Review for Exam 4 School of Business Eastern Illinois University © Abdou Illia, Spring 2006.

Slides:



Advertisements
Similar presentations
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Addressing the Network – IPv4 Network Fundamentals – Chapter 6.
Advertisements

CISCO NETWORKING ACADEMY Chabot College ELEC Address Resolution Protocol.
Nassau Community College
Security (Part 2) School of Business Eastern Illinois University © Abdou Illia, Spring 2007 (Week 13, Thursday 4/5/2007)
The Internet Useful Definitions and Concepts About the Internet.
Network Management 2 School of Business Eastern Illinois University © Abdou Illia, Spring 2007 (Week 16, Thursday 4/19/2007)
Security Awareness: Applying Practical Security in Your World, Second Edition Chapter 5 Network Security.
Network & Computer Attacks (Part 2) February 11, 2010 MIS 4600 – MBA © Abdou Illia.
Review For Final Spring Network Architecture Models.
Review for Exam 4 School of Business Eastern Illinois University © Abdou Illia, Fall 2006.
1 Review For Exam 3 (Part 2) BUS Abdou Illia, Fall 2009.
Remote Networking Architectures
Network Management 1 School of Business Eastern Illinois University © Abdou Illia, Spring 2006 (Week 15, Friday 4/21/2006) (Week 16, Monday 4/24/2006)
Network Topology. Cisco 2921 Integrated Services Router Security Embedded hardware-accelerated VPN encryption Secure collaborative communications with.
Internet Relay Chat Security Issues By Kelvin Lau and Ming Li.
Network Services Lesson 6. Objectives Skills/ConceptsObjective Domain Description Objective Domain Number Setting up common networking services Understanding.
DYNAMIC HOST CONFIGURATION PROTOCOL (DHCP) BY: SAMHITA KAW IS 373.
11 NETWORK PROTOCOLS AND SERVICES Chapter 10. Chapter 10: Network Protocols and Services2 NETWORK PROTOCOLS AND SERVICES  Identify how computers on TCP/IP.
Other Important TCP/IP Standards Domain Name System (DNS) Autoconfiguration Protocols.
Review for Exam 4 School of Business Eastern Illinois University © Abdou Illia, Spring 2007.
Internal NetworkExternal Network. Hub Internal NetworkExternal Network WS.
HOW ACCESS TO WWW Student Name : Hussein Alkhaldi.
Chapter 13 – Network Security
1 INTERNET AND eBUSINESS (I) BUS Abdou Illia, Fall 2012 (October 29, 2012)
1 Chapter 6: Proxy Server in Internet and Intranet Designs Designs That Include Proxy Server Essential Proxy Server Design Concepts Data Protection in.
Network Management System The Concept –From a central computer, network administrator can manage entire network Collect data Give commands –Moving gradually.
The Internet School of Business Eastern Illinois University © Abdou Illia, Spring 2015 (March 2, 2015)
Review for Exam 3 School of Business Eastern Illinois University © Abdou Illia, Fall 2005.
1 INTERNET AND WORLD WIDE WEB TECHNOLOGIES BUS Abdou Illia, Spring 2007 (Week 11, Thursday 3/22/2007)
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Application Layer Functionality and Protocols.
Topics to be covered 1. What are bots,botnet ? 2.How does it work? 4.Prevention of botnet. 3.Types of botnets.
Forensic and Investigative Accounting Chapter 14 Internet Forensics Analysis: Profiling the Cybercriminal © 2005, CCH INCORPORATED 4025 W. Peterson Ave.
The Internet School of Business Eastern Illinois University © Abdou Illia, Spring 2007 (Week 14, Thursday 4/12/2007) (Week 15, Monday 4/16/2007)
Linux+ Guide to Linux Certification, Second Edition Chapter 14 Network Configuration.
NETWORKING COMPONENTS AN OVERVIEW OF COMMONLY USED HARDWARE Christopher Johnson LTEC 4550.
1 Chapter 7: NAT in Internet and Intranet Designs Designs That Include NAT Essential NAT Design Concepts Data Protection in NAT Designs NAT Design Optimization.
1 實驗九:建置網路安全閘道器 教師: 助教:. 2 Outline  Background  Proxy – Squid  Firewall – IPTables  VPN – OpenVPN  Experiment  Internet gateway  Firewall  VPN.
1 TCP/IP Internetting ä Subnet layer ä Links stations on same subnet ä Often IEEE LAN standards ä PPP for telephone connections ä TCP/IP specifies.
Information Flow Across the Internet. What is the Internet? A large group of computers that link together to form the Worldwide Area Network (WAN)
IP BROS Presentation by: Amen Ahmed. Mario and Luigi are here to help us find our way through the internet. Mario will act as our browser and Luigi will.
The Internet School of Business Eastern Illinois University © Abdou Illia, Fall 2002 (Week 15, Monday 12/02/2002 and Wednesday 12/04/2002)
1 Chapter Overview Password Protection Security Models Firewalls Security Protocols.
Network Security. 2 SECURITY REQUIREMENTS Privacy (Confidentiality) Data only be accessible by authorized parties Authenticity A host or service be able.
Module 4 Quiz. 1. Which of the following statements about Network Address Translation (NAT) are true? Each correct answer represents a complete solution.
Review for Exam 4 School of Business Eastern Illinois University © Abdou Illia, Fall 2004.
Review For Final (Week 15, Monday 12/5/2005) Should consider Review-For-Exam4 for your Final Exam preparation.
OS Services And Networking Support Juan Wang Qi Pan Department of Computer Science Southeastern University August 1999.
Guide to TCP/IP, Third Edition Chapter 8: The Dynamic Host Configuration Protocol.
The Intranet.
Security School of Business Eastern Illinois University © Abdou Illia, Fall 2002 (Week 12, Wednesday 11/13/2002)
IP addresses IPv4 and IPv6. IP addresses (IP=Internet Protocol) Each computer connected to the Internet must have a unique IP address.
Accessing the World Wide Web from Home Many students access the World Wide Web from home Here is how it works, in terms of standards.
Review for Exam 3 School of Business Eastern Illinois University © Abdou Illia, Fall 2006.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Application Layer Functionality and Protocols.
Connection Technologies and IP Addressing CONNECTING TO THE INTERNET.
Networking Components Quick Guide. Hubs Device that splits a network connection into multiple computers Data is transmitted to all devices attached Computers.
COSC513 Final Project Firewall in Internet Security Student Name: Jinqi Zhang Student ID: Instructor Name: Dr.Anvari.
Chapter 5. An IP address is simply a series of binary bits (ones and zeros). How many binary bits are used? 32.
IPv6 Security Issues Georgios Koutepas, NTUA IPv6 Technology and Advanced Services Oct.19, 2004.
1 Managing Security Additional notes. 2 Intercepting confidential messages Attacker Taps into the Conversation: Tries to Read Messages Client PC Server.
Chapter 7: Using Network Clients The Complete Guide To Linux System Administration.
Chapter 8.  Upon completion of this chapter, you should be able to:  Understand the purpose of a firewall  Name two types of firewalls  Identify common.
Comparison of Network Attacks COSC 356 Kyler Rhoades.
COMPUTER NETWORKS CS610 Lecture-27 Hammad Khalid Khan.
The Intranet.
Understand Networking Services
Introduction to Networking
TCP/IP Internetworking (Part 2)
AbbottLink™ - IP Address Overview
INFORMATION FLOW ACROSS THE INTERNET
Presentation transcript:

Review for Exam 4 School of Business Eastern Illinois University © Abdou Illia, Spring 2006

The Internet School of Business Eastern Illinois University

3 Host name n Host Names – The other network addressing system on the Internet – Easy to remember n microsoft.com n eiu.edu – Two or more text “labels” separated by dots eiu.edu

4 Host name n Host Names – Like nicknames n Not official addresses n Each host must have an IP address n But only some hosts have host names n If you give it a host name, your browser must look up IP address of host eiu.edu

5 Domain Name System (DNS)

6 n User’s computer sends a DNS host the target host’s host name in a DNS Request message n DNS host returns the target host’s IP address in DNS Response message Originating Host DNS Host eiu.edu

7 Domain Name System (DNS) n Organizations or ISPs have local DNS hosts n These hosts must know only local host names and IP addresses n For other host names, local DNS host passes request to another DNS host Originating Host Local DNS Host Remote DNS Host

8 Domain Name System (DNS) n Remote DNS host passes information back to the local DNS host n Local DNS host passes information back to user PC Originating Host Local DNS Host Remote DNS Host

9 Domain Name System (DNS)

10 Autoconfiguration n Every computer attached to the Internet is a host – Including desktop PCs n Every host must have an IP address n Some hosts, such as routers and webservers, get permanent IP addresses – So that they can be found easily

11 Autoconfiguration n User PCs do not need permanent IP addresses – They only need to be found within a use session – They usually are given temporary IP addresses each time they use the Internet – They may get a different IP address each time they use the Internet

12 Autoconfiguration n Request-Response Cycle – User software requests IP address for the user PC in Autoconfiguration Request message – Autoconfiguration Response message contains temporary IP address to use in current session

13 Autoconfiguration n Most popular autoconfiguration protocol is DHCP – Dynamic Host Configuration Protocol – Built into Windows after Win 3.1 – Supplies host with temporary IP address n DHCP can give more information too – Usually gives IP address of a default gateway (Microsoft terminology for router) – Can give IP address of a local DNS host – Can give other information as well

14 Summary Questions 1)a) When do we need DNS? b) What information do you send in a DNS request message? c) What information do you receive in a DNS response message? 2)a) What is autoconfiguration? b) What information do we get back, at a minimum, in an autoconfiguration response message? c) What other information may we get back?

Security School of Business Eastern Illinois University

16 Quiz n Check Quiz 3 (Part 1) questions

17 Summary Questions n Name a few kinds of systems attacks Answer (Security, Slide #3): Denial of Service attacks, Malicious content attacks and Intercepting messages. n Distinguish between Denial-of-Service (DoS) attack and Distributed Denial-of-Service (DDoS) attack Answer (Security, Slides #4, 5): In DoS attack, the attacker sends a stream of messages or an oversized message to the victim (usually a server) from a single computer connected to the network. In DDoS, the attacker hacks into multiple clients and plants Zombie programs on them. Then, he/she sends commands to Zombie programs which execute the attacks. n Name some techniques usually used to protect a communication against Intercepting messages. Answer: Symmetric key encryption/decryption methods, and Public key encryption/decryption methods

18 Summary Questions n Jason sends a message to Kristin using public key encryption. (a) What key will Jason use to encrypt the message? (b) What key will Kristin use to decrypt the message? (c) What key will Kristin use to encrypt the reply? (d) What key will Jason use to decrypt the reply? (e) Can the message and reply be long messages? Explain. Answer: a) Jason will encrypt the message with Kristin’s public key. b) Kristin will use her own private key to decrypt the message. c) Kristin will use Jason’s public key to encrypt the reply. d) Jason will use his own private key to decrypt the reply. e) No, public key encryption can only encrypt short messages. n Does public key encryption have a problem with secure key exchange for the public key? Explain. Answer: There is no problem distributing the public key, because it does not have to be distributed securely. You can even find companies’ public keys on their website.

19 Summary Questions 1. Briefly describe the various types of malicious content attacks Answer: See slide #6 in class notes 2. What headers and messages do Packet filter firewalls examine? Answer: See slide #10 in class notes 3. a) What part of a packet do Application firewalls examine? b) What do they look for? Answer: a) Application layer messages. b) They look for illicit content.

Network Management 2

21 Quiz n Check Quiz 3 (Part 2) questions

22 Summary Questions (Part 1) 1) List the main elements in centralized network management 2) Does the Manager communicate directly with the managed devices? Explain. 3) Explain the difference between a managed device and objects. 4) Where is the MIB (database) stored?

23 Summary Questions (Part 2) 1) In Manager-Agent communications, which device creates commands? Responses? Traps? 2) Explain the two types of commands. 3) What is a trap?