICMP, ARP data-link layer: Ethernet, WiFi 1 Networking concepts each protocol

More information

Chapter 7. Local Area Network Communications Protocols

Chapter 7. Local Area Network Communications Protocols Chapter 7 Local Area Network Communications Protocols The Network Layer The third layer of the OSI Model is the network layer. The network layer is concerned with providing a means for hosts to communicate

More information

Networking and Health Information Exchange Unit 1a ISO Open Systems Interconnection (OSI) Slide 1. Slide 2. Slide 3

Networking and Health Information Exchange Unit 1a ISO Open Systems Interconnection (OSI) Slide 1. Slide 2. Slide 3 Slide 1 Networking and Health Information Exchange Unit 1a ISO Open Systems Interconnection (OSI) Networking and Health Information Exchange Unit 1a ISO Open Systems Interconnection (OSI) Slide 2 Unit

More information

1. Which OSI layers offers reliable, connection-oriented data communication services?

1. Which OSI layers offers reliable, connection-oriented data communication services? CCNA 1 Practice Final Exam Answers v4.0 100% 1. Which OSI layers offers reliable, connection-oriented data communication services? application presentation session transport network 2. Refer to the exhibit.

More information