MIS Cryptography. Class 4

Size: px
Start display at page:

Download "MIS Cryptography. Class 4"

Transcription

1 MIS 5214 Cryptography Class 4

2 Agenda Cryptography Open Systems Interconnection (OSI) Reference Model Case Study The Titan Incident Quiz

3 Cryptography Method of transmitting and storing data in a form that only those it is intended for can read and process An effective way of protecting sensitive information as it is transmitted through untrusted network communication paths or stored on media Complements physical and logical access controls

4 The study of methods to break cryptosystems Often targeted at obtaining a key Attacks may be passive or active Kerckhoff s Principle The only secrecy involved with a cryptosystem should be the key Cryptosystem Strength How hard is it to determine the secret associated with the system?

5 Terminology Plaintext is the readable version of a message Ciphertext is the unreadable results after an encryption process is applied to the plaintext Cryptosystem includes all the necessary components for encryption and decryption Algorithms Keys Software Protocols Harris, S. and Maymi, F. (2016) All-In-One CISSP Exam Guide, McGraw Hill Education

6 Cipher = encryption algorithm 2 main attributes combined in a cypher 1. Confusion: usually carried out through substitution 2. Diffusion: Usually carried out through transposition Harris, S. and Maymi, F. (2016) All-In-One CISSP Exam Guide, McGraw Hill Education

7 Example: Substitution cipher or algorithm A mono-alphabetic substitution cipher SECURITY <=> HVXFIRGB Poly-alphabetic substitution cipher

8 Services of cryptosystems Repudiation the sender denying he sent the message Harris, S. and Maymi, F. (2016) All-In-One CISSP Exam Guide, McGraw Hill Education

9 XOR Exclusive OR Creating confusion through a binary mathematical function called exclusive OR, abbreviated as XOR Harris, S. and Maymi, F. (2016) All-In-One CISSP Exam Guide, McGraw Hill Education

10 One-Time Pad a perfect encryption scheme One-Time Pad Requirements Harris, S. and Maymi, F. (2016) All-In-One CISSP Exam Guide, McGraw Hill Education

11 2 main attributes combined in a cypher 1. Confusion: usually carried out through substitution 2. Diffusion: Usually carried out through transposition Harris, S. and Maymi, F. (2016) All-In-One CISSP Exam Guide, McGraw Hill Education

12 Dichotomies is cryptography Symmetric versus Asymmetric Stream versus block Synchronous versus Asynchronous 1-Way functions versus 2-Way functions

13 Symmetric versus asymmetric algorithms Symmetric cryptography Use a copied pair of symmetric (identical) secret keys The sender and the receive use the same key for encryption and decryption functions Asymmetric cryptography Also know as public key cryptography Use different ( asymmetric ) keys for encryption and decryption One is called the private key and the other is the public key

14 Symmetric cryptography Two types: Stream and Block Ciphers Stream Ciphers treat the message a stream of bits and performs mathematical functions on each bit individually Block Ciphers divide a message into blocks of bits and transforms the blocks one at a time

15 Symmetric Stream Ciphers Easy to implement in hardware Used in cell phones and Voice Over Internet Protocol Harris, S. and Maymi, F. (2016) All-In-One CISSP Exam Guide, McGraw Hill Education

16 Symmetric versus asymmetric algorithms Symmetric cryptography Use a copied pair of symmetric (identical) secret keys The sender and the receive use the same key for encryption and decryption functions Asymmetric cryptography Also know as public key cryptography Use different ( asymmetric ) keys for encryption and decryption One is called the private key and the other is the public key

17 Asymmetric cryptography Public and Private keys are mathematically related Public keys are generated from private key Private keys cannot be derived from the associated public key (if it falls into the wrong hands) Public key can be known by everyone Private key must be known and used only by the owner Asymmetric cryptography is computational intensive and much slower than symmetric cryptography Harris, S. and Maymi, F. (2016) All-In-One CISSP Exam Guide, McGraw Hill Education

18 Asymmetric cryptography Do not get confused and think the public key is only for encryption and private key is only for decryption! Each key type can be use used to encrypt and decrypt If data is encrypted with a private key it cannot be decrypted with the same private key (but it can be decrypted with the related public key) If data is encrypted with a public key it cannot be decrypted with the same public key (but it can be decrypted with the related private key)

19 Asymmetric cryptography If the sender ( Jill ) encrypts data with her private key, the receiver ( Bill ) must have a copy of Jill s public key to decrypt it By decrypting the message with Jill s public key Bill can be sure the message really came from Jill A message can be decrypted with a public key only if the message was encrypted with the corresponding private key This provides authentication because Jill is only the only one who is supposed to have her private key If Bill (the receiver) wants to make sure Jill is the only one who can read his reply, he will encrypt the response with her public key Only Jill will be able to decrypt the message, because she is the only one who has the necessary private key This provides confidentiality because only Jill is able to decrypt the message with her private key

20 Asymmetric cryptography Why would Bill (now the sender) choose to encrypt his reply to Jill with his private key instead of using Jill s public key? Authentication Bill wants Jill to know that the message came from him and no one else If he encrypted the data with Jill s public key, it does not provide authenticity because anyone can get Jill s public key If he uses his private key to encrypt the data, then Jill can be sure the message came from him and no one else Note: Symmetric keys do not provide authenticity because the same key is used on both ends (using one of the secret keys does not ensure the message originated from a specific individual

21 Asymmetric cryptography If confidentiality is the most important security service, the sender would encrypt the file with the receiver s public key This is called a secure message format because it can only be decrypted by the person with the corresponding private key If authentication is most important, the sender would encrypt the data with his private key This provides assurance to the receiver that the only person who could have encrypted the data is the individual in possession of the private key If the sender encrypted the data with receivers public key, authentication is not provided because the public key is available to anyone Encrypting data with the senders private key is called an open message format because anyone with a copy of the corresponding public key can decrypt the message Confidentiality is not assured

22 Hybrid Encryption (a.k.a. digital envelope ) Symmetric and asymmetric and algorithms are often used together Public key cryptography s asymmetric algorithm is used to create public and private keys for secure automated key distribution Symmetric algorithm is used to create secret keys for rapid encryption/decryption of bulk data Harris, S. and Maymi, F. (2016) All-In-One CISSP Exam Guide, McGraw Hill Education

23 Hybrid Encryption Symmetric algorithm uses a secret key to encrypt the message and the asymmetric key encrypts the secret key for transmission (SSL/TLS uses hybrid) Harris, S. and Maymi, F. (2016) All-In-One CISSP Exam Guide, McGraw Hill Education

24 Quick review 1. If a symmetric key is encrypted with a receiver s public key, what security service is provided?

25 Quick review 1. If a symmetric key is encrypted with a receiver s public key, what security service is provided? Confidentiality: only the receiver s private key can be used to decrypt the symmetric key, and only the receiver should have access to this private key

26 Quick review 2. If data is encrypted with the sender s private key, what security services is provided?

27 Quick review 2. If data is encrypted with the sender s private key, what security services are provided? Authenticity of the sender and nonrepudiation. If the receiver can decrypt the encrypted data with the sender s public key, then receiver knows the data was encrypted with the sender s private key

28 Quick review 3. Why do we encrypt the message with the symmetric key rather than the asymmetric key?

29 Quick review 3. Why do we encrypt the message with the symmetric key rather than the asymmetric key? Because the asymmetric key algorithm is too slow

30 Session keys Single-use symmetric keys used to encrypt messages between two users in an individual communication session This is how secure web client applications communicate with server-side services Harris, S. and Maymi, F. (2016) All-In-One CISSP Exam Guide, McGraw Hill Education

31 One-way Hash Assures message integrity A function that takes a variable-length string (i.e. message) and produces a fixedlength value called a hash value Does not use keys 1. Sender puts message through hashing function 2. Message digest generated 3. Message digest appended to the message 4. Sender sends message to receiver 5. Receiver puts message through hashing function 6. Receiver generates message digest value 7. Receiver compares the two message digests values. If they are the same, the message has not been altered

32 One-way hash example Testing the integrity of a file (e.g. program) downloaded from the internet

33 One-way hash example Testing the integrity of a file (e.g. program) from the internet Is the Kali I downloaded the same Kali that was published?

34 One-way hash example

35 One-way hash example

36

37 One-way hash example

38 One-way hash example Notice the amount of confusion and diffusion resulting from a 1 character change!

39 Digital Signature A hash value encrypted with the sender s private key The act of signing means encrypting the message s hash value with the private key Creating a digital signature for a message Harris, S. and Maymi, F. (2016) All-In-One CISSP Exam Guide, McGraw Hill Education

40 Small block of data generated with a secret key and appended to a message HMAC (RFC 2104) Uses hash instead of cipher for speed Used in SSL/TLS and IPSec

41 Cryptographic algorithms and their functions Harris, S. and Maymi, F. (2016) All-In-One CISSP Exam Guide, McGraw Hill Education

42 Reason Confidentiality The message can be encrypted How achieved Integrity The message can be hashed and/or digitally signed Authentication The message can be digitally signed Nonrepudiation The message can be digitally signed

43 Agenda Cryptography Open Systems Interconnection (OSI) Reference Model Case Study The Titan Incident Quiz

44 Telecommunication Models Electromagnetic transmission of data among systems Through digital, wireless and analog transmission types Models and standards of the following organizations have shaped our IT communication technology today International Telecommunication Union (ITU) International Standards Organization (ISO)

45 Information and Communications Technologies (ICT) Network protocol Standard set of rules that determines how systems communicate across networks Different systems can use the same protocol to communicate and understand each other despite their differences Windows Linux OSX

46 Open Systems Interconnection(OSI) Reference Model ISO Standard Computer 1 Computer 2 OSI Model Guidelines used by vendors, engineers, developers to develop products that enable computer systems to interoperate Open network architecture is Not owned by vendors and not proprietary Can easily integrate various technologies and vendor implementation of those technologies Graphics on the following slides come from Harris S. and Maymi F. (2016) All in One CISSP Exam Guide, Seventh Edition

47 Open Systems Interconnection(OSI) Reference Model ISO Standard OSI Model Guidelines used by vendors, engineers, developers to enable their systems to interoperate Layers networking tasks, protocols and services into different layers Each layer has its own responsibilities regarding how two computers communicate over a network Computer 1 Computer 2 Layer 8 Layer 7 Layer 6 Layer 5 Layer 4 Layer 3 Layer 2 Computer 1 Computer 2 Layer 1

48 Computers communicate via network Computer 1 Computer 2 Protocols function in specific OSI layers Each protocol on one computer communicates with the same corresponding protocol within the same OSI layer on another computer Via logical channels At the physical layer electronic/light signals are passed from one computer over a wire/fiber optic cable to the other computer

49 Encapsulation Process by which a protocol is used to enable two computers to communicate with each other within a specific OSI layer on each Computer 1 Computer 2 1. A message is constructed within a program on one computer and passed down through the network protocol s stack A protocol at each layer adds its own information to the message, and the message grows in size as it does down the protocol stack

50 Encapsulation 2. At the physical layer of the network the message is passed by the sending computer as bits via electronic or light pulses (on/off) across the network to the destination computer 3. At the destination computer the encapsulation is reversed taking the message apart via the protocols of each layer until the data is ready for the application processing

51 OSI Network Model A protocol at each layer expects the data in a particular format ( syntax ) and has specific responsibilities and control functions it performs on the data Control functions are added by the protocols at each layer in the form of headers and trailers of the datagram/packet/frame Each layer has a connection point ( interface ) that allows it to communicate with 3 other layers, communications with: 1. Interface of the layer above 2. Interface of the layer below it 3. Communications with the same layer in the interface of the destination computer

52 OSI Layers Specifications for each layer s interface is very structured Implementing international standard protocols and interfaces within different vendors technologies makes them part of an open system in which computers can communicate with one another Being part of an open system of protocols makes the different layers of a common network stack vulnerable and targets of attack A network can be: 1. Used as a channel of an attack i.e. as a resource for an attacker For example: Attacker sends a virus via a network channel from one system to another 2. The target of an attack For example: Attacker carries out a denial-of-service (DoS) attack which sends a large volume of badly formed protocol message traffic over a network link to bog it down

53 Layer 7: Application Layer Works closest to the user providing protocols that support the user s applications For example: File transmissions, message exchanges, terminal sessions When an application needs to send data over the network, it passes instructions and the data through the protocols that support it at the application layer Application layer properly formats the data and sends it down to the presentation layer (after data makes it through all the layers it has all the information needed to transmit it over the network)

54 Layer 7: Application Layer Protocols functioning at this layer communicate include: SMTP Simple Mail Transfer Protocol HTTP Hyper Text Transfer Protocol DNS Domain Name System IRC Internet Relay Chat LPD Line Printer Daemon Applications communicate with Layer 7 protocols by sending requests using Application Program Interface (API) libraries E.g. Outlook user clicks send, and the client sends this information to SMTP which adds information to the user s message and passes it down to the Presentation Layer

55 Layer 6: Presentation Layer Receives data from the application layer protocol and puts it in a standard format with annotation that enables any process operating at Layer 6 on destination computer can understand Presentation layer 1. Translates the format of data an application is using into a standard format used for passing messages over a network 2. Adds file type data to tell destination computer the file type and how to process and present it 3. Handles compression and encryption requests and adds data that enables the receiving computer to know how to decompress and decrypt the data Application layer properly formats the data and sends it down to the presentation layer (after data makes it through all the layers it has all the information needed to transmit it over the network)

56 Layer 6: Presentation Layer Protocols functioning at this layer communicate include: MIME Multipurpose Internet Main Extensions standards TIFF - Tagged Image File Format GIF Graphic Interchange Format JPEG Joint Photographic Experts Group For example, user compresses file on Windows computer with WinZip sends it to someone on Linux computer When the Linux computer receives the file, it looks at the file header, interprets the header s MIME type (Content-Type: application/zip) and knows what application can decompress the file If systems does not have WinZip or other program that understands the compression/decompression instructions, the file will be presented to the user with an unassociated icon

57 Layer 5: Session Layer When two applications need to communicate or transfer data between themselves, Layer 5 is responsible for: 1. Establishing a connection between two applications 2. Dialog management to maintain the connection during the transfer of data Restarts and recovers the session to maintain the connection if needed 3. Controlling release of the connection Provides inter-process communication channels, enables one software module on a local system to call a second software module running on a remote system. The results of the second module are retuned to the first system over the same session protocol channel This is how the RPC (Remote Procedure Call) protocol works The session layer protocol enables 3 different modes of communications between 2 applications running on different computers across the network: 1. Simplex: Communication takes place in one direction (very seldom used) 2. Half-duplex: Communication takes place in both directions, but only one application can send information at a time 3. Full-duplex: Communication takes place in both directions, and both applications can send information at the same time

58 Layer 5: Session Layer Provides inter-process communication channels, enables one software module on a local system to call a second software module running on a remote system. The results of the second module are retuned to the first system over the same session protocol channel Protocols include: PAP Password Authentication Protocol PPTP Point to Point Tunneling Protocol NetBIOS Network Basic Input Output System RPC Remote Procedure Call Session layer protocols provide the middleware functionality that connects and maintains the connection between software applications on different computers as they communicate (i.e. application to application communication) Client-server model Service oriented architecture (SOA)

59 Layer 5: Session Layer One security issue affecting the session layer common to inter-process communication software (e.g. RPC) is the lack of authentication or use of weak authentication Example mitigation: Use SRPC Secure RPC Requires authentication to take place before two computers located in different locations are able to communicate with each other Session layer protocols need to secure authentication capabilities, however, which use shared secret keys, public keys, or Kerberos tickets Unused Session Layer protocols should be identified and disabled on systems to decrease the chance of them getting exploited RPC and NetBIOS and similar distributed processing calls usually only take place within a single organization s network, thus firewalls should be configured to filter this dangerous traffic and prevent it into or out of the network

60 Layer 4: Transport Layer Establishes a logical connection between two computer systems and provides end-to-end data transport services Provides connection level protocols for two computers to engage in a handshaking process and agree on parameters for: 1. How much data each computer will send at a time 2. How to verify data integrity once received 3. How to determine if a data packet was lost Receives data from different applications and assembles their data into a stream for transmission over the network

61 Layer 4: Transport Layer Transport layer protocol controls data flow across computer to computer connections without tracking connections between individual pairs of applications communicating across the network Protocols: TCP Transmission Control Protocol Connection-oriented provides reliable data transmission UDP User Datagram Protocol Connectionless TLS Transport Layer Security protocol, straddles both Session and Transport layers After the Transport Layer appends it s information to the data message, it is called either a TCP segment or a UDP Packet

62 Layer 3: Network Layer s Routing protocols Build and maintain routing tables Routing tables are maps of the network Determine best route to send packet from source computer to destination computer Inserts information into the data packet s header consisting of addresses (source and destination) and routes to their destination Do not guarantee delivery of packets Transport layer protocols catch problems and resend packets as needed (TCP not UDP) Protocols IP Internet Protocol ICMP Internet Control Message Protocol RIP Routing Information Protocol OSPF Open Shortest Path First IPX Internet Packet Exchange Routers operate on OSI Layer 3 After the Network Layer appends it s information to the data message, it converts it to binary format and the unit of data is called a packet Computer 1 Computer 2

63 Layer 2: Data Link Layer Translates the data packet with header/footer information accumulated from layers above into LAN (Local Area Network) or WAN (Wide Area Network) binary format for transmission over the network transmission line After the network layer adds its routing information into the data packet, it passes the packet to the Data Link Layer s LCC sublayer LCC sublayer takes care of flow of control and error checking and passes it to the MAC sublayer Framing is the name of the process when the data link layer applies its header and trailer to the data message The unit of data is called a frame Switches operation on OSI Layer 2

64 Layer 2: Data Link Layer The MAC sublayer determines if the data will be transmitted over a LAN or WAN, the network type and protocols and puts the last header and trailer on the packet before it is put on the wire and transmitted Each network type uses different protocols, NICs (network interface cards), cables, and transmission methods The MAC sublayer determines the format of the data frame for transmission over the particular type network the computer s NIC is attached to the following protocols: Ethernet (IEEE 802.3) Token Ring (IEEE 802.3) FDDI Fiber Distributed Data Interface Wireless Ethernet (IEEE ) Other protocols at this layer include: ARP Address Resolution Protocol RARP Reverse Address Resolution Protocol SLIP Serial Line Internet Protocol (SLIP) Each component has a different: Header data format structure Protocol for physical transmission across the network type (coaxial, twisted pair, fiber optic cable; or wireless) The computer s network card bridges the data link and physical layers, takes data passed down from the user s application through the 6 layers above and its network card driver encodes the bits at the data link layer

65 Layer 1: Physical Layer The NIC Produces and interprets electromagnetic signals Converts bits into signals or voltages suitable for transmission across the LAN or WAN technology it is connected Determines synchronization, data transfer rates, line noise and transmission techniques based on the physical connection to electrical, optical or mechanical equipment E.g. A 1 bit transmitted via Ethernet would be translated by the NIC to +0.5-volt electric signal, and 0 bit would be transmitted as 0-volts TIA Telecommunications Industry Association EIA Electronic Industry Alliance Standard interfaces at this layer include: RS/EIA/TIA-422, RS/EIA/TIA-423, RS/EIA/TIA-429, RS/EIA/TIA-449, RS/EIA/TIA Base-T, 10Base2, 10Base5, 100Base-TX, 100Base-FX, 100Base-T, 1000Base-T, 1000-Base-SX

66 Layer 1: Physical Layer Data/file requests and terminals Standard formats, encryption, compression Applications communicating data Computers communicating Routing packets formed Data frames ready for transfer Signal processing

67 Layer 7 Domain Name e.g. mycomputer.temple.edu Layer 6 Layer 5 Layer 4 Layer 3 IP Address e.g. xxx.xxx.xxx.xxx Layer 2 MAC (Media Access Control) Address Layer 1 Switch Note: Synonyms for host computer across the OSI Model

68 At what layer(s) of the OSI model did the Titan attack take place? Data/file requests and terminals Standard formats, encryption, compression Applications communicating data Computers communicating Routing packets formed Data frames ready for transfer Signal processing

69 Agenda Cryptography Open Systems Interconnection (OSI) Reference Model Case Study The Titan Incident Quiz

70 How did the attacker attack the Titan cluster?

71 Agenda Cryptography Open Systems Interconnection (OSI) Reference Model Case Study The Titan Incident Quiz

Protecting Information Assets - Week 11 - Cryptography, Public Key Encryption and Digital Signatures. MIS 5206 Protecting Information Assets

Protecting Information Assets - Week 11 - Cryptography, Public Key Encryption and Digital Signatures. MIS 5206 Protecting Information Assets Protecting Information Assets - Week 11 - Cryptography, Public Key Encryption and Digital Signatures MIS5206 Week 11 Identity and Access Control Week 10 continued Cryptography, Public Key Encryption and

More information

(2½ hours) Total Marks: 75

(2½ hours) Total Marks: 75 (2½ hours) Total Marks: 75 N. B.: (1) All questions are compulsory. (2) Makesuitable assumptions wherever necessary and state the assumptions made. (3) Answers to the same question must be written together.

More information

Data Communication and Network. Introducing Networks

Data Communication and Network. Introducing Networks Data Communication and Network Introducing Networks Introduction to Networking Computer network, or simply network Refers to the connection of two or more computers by some type of medium You can connect

More information

CS-461 Internetworking. Dr. Mohamed Aboutabl

CS-461 Internetworking. Dr. Mohamed Aboutabl CS-461 Internetworking Dr. Mohamed Aboutabl http://www.cs.jmu.edu/users/aboutams The McGraw-Hill Companies, Inc., 2000 1 Chapter 1 Introduction The McGraw-Hill Companies, Inc., 2000 2 Internet today Network

More information

ITEC 3800 Data Communication and Network. Introducing Networks

ITEC 3800 Data Communication and Network. Introducing Networks ITEC 3800 Data Communication and Network Introducing Networks Introduction to Networking Computer network, or simply network Refers to the connection of two or more computers by some type of medium You

More information

Chapter -4 OSI Reference Model

Chapter -4 OSI Reference Model Chapter -4 OSI Reference Model Objectives Concept of Reference Model. OSI Reference Model Concept. Layers of OSI Reference Model. 4.1 Introduction Layered Architecture, Peer-to- Peer Processes, Interfaces

More information

Computer Networks (Introduction to TCP/IP Protocols)

Computer Networks (Introduction to TCP/IP Protocols) Network Security(CP33925) Computer Networks (Introduction to TCP/IP Protocols) 부산대학교공과대학정보컴퓨터공학부 Network Type Elements of Protocol OSI Reference Model OSI Layers What we ll learn today 2 Definition of

More information

Part VI. Appendixes. Appendix A OSI Model and Internet Protocols Appendix B About the CD

Part VI. Appendixes. Appendix A OSI Model and Internet Protocols Appendix B About the CD Part VI Appendixes Appendix A OSI Model and Internet Protocols Appendix B About the CD OSI Model and Internet Protocols APPENDIX A In this appendix, you will Learn about the OSI model Review the network

More information

Chapter 2. Communicating Over The Network. CCNA1-1 Chapter 2

Chapter 2. Communicating Over The Network. CCNA1-1 Chapter 2 Chapter 2 Communicating Over The Network CCNA1-1 Chapter 2 Communicating Over the Network The Platform for Communications CCNA1-2 Chapter 2 Elements of Communication People communicate in many different

More information

Protocol Architecture (2) Suguru Yamaguchi Nara Institute of Science and Technology Department of Information Science

Protocol Architecture (2) Suguru Yamaguchi Nara Institute of Science and Technology Department of Information Science Protocol Architecture (2) Suguru Yamaguchi Nara Institute of Science and Technology Department of Information Science History of computer network protocol development in 20 th century. Development of hierarchical

More information

E&CE 358: Tutorial 1. Instructor: Sherman (Xuemin) Shen TA: Miao Wang

E&CE 358: Tutorial 1. Instructor: Sherman (Xuemin) Shen TA: Miao Wang E&CE 358: Tutorial 1 Instructor: Sherman (Xuemin) Shen TA: Miao Wang Email: m59wang@uwaterloo.ca 1 About Tutorials TA: Miao Wang Office: EIT 3133; Tutorials: Th 4:30 5:20 pm Topics Supplementary knowledge

More information

Defining Networks with the OSI Model. Module 2

Defining Networks with the OSI Model. Module 2 Defining Networks with the OSI Model Module 2 Objectives Skills Concepts Objective Domain Description Objective Domain Number Understanding OSI Basics Defining the Communications Subnetwork Defining the

More information

Computer Network : Lecture Notes Nepal Engineering College Compiled by: Junior Professor: Daya Ram Budhathoki Nepal Engineering college, Changunarayan

Computer Network : Lecture Notes Nepal Engineering College Compiled by: Junior Professor: Daya Ram Budhathoki Nepal Engineering college, Changunarayan Computer Network : Lecture Notes Nepal Engineering College Compiled by: Junior Professor: Daya Ram Budhathoki Nepal Engineering college, Changunarayan Chapter3: OSI Reference Model: Network Software: Network

More information

Chapter 2. Communicating Over The Network

Chapter 2. Communicating Over The Network Chapter 2 Communicating Over The Network CCNA1-1 Chapter 2 Note for Instructors These presentations are the result of a collaboration among the instructors at St. Clair College in Windsor, Ontario. Thanks

More information

Lecture 3 Protocol Stacks and Layering

Lecture 3 Protocol Stacks and Layering Lecture 3 Protocol Stacks and ing Hui Zhang School of Computer Science Carnegie Mellon University 15-441 Networking, Fall 2007 http://www.cs.cmu.edu/~srini/15-441/f07/ 1 What is a Communication Network?

More information

Cryptographic Concepts

Cryptographic Concepts Outline Identify the different types of cryptography Learn about current cryptographic methods Chapter #23: Cryptography Understand how cryptography is applied for security Given a scenario, utilize general

More information

Chapter 2 Communicating Over the Network

Chapter 2 Communicating Over the Network Chapter 2 Communicating Over the Network Elements of Communication Communicating the Messages Continuous stream of bits 00101010100101010101010101010101010 I have to wait Single communications (e.g. video,

More information

06/02/ Local & Metropolitan Area Networks. 0. Overview. Terminology ACOE322. Lecture 8 Network Security

06/02/ Local & Metropolitan Area Networks. 0. Overview. Terminology ACOE322. Lecture 8 Network Security 1 Local & Metropolitan Area Networks ACOE322 Lecture 8 Network Security Dr. L. Christofi 1 0. Overview As the knowledge of computer networking and protocols has become more widespread, so the threat of

More information

Networking and Health Information Exchange Unit 1a ISO Open Systems Interconnection (OSI) Slide 1. Slide 2. Slide 3

Networking and Health Information Exchange Unit 1a ISO Open Systems Interconnection (OSI) Slide 1. Slide 2. Slide 3 Slide 1 Networking and Health Information Exchange Unit 1a ISO Open Systems Interconnection (OSI) Networking and Health Information Exchange Unit 1a ISO Open Systems Interconnection (OSI) Slide 2 Unit

More information

Communicating over the Network

Communicating over the Network Communicating over the Network Network Fundamentals Chapter 2 Version 4.0 1 Network Structure The elements of communication 3 common elements of communication Message source people/electronic devices need

More information

Chapter 2 Network Models 2.1

Chapter 2 Network Models 2.1 Chapter 2 Network Models 2.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 2-1 LAYERED TASKS We use the concept of layers in our daily life. As an example,

More information

Solved MCQ of Computer networking. Set-1

Solved MCQ of Computer networking. Set-1 Solved MCQ of Computer networking Set-1 1. The computer network is A) Network computer with cable B) Network computer without cable C) Both of the above D) None of the above 2. FDDI used which type of

More information

Computer Security. 08r. Pre-exam 2 Last-minute Review Cryptography. Paul Krzyzanowski. Rutgers University. Spring 2018

Computer Security. 08r. Pre-exam 2 Last-minute Review Cryptography. Paul Krzyzanowski. Rutgers University. Spring 2018 Computer Security 08r. Pre-exam 2 Last-minute Review Cryptography Paul Krzyzanowski Rutgers University Spring 2018 March 26, 2018 CS 419 2018 Paul Krzyzanowski 1 Cryptographic Systems March 26, 2018 CS

More information

The OSI Model. Open Systems Interconnection (OSI). Developed by the International Organization for Standardization (ISO).

The OSI Model. Open Systems Interconnection (OSI). Developed by the International Organization for Standardization (ISO). Network Models The OSI Model Open Systems Interconnection (OSI). Developed by the International Organization for Standardization (ISO). Model for understanding and developing computer-to-computer communication

More information

Network Security and Cryptography. 2 September Marking Scheme

Network Security and Cryptography. 2 September Marking Scheme Network Security and Cryptography 2 September 2015 Marking Scheme This marking scheme has been prepared as a guide only to markers. This is not a set of model answers, or the exclusive answers to the questions,

More information

Fundamentals of Networking. OSI & TCP/IP Model. Kuldeep Sonar 1

Fundamentals of Networking. OSI & TCP/IP Model. Kuldeep Sonar 1 Fundamentals of Networking OSI & TCP/IP Model Kuldeep Sonar 1 Kuldeep Sonar 2 OSI Model Kuldeep Sonar 3 Application Layer Layer 7 provides an interface between a host s communication software and any necessary

More information

Lecture (02) Network Protocols and Standards

Lecture (02) Network Protocols and Standards Lecture (02) Network Protocols and Standards Dr. Ahmed M. ElShafee 1 Agenda - - 2 Preface Protocols and standards are what make networks work together. Protocols make it possible for the various components

More information

CSE 3461/5461: Introduction to Computer Networking and Internet Technologies. Network Security. Presentation L

CSE 3461/5461: Introduction to Computer Networking and Internet Technologies. Network Security. Presentation L CS 3461/5461: Introduction to Computer Networking and Internet Technologies Network Security Study: 21.1 21.5 Kannan Srinivasan 11-27-2012 Security Attacks, Services and Mechanisms Security Attack: Any

More information

Int ernet w orking. Internet Security. Literature: Forouzan: TCP/IP Protocol Suite : Ch 28

Int ernet w orking. Internet Security. Literature: Forouzan: TCP/IP Protocol Suite : Ch 28 Int ernet w orking Internet Security Literature: Forouzan: TCP/IP Protocol Suite : Ch 28 Internet Security Internet security is difficult Internet protocols were not originally designed for security The

More information

CSC 474/574 Information Systems Security

CSC 474/574 Information Systems Security CSC 474/574 Information Systems Security Topic 2.1 Introduction to Cryptography CSC 474/574 By Dr. Peng Ning 1 Cryptography Cryptography Original meaning: The art of secret writing Becoming a science that

More information

OSI Model. Teran Subasinghe MBCS, Bsc.(Hons) in Computer Science - University of Greenwich, UK

OSI Model. Teran Subasinghe MBCS, Bsc.(Hons) in Computer Science - University of Greenwich, UK OSI Model Teran Subasinghe MBCS, Bsc.(Hons) in Computer Science - University of Greenwich, UK What is OSI Model? Open Systems Interconnection Reference Model Developed in 1984 by the International Standards

More information

Chapter 2 - Part 1. The TCP/IP Protocol: The Language of the Internet

Chapter 2 - Part 1. The TCP/IP Protocol: The Language of the Internet Chapter 2 - Part 1 The TCP/IP Protocol: The Language of the Internet Protocols A protocol is a language or set of rules that two or more computers use to communicate 2 Protocol Analogy: Phone Call Parties

More information

Network Security and Cryptography. December Sample Exam Marking Scheme

Network Security and Cryptography. December Sample Exam Marking Scheme Network Security and Cryptography December 2015 Sample Exam Marking Scheme This marking scheme has been prepared as a guide only to markers. This is not a set of model answers, or the exclusive answers

More information

Identify the features of network and client operating systems (Windows, NetWare, Linux, Mac OS)

Identify the features of network and client operating systems (Windows, NetWare, Linux, Mac OS) Course Outline Network+ Duration: 5 days (30 hours) Learning Objectives: Install and configure a network card Define the concepts of network layers Understand and implement the TCP/IP protocol Install

More information

2.1 Basic Cryptography Concepts

2.1 Basic Cryptography Concepts ENEE739B Fall 2005 Part 2 Secure Media Communications 2.1 Basic Cryptography Concepts Min Wu Electrical and Computer Engineering University of Maryland, College Park Outline: Basic Security/Crypto Concepts

More information

Operating Systems Design Exam 3 Review: Spring Paul Krzyzanowski

Operating Systems Design Exam 3 Review: Spring Paul Krzyzanowski Operating Systems Design Exam 3 Review: Spring 2012 Paul Krzyzanowski pxk@cs.rutgers.edu 1 Question 1 An Ethernet device driver implements the: (a) Data Link layer. (b) Network layer. (c) Transport layer.

More information

Copyleft 2005, Binnur Kurt. Objectives

Copyleft 2005, Binnur Kurt. Objectives 1 ing Fundamentals Copyleft 2005, Binnur Kurt Objectives Define basic networking terms Describe some commonly used network applications Describe the main purposes and functions of computer networking Describe

More information

Chapter 8 Network Security

Chapter 8 Network Security Chapter 8 Network Security A note on the use of these ppt slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you can add, modify, and

More information

Networking and Health Information Exchange: ISO Open System Interconnection (OSI)

Networking and Health Information Exchange: ISO Open System Interconnection (OSI) Networking and Health Information Exchange: ISO Open System Interconnection (OSI) Lecture 4 Audio Transcript Slide 1 Welcome to Networking and Health Information Exchange, ISO Open System Interconnection

More information

Lecture 33. Firewalls. Firewall Locations in the Network. Castle and Moat Analogy. Firewall Types. Firewall: Illustration. Security April 15, 2005

Lecture 33. Firewalls. Firewall Locations in the Network. Castle and Moat Analogy. Firewall Types. Firewall: Illustration. Security April 15, 2005 Firewalls Lecture 33 Security April 15, 2005 Idea: separate local network from the Internet Trusted hosts and networks Intranet Firewall DMZ Router Demilitarized Zone: publicly accessible servers and networks

More information

and Networks Data Communications Second Edition Tata McGraw Hill Education Private Limited Managing Director SoftExcel Services Limited, Mumbai

and Networks Data Communications Second Edition Tata McGraw Hill Education Private Limited Managing Director SoftExcel Services Limited, Mumbai Data Communications and Networks Second Edition ACHYUT S GODBOLE Managing Director SoftExcel Services Limited, Mumbai ATUL KAHATE Senior Consultant Oracle Financial Services Software Limited, Pune Tata

More information

Concept Questions Demonstrate your knowledge of these concepts by answering the following questions in the space that is provided.

Concept Questions Demonstrate your knowledge of these concepts by answering the following questions in the space that is provided. 223 Chapter 19 Inter mediate TCP The Transmission Control Protocol/Internet Protocol (TCP/IP) suite of protocols was developed as part of the research that the Defense Advanced Research Projects Agency

More information

Networking Models OSI Model Created by International Organization Standardization

Networking Models OSI Model Created by International Organization Standardization Networking Models OSI Model Created by International Organization Standardization Prepared by Agha Mohammad Haidari Network Manager ICT Directorate Ministry of Communication & IT Email : Agha.m@mcit.gov.af

More information

OSI Reference Model. Computer Networks lab ECOM Prepared By : Eng. Motaz Murtaja Eng. Ola Abd Elatief

OSI Reference Model. Computer Networks lab ECOM Prepared By : Eng. Motaz Murtaja Eng. Ola Abd Elatief Islamic University of Gaza Faculty of Engineering Computer Engineering Department Computer Networks lab ECOM 4121 OSI Reference Model Prepared By : Eng. Motaz Murtaja Eng. Ola Abd Elatief May /2010 OSI

More information

Data Communication & Computer Networks MCQ S

Data Communication & Computer Networks MCQ S Data Communication & Computer Networks MCQ S 1. The translates internet domain and host names to IP address. a) domain name system b) routing information protocol c) network time protocol d) internet relay

More information

The Data Link Layer. 32 PART I Networking Basics

The Data Link Layer. 32 PART I Networking Basics 32 PART I Networking Basics weather station. More realistic devices use duplex mode, where all systems can send or receive with equal facility. This is often further distinguished as half-duplex (the system

More information

Principles of Information Security, Fourth Edition. Chapter 8 Cryptography

Principles of Information Security, Fourth Edition. Chapter 8 Cryptography Principles of Information Security, Fourth Edition Chapter 8 Cryptography Learning Objectives Upon completion of this material, you should be able to: Chronicle the most significant events and discoveries

More information

L13. Reviews. Rocky K. C. Chang, April 10, 2015

L13. Reviews. Rocky K. C. Chang, April 10, 2015 L13. Reviews Rocky K. C. Chang, April 10, 2015 1 Foci of this course Understand the 3 fundamental cryptographic functions and how they are used in network security. Understand the main elements in securing

More information

1. IPv6 is the latest version of the TCP/IP protocol. What are some of the important IPv6 requirements?

1. IPv6 is the latest version of the TCP/IP protocol. What are some of the important IPv6 requirements? 95 Chapter 7 TCP/IP Protocol Suite and IP Addressing This chapter presents an overview of the TCP/IP Protocol Suite. It starts with the history and future of TCP/IP, compares the TCP/IP protocol model

More information

Lecture Outline. Lecture 2. OSI model and networking. The OSI model and networking. The OSI model and networking. The OSI model and networking

Lecture Outline. Lecture 2. OSI model and networking. The OSI model and networking. The OSI model and networking. The OSI model and networking Lecture 2 The OSI model Chapter 2, specifically pages 42-58 Dave Novak School of Business Administration, University of Vermont Sources: 1) Network+ Guide to Networks, Dean 2013 2) Comer, Computer Networks

More information

Most Common Security Threats (cont.)

Most Common Security Threats (cont.) Most Common Security Threats (cont.) Denial of service (DoS) attack Distributed denial of service (DDoS) attack Insider attacks. Any examples? Poorly designed software What is a zero-day vulnerability?

More information

The OSI Model. Level 3 Unit 9 Computer Networks

The OSI Model. Level 3 Unit 9 Computer Networks The OSI Model OSI Model Consider the network models we have already covered Whenever data is transferred from PC to PC or PC to Server it will travel through the Layers of the OSI Model OSI Model OSI Model

More information

CCNA Guide to Cisco Networking, Third Edition

CCNA Guide to Cisco Networking, Third Edition Review Questions 1. Which of the following best describes the Presentation layer? b. Translates, encrypts, or prepares data from the Application layer for network transmission c. Handles routing information

More information

Introduction to computer networking

Introduction to computer networking edge core Introduction to computer networking Comp Sci 3600 Security Outline edge core 1 2 edge 3 core 4 5 6 The edge core Outline edge core 1 2 edge 3 core 4 5 6 edge core Billions of connected computing

More information

APNIC elearning: Cryptography Basics

APNIC elearning: Cryptography Basics APNIC elearning: Cryptography Basics 27 MAY 2015 03:00 PM AEST Brisbane (UTC+10) Issue Date: Revision: Introduction Presenter Sheryl Hermoso Training Officer sheryl@apnic.net Specialties: Network Security

More information

THE OSI MODEL. Application Presentation Session Transport Network Data-Link Physical. OSI Model. Chapter 1 Review.

THE OSI MODEL. Application Presentation Session Transport Network Data-Link Physical. OSI Model. Chapter 1 Review. THE OSI MODEL Application Presentation Session Transport Network Data-Link Physical OSI Model Chapter 1 Review By: Allan Johnson Table of Contents Go There! Go There! Go There! Go There! Go There! Go There!

More information

Computer Networks 1 (Mạng Máy Tính 1) Lectured by: Dr. Phạm Trần Vũ

Computer Networks 1 (Mạng Máy Tính 1) Lectured by: Dr. Phạm Trần Vũ Computer Networks 1 (Mạng Máy Tính 1) Lectured by: Dr. Phạm Trần Vũ Chapter 8 Network Security Computer Networking: A Top Down Approach, 5 th edition. Jim Kurose, Keith Ross Addison-Wesley, April 2009.

More information

QUESTION BANK EVEN SEMESTER

QUESTION BANK EVEN SEMESTER Fatima Michael College of Engineering and Technology DEPARTMENT OF ELECTRONICS AND COMMUNICATION ENGINEERING QUESTION BANK EVEN SEMESTER SUB CODE & NAME: EC2352 COMPUTER NETWORKS YEAR / SEM: III / VI Staff

More information

Announcements Computer Networking. What is the Objective of the Internet? Today s Lecture

Announcements Computer Networking. What is the Objective of the Internet? Today s Lecture Announcements 15-441 15-441 Computer ing 15-641 Lecture 2 Protocol Stacks Peter Steenkiste Fall 2016 www.cs.cmu.edu/~prs/15-441-f16 Sign up for piazza: https://piazza.com/cmu/fall2016/15441641 P1 will

More information

Network Models. Behrouz A. Forouzan Data communication and Networking Fourth edition

Network Models. Behrouz A. Forouzan Data communication and Networking Fourth edition Chapter 2 Network Models Behrouz A. Forouzan Data communication and Networking Fourth edition 1 Layered Tasks We use the concept of layers in our daily life. As an example, let us consider two friends

More information

Question 7: What are Asynchronous links?

Question 7: What are Asynchronous links? Question 1:.What is three types of LAN traffic? Unicasts - intended for one host. Broadcasts - intended for everyone. Multicasts - intended for an only a subset or group within an entire network. Question2:

More information

Introduction to Open System Interconnection Reference Model

Introduction to Open System Interconnection Reference Model Chapter 5 Introduction to OSI Reference Model 1 Chapter 5 Introduction to Open System Interconnection Reference Model Introduction The Open Systems Interconnection (OSI) model is a reference tool for understanding

More information

Computer Communications and Network Basics p. 1 Overview of Computer Communications and Networking p. 2 What Does Computer Communications and

Computer Communications and Network Basics p. 1 Overview of Computer Communications and Networking p. 2 What Does Computer Communications and Computer Communications and Network Basics p. 1 Overview of Computer Communications and Networking p. 2 What Does Computer Communications and Networking Technologies Mean? p. 3 What Is a Computer Network?

More information

Lecture Nov. 21 st 2006 Dan Wendlandt ISP D ISP B ISP C ISP A. Bob. Alice. Denial-of-Service. Password Cracking. Traffic.

Lecture Nov. 21 st 2006 Dan Wendlandt ISP D ISP B ISP C ISP A. Bob. Alice. Denial-of-Service. Password Cracking. Traffic. 15-441 Lecture Nov. 21 st 2006 Dan Wendlandt Worms & Viruses Phishing End-host impersonation Denial-of-Service Route Hijacks Traffic modification Spyware Trojan Horse Password Cracking IP Spoofing DNS

More information

Lecture-4. TCP/IP-Overview:

Lecture-4. TCP/IP-Overview: Lecture-4 TCP/IP-Overview: The history goes back to ARPANET a research network sponsored by DoD US Govt. It eventually connected hundreds of universities and govt installations, using leased telephone

More information

Operating Systems and. Computer Networks. Introduction to Computer Networks. Operating Systems and

Operating Systems and. Computer Networks. Introduction to Computer Networks. Operating Systems and Computer Networks Introduction to Computer Networks Linux System Structure Corbet et al, Linux Device Drivers, O Reilly, 2005 Categories of System Calls Process Control load, execute, end, abort, create

More information

A New Symmetric Key Algorithm for Modern Cryptography Rupesh Kumar 1 Sanjay Patel 2 Purushottam Patel 3 Rakesh Patel 4

A New Symmetric Key Algorithm for Modern Cryptography Rupesh Kumar 1 Sanjay Patel 2 Purushottam Patel 3 Rakesh Patel 4 IJSRD - International Journal for Scientific Research & Development Vol. 2, Issue 08, 2014 ISSN (online): 2321-0613 A New Symmetric Key Algorithm for Modern Cryptography Rupesh Kumar 1 Sanjay Patel 2 Purushottam

More information

Chapter 2 Network Models 2.1

Chapter 2 Network Models 2.1 Chapter 2 Network Models 2.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Network Models n Network Architecture: n A) Hardware: at the core of any network;

More information

Chapter 3: Network Protocols and Communications CCENT Routing and Switching Introduction to Networks v6.0 Instructor Planning Guide

Chapter 3: Network Protocols and Communications CCENT Routing and Switching Introduction to Networks v6.0 Instructor Planning Guide Chapter 3: Network Protocols and Communications CCENT Routing and Switching Introduction to Networks v6.0 Instructor Planning Guide CCNET v6 1 Chapter 3: Network Protocols and Communications CCENT Routing

More information

Cryptography Basics. IT443 Network Security Administration Slides courtesy of Bo Sheng

Cryptography Basics. IT443 Network Security Administration Slides courtesy of Bo Sheng Cryptography Basics IT443 Network Security Administration Slides courtesy of Bo Sheng 1 Outline Basic concepts in cryptography systems Secret key cryptography Public key cryptography Hash functions 2 Encryption/Decryption

More information

9/30/2016. Cryptography Basics. Outline. Encryption/Decryption. Cryptanalysis. Caesar Cipher. Mono-Alphabetic Ciphers

9/30/2016. Cryptography Basics. Outline. Encryption/Decryption. Cryptanalysis. Caesar Cipher. Mono-Alphabetic Ciphers Cryptography Basics IT443 Network Security Administration Slides courtesy of Bo Sheng Basic concepts in cryptography systems Secret cryptography Public cryptography 1 2 Encryption/Decryption Cryptanalysis

More information

Special expressions, phrases, abbreviations and terms of Computer Networks

Special expressions, phrases, abbreviations and terms of Computer Networks access access point adapter Adderssing Realm ADSL (Asymmetrical Digital Subscriber Line) algorithm amplify amplitude analog antenna application architecture ARP (Address Resolution Protocol) AS (Autonomous

More information

Chapter 3 Traditional Symmetric-Key Ciphers 3.1

Chapter 3 Traditional Symmetric-Key Ciphers 3.1 Chapter 3 Traditional Symmetric-Key Ciphers 3.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 3 Objectives To define the terms and the concepts of symmetric

More information

Overview of TCP/IP Overview of TCP/IP protocol: TCP/IP architectural models TCP protocol layers.

Overview of TCP/IP Overview of TCP/IP protocol: TCP/IP architectural models TCP protocol layers. Overview of TCP/IP 3 Overview of TCP/IP protocol: TCP/IP architectural models TCP protocol layers. 4 2 5 6 3 7 8 4 9 10 5 11 12 6 13 14 7 15 16 8 17 18 9 19 20 10 21 Why TCP/IP? Packet based Provides decentralized

More information

CSC 4900 Computer Networks: Security Protocols (2)

CSC 4900 Computer Networks: Security Protocols (2) CSC 4900 Computer Networks: Security Protocols (2) Professor Henry Carter Fall 2017 Chapter 8 roadmap 8.1 What is network security? 8.2 Principles of cryptography 8.3 Message Integrity 8.4 End point Authentication

More information

Cryptography MIS

Cryptography MIS Cryptography MIS-5903 http://community.mis.temple.edu/mis5903sec011s17/ Cryptography History Substitution Monoalphabetic Polyalphabetic (uses multiple alphabets) uses Vigenere Table Scytale cipher (message

More information

Sub Code & Name : EC2352 COMPUTER NETWORKS Unit: I Branch: EC Semester :VI. Unit syllabus: PHYSICAL LAYER 9

Sub Code & Name : EC2352 COMPUTER NETWORKS Unit: I Branch: EC Semester :VI. Unit syllabus: PHYSICAL LAYER 9 Unit: I Branch: EC Semester :VI Date:02/12/14 Page 01 of 06 Unit syllabus: PHYSICAL LAYER 9 Data Communications Networks - Networks models OSI model Layers in OSI model TCP / IP protocol suite Addressing

More information

Data and Computer Communications. Chapter 2 Protocol Architecture, TCP/IP, and Internet-Based Applications

Data and Computer Communications. Chapter 2 Protocol Architecture, TCP/IP, and Internet-Based Applications Data and Computer Communications Chapter 2 Protocol Architecture, TCP/IP, and Internet-Based s 1 Need For Protocol Architecture data exchange can involve complex procedures better if task broken into subtasks

More information

Cryptography (Overview)

Cryptography (Overview) Cryptography (Overview) Some history Caesar cipher, rot13 substitution ciphers, etc. Enigma (Turing) Modern secret key cryptography DES, AES Public key cryptography RSA, digital signatures Cryptography

More information

Define TCP/IP and describe its advantages on Windows Describe how the TCP/IP protocol suite maps to a four-layer model

Define TCP/IP and describe its advantages on Windows Describe how the TCP/IP protocol suite maps to a four-layer model [Previous] [Next] Chapter 2 Implementing TCP/IP About This Chapter This chapter gives you an overview of Transmission Control Protocol/Internet Protocol (TCP/IP). The lessons provide a brief history of

More information

CSC 6575: Internet Security Fall 2017

CSC 6575: Internet Security Fall 2017 CSC 6575: Internet Security Fall 2017 Network Security Devices IP Security Mohammad Ashiqur Rahman Department of Computer Science College of Engineering Tennessee Tech University 2 IPSec Agenda Architecture

More information

Network+ Guide to Networks, 6 th Edition. Chapter 2 Solutions

Network+ Guide to Networks, 6 th Edition. Chapter 2 Solutions Network+ Guide to Networks, 6 th Edition Solutions 2 1 Network+ Guide to Networks, 6 th Edition Chapter 2 Solutions Review Questions 1. Your supervisor has asked you to correct several cable management

More information

Computer Networks. Wenzhong Li. Nanjing University

Computer Networks. Wenzhong Li. Nanjing University Computer Networks Wenzhong Li Nanjing University 1 Chapter 7. Network Security Network Attacks Cryptographic Technologies Message Integrity and Authentication Key Distribution Firewalls Transport Layer

More information

Glenda Whitbeck Global Computing Security Architect Spirit AeroSystems

Glenda Whitbeck Global Computing Security Architect Spirit AeroSystems Glenda Whitbeck Global Computing Security Architect Spirit AeroSystems History 2000 B.C. Egyptian Hieroglyphics Atbash - Hebrew Original alphabet mapped to different letter Type of Substitution Cipher

More information

VoIP / RoIP for Technicians

VoIP / RoIP for Technicians Phase 4 Design, Inc VoIP / RoIP for Technicians Presented by Dave Grant Phase 4 Design, Inc dave@phase4.org 2017 Phase 4 Design, Inc Notes 2 2017, Phase 4 Design, Inc. Table of Contents What are we going

More information

Layer 4: UDP, TCP, and others. based on Chapter 9 of CompTIA Network+ Exam Guide, 4th ed., Mike Meyers

Layer 4: UDP, TCP, and others. based on Chapter 9 of CompTIA Network+ Exam Guide, 4th ed., Mike Meyers Layer 4: UDP, TCP, and others based on Chapter 9 of CompTIA Network+ Exam Guide, 4th ed., Mike Meyers Concepts application set transport set High-level, "Application Set" protocols deal only with how handled

More information

Lecture 9a: Secure Sockets Layer (SSL) March, 2004

Lecture 9a: Secure Sockets Layer (SSL) March, 2004 Internet and Intranet Protocols and Applications Lecture 9a: Secure Sockets Layer (SSL) March, 2004 Arthur Goldberg Computer Science Department New York University artg@cs.nyu.edu Security Achieved by

More information

Cryptography and Network Security

Cryptography and Network Security Cryptography and Network Security Spring 2012 http://users.abo.fi/ipetre/crypto/ Lecture 14: Folklore, Course summary, Exam requirements Ion Petre Department of IT, Åbo Akademi University 1 Folklore on

More information

BABU MADHAV INSTITUTE OF INFORMATION TECHNOLOGY, UTU 2017

BABU MADHAV INSTITUTE OF INFORMATION TECHNOLOGY, UTU 2017 5 years Integrated M.Sc (IT) Semester 3 Question Bank 060010310 DSE4 Computer Networks Unit 1 Introduction Short Questions 1. State the term data with respect to computer network. 2. What is data communication?

More information

FINAL EXAM REVIEW PLEASE NOTE THE MATERIAL FROM LECTURE #16 at the end. Exam 1 Review Material

FINAL EXAM REVIEW PLEASE NOTE THE MATERIAL FROM LECTURE #16 at the end. Exam 1 Review Material FINAL EXAM REVIEW PLEASE NOTE THE MATERIAL FROM LECTURE #16 at the end Chapters in the book 1, 2, 3, 5, 6 Exam 1 Review Material Topics You are also responsible for the reading in the chapters understanding

More information

Cryptography and Network Security

Cryptography and Network Security Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown Chapter 15 Electronic Mail Security Despite the refusal of VADM Poindexter and LtCol North to appear,

More information

SYLLABUS. osmania university CHAPTER - 3 : MEDIUM ACCESS CONTROL (MAC) SUBLAYER Standards, Bluetooth, Bridges and Routers.

SYLLABUS. osmania university CHAPTER - 3 : MEDIUM ACCESS CONTROL (MAC) SUBLAYER Standards, Bluetooth, Bridges and Routers. Contents i SYLLABUS osmania university UNIT - I CHAPTER - 1 : INTRODUCTION Data Communication, Network Topologies : LAN, WAN, MAN, Types : Bus, Star, Ring, Hybrid, Line Configurations, Reference Models

More information

Computer Networks Question Bank

Computer Networks Question Bank Computer Networks Question Bank 1. Describe in detail OSI Model ANS: OSI (Open Systems Interconnection) is reference model for how applications can communicate over a network. A reference model is a conceptual

More information

CS 356 Internet Security Protocols. Fall 2013

CS 356 Internet Security Protocols. Fall 2013 CS 356 Internet Security Protocols Fall 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists Chapter 5

More information

Time : 3 hours. Full Marks: 70. The figures in the margin indicate full marks. Answer from all the Groups are directed. Group A.

Time : 3 hours. Full Marks: 70. The figures in the margin indicate full marks. Answer from all the Groups are directed. Group A. COPYRIGHT RESERVED End Sem (III) MCA (XVIII) 2017 Time : 3 hours Full Marks: 70 Candidates are required to give their answers in their own words as far as practicable. The figures in the margin indicate

More information

COSC4377. Chapter 8 roadmap

COSC4377. Chapter 8 roadmap Lecture 28 Chapter 8 roadmap 8.1 What is network security? 8.2 Principles of cryptography 8.3 Message integrity 8.4 Securing e mail 8.5 Securing TCP connections: SSL 8.6 Network layer security: IPsec 8.7

More information

interface Question 1. a) Applications nslookup/dig Web Application DNS SMTP HTTP layer SIP Transport layer OSPF ICMP IP Network layer

interface Question 1. a) Applications  nslookup/dig Web Application DNS SMTP HTTP layer SIP Transport layer OSPF ICMP IP Network layer TDTS06 Computer networks, August 23, 2008 Sketched answers to the written examination, provided by Juha Takkinen, IDA, juhta@ida.liu.se. ( Sketched means that you, in addition to the below answers, need

More information

VPN Ports and LAN-to-LAN Tunnels

VPN Ports and LAN-to-LAN Tunnels CHAPTER 6 A VPN port is a virtual port which handles tunneled traffic. Tunnels are virtual point-to-point connections through a public network such as the Internet. All packets sent through a VPN tunnel

More information

Cross Layer Protocol Design. Radio Communication III

Cross Layer Protocol Design. Radio Communication III Cross Layer Protocol Design Radio Communication III The layered world of protocols The ISO OSI model OSI model Introduction» The open systems interconnection reference model (OSI model) describes a layered

More information

Chapter 3: Network Protocols and Communications

Chapter 3: Network Protocols and Communications Chapter 3: Network Protocols and Communications Introduction to Networks Intro to Networks v5 Message Delivery Options IPv4 Unicast One-to-One Multicast One-to-Many Broadcast One-to-All IPv6 Unicast One-to-One

More information