SlideShare una empresa de Scribd logo
1 de 17
Computer Networks
and
Network Security
2019/02/27
Announcements
● Firetalks 03/27
● No meeting next week, DHA. 03/06
What is a computer network?
● Defined as a digital telecommunication network which
allows nodes to share resources.
● Machines will create connections between each other and
exchange data.
● These links can be physical cables such as copper or fiber
optic or could be wireless such as Wi-Fi.
Level 2 - Medium Access Control
● Reliable transmission for data frames between two nodes connected by a
physical layer.
● Responsible for:
○ Frame receiving and transmitting.
○ Addressing of destination stations.
○ Conveying source station addressing information.
○ Control of access to the physical transmission medium.
● The final layer of encapsulation before the data is transmitted over the
physical layer.
Media Access Control Addresses
● The Media Access Control (MAC) address of a device is a
unique identifier assigned to a network interface controller.
○ Ex. 40:a3:cc:a8:4e:36
● All MAC address are unique for every network interface
controller.
● Think of it as the machines social security number.
Level 3 - Network Layer
● Structuring and managing multi node network.
● Responsible for packet forwarding and routing.
○ Routing - Determining the logical path that data will take to reach its
destination
○ Forwarding - Determine the next device to send the data to on the
defined route.
● Provides the functionality and procedures for transferring packets from one
node to another.
● One such protocol that sits at this layer is known as IP
Internet Protocol
● The principal communications protocol for relaying datagrams across network
boundaries.
● Tasked with delivering packets of data from the source host to destinations
based on IP addresses.
● The IP will encapsulate the applications data with data that is necessary for
the packet to be delivered.
IP Addressing
● An IP address is a numerical label to each device connected to a computer
network using the IP protocol.
○ Assists with host interface identification and location addressing in the
network..
Layer 4 - Transport layer
● Transmission of data segments between points on a network.
● Contain quality of service functions such as flow control, segmentation, and
error control.
○ Acknowledgement of successful transmissions
○ Retransmissions of failed data segments/datagrams.
TCP/UDP
● Transmission Control Protocol provides connection-oriented, reliable,
ordered, and error-checked delivery of stream octets between hosts.
○ Ex. Youtube videos/Netflix
● User Datagram Protocol is a connectionless, unreliable, unordered, and no
error checked delivery of datagrams between hosts.
○ Ex. Live streams
Wireshark Demo
WHAT ABOUT THE SECURITY?!?!?!
Well there is a lot different areas and types of network security out there..
● IPSec
● DNSSEC
● Malware Prevention
● Firewalls
● IDS/IPS
● Network Segmentation
● Web Security
● Wireless Security
● Etc.
Malware Prevention
● This involves setting up network infrastructure to identify and detect the
presence of intrusions on the network.
○ I.E. Malicious traffic or malicious behaviour
● Possible signs of malicious behaviour at the network level
○ Machines communicating to outside machine constantly (C&C).
○ Local machines communicating when they are not known to.
○ Out of the ordinary network traffic. (Sketchy sites)
Well known virus attacks
● CryptoLocker
● ILOVEYOU
● MyDoom
● Storm Worm
● Zeus Trojan
● Emotet Trojan
● Stuxnet
Emotet
https://www.us-cert.gov/ncas/alerts/TA18-201A
Resources
● Learning areas
○ HacktheBox.eu
○ https://www.sans.org/network-security/#free
○ Hacking the art of exploitation
● Tools
○ Wireshark
○ Nessus
○ Aircrack-ng
○ Snort

Más contenido relacionado

La actualidad más candente

Creds extraction
Creds extractionCreds extraction
Creds extractionIlan Mindel
 
BlueHat v17 || TLS 1.3 - Full speed ahead... mind the warnings - the great, t...
BlueHat v17 || TLS 1.3 - Full speed ahead... mind the warnings - the great, t...BlueHat v17 || TLS 1.3 - Full speed ahead... mind the warnings - the great, t...
BlueHat v17 || TLS 1.3 - Full speed ahead... mind the warnings - the great, t...BlueHat Security Conference
 
Overview of NSA Security Enhanced Linux - FOSS.IN/2005
Overview of NSA Security Enhanced Linux - FOSS.IN/2005Overview of NSA Security Enhanced Linux - FOSS.IN/2005
Overview of NSA Security Enhanced Linux - FOSS.IN/2005James Morris
 
7 palo alto security zones & interfaces concepts
7 palo alto security zones & interfaces concepts7 palo alto security zones & interfaces concepts
7 palo alto security zones & interfaces conceptsMostafa El Lathy
 
Getting your hands dirty: How to Analyze the Behavior of Malware Traffic / SE...
Getting your hands dirty: How to Analyze the Behavior of Malware Traffic / SE...Getting your hands dirty: How to Analyze the Behavior of Malware Traffic / SE...
Getting your hands dirty: How to Analyze the Behavior of Malware Traffic / SE...Security Session
 
Network Intrusion Detection Systems #1
Network Intrusion Detection Systems #1Network Intrusion Detection Systems #1
Network Intrusion Detection Systems #1Peter Dulačka
 
Industry Best Practices for SSH Access
Industry Best Practices for SSH AccessIndustry Best Practices for SSH Access
Industry Best Practices for SSH AccessDevOps.com
 
Network Intrusion Detection Systems #2
Network Intrusion Detection Systems #2Network Intrusion Detection Systems #2
Network Intrusion Detection Systems #2Peter Dulačka
 
wolfSSL and TLS 1.3
wolfSSL and TLS 1.3wolfSSL and TLS 1.3
wolfSSL and TLS 1.3wolfSSL
 
Secure Developer Access at Decisiv
Secure Developer Access at DecisivSecure Developer Access at Decisiv
Secure Developer Access at DecisivTeleport
 
Shamsa al mazrooei
Shamsa al mazrooeiShamsa al mazrooei
Shamsa al mazrooeishamsamaz
 

La actualidad más candente (20)

Creds extraction
Creds extractionCreds extraction
Creds extraction
 
Socat
SocatSocat
Socat
 
BlueHat v17 || TLS 1.3 - Full speed ahead... mind the warnings - the great, t...
BlueHat v17 || TLS 1.3 - Full speed ahead... mind the warnings - the great, t...BlueHat v17 || TLS 1.3 - Full speed ahead... mind the warnings - the great, t...
BlueHat v17 || TLS 1.3 - Full speed ahead... mind the warnings - the great, t...
 
Wireshark
WiresharkWireshark
Wireshark
 
Wireshark Basic Presentation
Wireshark Basic PresentationWireshark Basic Presentation
Wireshark Basic Presentation
 
Netcat
NetcatNetcat
Netcat
 
Overview of NSA Security Enhanced Linux - FOSS.IN/2005
Overview of NSA Security Enhanced Linux - FOSS.IN/2005Overview of NSA Security Enhanced Linux - FOSS.IN/2005
Overview of NSA Security Enhanced Linux - FOSS.IN/2005
 
Cryptography
CryptographyCryptography
Cryptography
 
Wireshark
WiresharkWireshark
Wireshark
 
7 palo alto security zones & interfaces concepts
7 palo alto security zones & interfaces concepts7 palo alto security zones & interfaces concepts
7 palo alto security zones & interfaces concepts
 
Week14 F
Week14 FWeek14 F
Week14 F
 
Getting your hands dirty: How to Analyze the Behavior of Malware Traffic / SE...
Getting your hands dirty: How to Analyze the Behavior of Malware Traffic / SE...Getting your hands dirty: How to Analyze the Behavior of Malware Traffic / SE...
Getting your hands dirty: How to Analyze the Behavior of Malware Traffic / SE...
 
Network Intrusion Detection Systems #1
Network Intrusion Detection Systems #1Network Intrusion Detection Systems #1
Network Intrusion Detection Systems #1
 
Industry Best Practices for SSH Access
Industry Best Practices for SSH AccessIndustry Best Practices for SSH Access
Industry Best Practices for SSH Access
 
Network Intrusion Detection Systems #2
Network Intrusion Detection Systems #2Network Intrusion Detection Systems #2
Network Intrusion Detection Systems #2
 
wolfSSL and TLS 1.3
wolfSSL and TLS 1.3wolfSSL and TLS 1.3
wolfSSL and TLS 1.3
 
Secure Developer Access at Decisiv
Secure Developer Access at DecisivSecure Developer Access at Decisiv
Secure Developer Access at Decisiv
 
Wireshark Tutorial
Wireshark TutorialWireshark Tutorial
Wireshark Tutorial
 
Shamsa al mazrooei
Shamsa al mazrooeiShamsa al mazrooei
Shamsa al mazrooei
 
Netcat - A Swiss Army Tool
Netcat - A Swiss Army ToolNetcat - A Swiss Army Tool
Netcat - A Swiss Army Tool
 

Similar a Computer networks and network security

Networking essentials lect1
Networking essentials lect1Networking essentials lect1
Networking essentials lect1Roman Brovko
 
Network_Architecture_and_Protocols.pptxNetwork_Architecture_and_Protocols.pptx
Network_Architecture_and_Protocols.pptxNetwork_Architecture_and_Protocols.pptxNetwork_Architecture_and_Protocols.pptxNetwork_Architecture_and_Protocols.pptx
Network_Architecture_and_Protocols.pptxNetwork_Architecture_and_Protocols.pptxadnis1
 
SYSTEM ADMINISTRATION AND MAINTENANCE NOTES PERIYAR UNIVERSITY
SYSTEM ADMINISTRATION AND MAINTENANCE NOTES PERIYAR UNIVERSITYSYSTEM ADMINISTRATION AND MAINTENANCE NOTES PERIYAR UNIVERSITY
SYSTEM ADMINISTRATION AND MAINTENANCE NOTES PERIYAR UNIVERSITYGOKUL SREE
 
Class Note
Class NoteClass Note
Class NoteAK IJ
 
20MCT31 - DATA COMMUNICATION NETWORKS_NOTES.pdf
20MCT31 - DATA COMMUNICATION NETWORKS_NOTES.pdf20MCT31 - DATA COMMUNICATION NETWORKS_NOTES.pdf
20MCT31 - DATA COMMUNICATION NETWORKS_NOTES.pdfDSIVABALASELVAMANIMC
 
Computer Networks Notes Complete Syllabus
Computer Networks Notes Complete SyllabusComputer Networks Notes Complete Syllabus
Computer Networks Notes Complete SyllabusAnujashejwal
 
13.01 Network Components
13.01   Network Components13.01   Network Components
13.01 Network ComponentsAnjan Mahanta
 
computer network introduction. psc notes . Assisant professor in cse.
computer network introduction. psc notes . Assisant professor in cse.computer network introduction. psc notes . Assisant professor in cse.
computer network introduction. psc notes . Assisant professor in cse.bushraphd2022
 
Chapter No 1 Introduction to Network and Network Models.pptx
Chapter No 1 Introduction to Network and Network Models.pptxChapter No 1 Introduction to Network and Network Models.pptx
Chapter No 1 Introduction to Network and Network Models.pptxPoojaBahirat1
 
Introduction to computer networks
Introduction to computer networksIntroduction to computer networks
Introduction to computer networksamudha arul
 
IP ADDRESSING AND SUBNETTING REPORT
IP ADDRESSING AND SUBNETTING  REPORTIP ADDRESSING AND SUBNETTING  REPORT
IP ADDRESSING AND SUBNETTING REPORTRajat Kumar
 
Basics concept of network and internet mansi
Basics concept of network and internet   mansiBasics concept of network and internet   mansi
Basics concept of network and internet mansiMansiGupta298
 

Similar a Computer networks and network security (20)

Networking essentials lect1
Networking essentials lect1Networking essentials lect1
Networking essentials lect1
 
Network_Architecture_and_Protocols.pptxNetwork_Architecture_and_Protocols.pptx
Network_Architecture_and_Protocols.pptxNetwork_Architecture_and_Protocols.pptxNetwork_Architecture_and_Protocols.pptxNetwork_Architecture_and_Protocols.pptx
Network_Architecture_and_Protocols.pptxNetwork_Architecture_and_Protocols.pptx
 
SYSTEM ADMINISTRATION AND MAINTENANCE NOTES PERIYAR UNIVERSITY
SYSTEM ADMINISTRATION AND MAINTENANCE NOTES PERIYAR UNIVERSITYSYSTEM ADMINISTRATION AND MAINTENANCE NOTES PERIYAR UNIVERSITY
SYSTEM ADMINISTRATION AND MAINTENANCE NOTES PERIYAR UNIVERSITY
 
Class Note
Class NoteClass Note
Class Note
 
20MCT31 - DATA COMMUNICATION NETWORKS_NOTES.pdf
20MCT31 - DATA COMMUNICATION NETWORKS_NOTES.pdf20MCT31 - DATA COMMUNICATION NETWORKS_NOTES.pdf
20MCT31 - DATA COMMUNICATION NETWORKS_NOTES.pdf
 
Networking Fundamentals.ppt
Networking Fundamentals.pptNetworking Fundamentals.ppt
Networking Fundamentals.ppt
 
Computer Networks Notes Complete Syllabus
Computer Networks Notes Complete SyllabusComputer Networks Notes Complete Syllabus
Computer Networks Notes Complete Syllabus
 
CN-Unit 1.pptx
CN-Unit 1.pptxCN-Unit 1.pptx
CN-Unit 1.pptx
 
Lecture 3- tcp-ip
Lecture  3- tcp-ipLecture  3- tcp-ip
Lecture 3- tcp-ip
 
Computer Networks basics
Computer Networks basicsComputer Networks basics
Computer Networks basics
 
13.01 Network Components
13.01   Network Components13.01   Network Components
13.01 Network Components
 
computer network introduction. psc notes . Assisant professor in cse.
computer network introduction. psc notes . Assisant professor in cse.computer network introduction. psc notes . Assisant professor in cse.
computer network introduction. psc notes . Assisant professor in cse.
 
Chapter No 1 Introduction to Network and Network Models.pptx
Chapter No 1 Introduction to Network and Network Models.pptxChapter No 1 Introduction to Network and Network Models.pptx
Chapter No 1 Introduction to Network and Network Models.pptx
 
Introduction to computer networks
Introduction to computer networksIntroduction to computer networks
Introduction to computer networks
 
IP ADDRESSING AND SUBNETTING REPORT
IP ADDRESSING AND SUBNETTING  REPORTIP ADDRESSING AND SUBNETTING  REPORT
IP ADDRESSING AND SUBNETTING REPORT
 
Module-1.pptx
Module-1.pptxModule-1.pptx
Module-1.pptx
 
Basics concept of network and internet mansi
Basics concept of network and internet   mansiBasics concept of network and internet   mansi
Basics concept of network and internet mansi
 
ppt on servicenow.pptx
ppt on servicenow.pptxppt on servicenow.pptx
ppt on servicenow.pptx
 
OSI Model.pdf
OSI Model.pdfOSI Model.pdf
OSI Model.pdf
 
CN Unit-1 PPT.pptx
CN Unit-1 PPT.pptxCN Unit-1 PPT.pptx
CN Unit-1 PPT.pptx
 

Más de UTD Computer Security Group (20)

Py jail talk
Py jail talkPy jail talk
Py jail talk
 
22S kickoff 2.0 (kickoff + anonymity talk)
22S kickoff 2.0 (kickoff + anonymity talk)22S kickoff 2.0 (kickoff + anonymity talk)
22S kickoff 2.0 (kickoff + anonymity talk)
 
Cloud talk
Cloud talkCloud talk
Cloud talk
 
Forensics audio and video
Forensics   audio and videoForensics   audio and video
Forensics audio and video
 
Intro to python
Intro to pythonIntro to python
Intro to python
 
Powershell crash course
Powershell crash coursePowershell crash course
Powershell crash course
 
Intro to cybersecurity
Intro to cybersecurityIntro to cybersecurity
Intro to cybersecurity
 
Intro to Bash
Intro to BashIntro to Bash
Intro to Bash
 
Web Exploitation
Web ExploitationWeb Exploitation
Web Exploitation
 
Penetration Testing: Celestial
Penetration Testing: CelestialPenetration Testing: Celestial
Penetration Testing: Celestial
 
Cryptography Crash Course
Cryptography Crash CourseCryptography Crash Course
Cryptography Crash Course
 
Fuzzing - Part 2
Fuzzing - Part 2Fuzzing - Part 2
Fuzzing - Part 2
 
Exploitation Crash Course
Exploitation Crash CourseExploitation Crash Course
Exploitation Crash Course
 
Fuzzing - Part 1
Fuzzing - Part 1Fuzzing - Part 1
Fuzzing - Part 1
 
Protostar VM - Heap3
Protostar VM - Heap3Protostar VM - Heap3
Protostar VM - Heap3
 
Heap Base Exploitation
Heap Base ExploitationHeap Base Exploitation
Heap Base Exploitation
 
Return Oriented Programming
Return Oriented ProgrammingReturn Oriented Programming
Return Oriented Programming
 
Advanced Windows Exploitation
Advanced Windows ExploitationAdvanced Windows Exploitation
Advanced Windows Exploitation
 
Advanced Domain Hacking
Advanced Domain HackingAdvanced Domain Hacking
Advanced Domain Hacking
 
Windows Domains Part 2
Windows Domains Part 2Windows Domains Part 2
Windows Domains Part 2
 

Último

08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfhans926745
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 

Último (20)

08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 

Computer networks and network security

  • 2. Announcements ● Firetalks 03/27 ● No meeting next week, DHA. 03/06
  • 3. What is a computer network? ● Defined as a digital telecommunication network which allows nodes to share resources. ● Machines will create connections between each other and exchange data. ● These links can be physical cables such as copper or fiber optic or could be wireless such as Wi-Fi.
  • 4.
  • 5. Level 2 - Medium Access Control ● Reliable transmission for data frames between two nodes connected by a physical layer. ● Responsible for: ○ Frame receiving and transmitting. ○ Addressing of destination stations. ○ Conveying source station addressing information. ○ Control of access to the physical transmission medium. ● The final layer of encapsulation before the data is transmitted over the physical layer.
  • 6. Media Access Control Addresses ● The Media Access Control (MAC) address of a device is a unique identifier assigned to a network interface controller. ○ Ex. 40:a3:cc:a8:4e:36 ● All MAC address are unique for every network interface controller. ● Think of it as the machines social security number.
  • 7. Level 3 - Network Layer ● Structuring and managing multi node network. ● Responsible for packet forwarding and routing. ○ Routing - Determining the logical path that data will take to reach its destination ○ Forwarding - Determine the next device to send the data to on the defined route. ● Provides the functionality and procedures for transferring packets from one node to another. ● One such protocol that sits at this layer is known as IP
  • 8. Internet Protocol ● The principal communications protocol for relaying datagrams across network boundaries. ● Tasked with delivering packets of data from the source host to destinations based on IP addresses. ● The IP will encapsulate the applications data with data that is necessary for the packet to be delivered.
  • 9. IP Addressing ● An IP address is a numerical label to each device connected to a computer network using the IP protocol. ○ Assists with host interface identification and location addressing in the network..
  • 10. Layer 4 - Transport layer ● Transmission of data segments between points on a network. ● Contain quality of service functions such as flow control, segmentation, and error control. ○ Acknowledgement of successful transmissions ○ Retransmissions of failed data segments/datagrams.
  • 11. TCP/UDP ● Transmission Control Protocol provides connection-oriented, reliable, ordered, and error-checked delivery of stream octets between hosts. ○ Ex. Youtube videos/Netflix ● User Datagram Protocol is a connectionless, unreliable, unordered, and no error checked delivery of datagrams between hosts. ○ Ex. Live streams
  • 13. WHAT ABOUT THE SECURITY?!?!?! Well there is a lot different areas and types of network security out there.. ● IPSec ● DNSSEC ● Malware Prevention ● Firewalls ● IDS/IPS ● Network Segmentation ● Web Security ● Wireless Security ● Etc.
  • 14. Malware Prevention ● This involves setting up network infrastructure to identify and detect the presence of intrusions on the network. ○ I.E. Malicious traffic or malicious behaviour ● Possible signs of malicious behaviour at the network level ○ Machines communicating to outside machine constantly (C&C). ○ Local machines communicating when they are not known to. ○ Out of the ordinary network traffic. (Sketchy sites)
  • 15. Well known virus attacks ● CryptoLocker ● ILOVEYOU ● MyDoom ● Storm Worm ● Zeus Trojan ● Emotet Trojan ● Stuxnet
  • 17. Resources ● Learning areas ○ HacktheBox.eu ○ https://www.sans.org/network-security/#free ○ Hacking the art of exploitation ● Tools ○ Wireshark ○ Nessus ○ Aircrack-ng ○ Snort

Notas del editor

  1. OSI - Open Systems Interconnection model A conceptual model that characterizes and standardizes the communication functions of a telecommunication or computing system without regard to its underlying internal structure or technology. Data Link Layer Provides node to node data transfer, a link between two directly connected nodes. This layer defines the protocols that are used to establish and terminate connection between two directly connected devices. MAC - responsible for controlling how devices on a network gain access and permission to transmit data. LLC - Responsible for multiplexing multiple network protocols to be transported over the same network medium. (Most use IP protocol) PPP Protocol is one example
  2. MAC addresses are 48 bit numbers represented by 6 groups of two hexadecimal numbers. There are 281,474,976,710,656 possible MAC addresses. Managed by IEEE. A 64 bit range is also available to be adopted.
  3. Message delivery at the network layer is not necessarily guaranteed to be reliable; a network layer protocol may provide reliable message delivery, but it need not do so.
  4. Conectionless datagram. Does not provide reliable delivery. That is done in Transport layer.