500 likes | 645 Views
Networking and Security. Connecting Computers and Protecting Them from Intruders. Networking Advantages and Disadvantages. Advantages Increased productivity More communication options Enable the sharing of resources Facilitate Internet connectivity Disadvantages Complexity Cost
E N D
Networking and Security Connecting Computers and Protecting Them from Intruders
Networking Advantages and Disadvantages • Advantages • Increased productivity • More communication options • Enable the sharing of resources • Facilitate Internet connectivity • Disadvantages • Complexity • Cost • Materials • Personnel
What is a Network? • Computer network: • Two or more computers connected together • Nodes: Any device connected to a network
Network Architecture • Network designs: • Locally controlled: • Peer-to-peer (P2P) • Centrally controlled: • Client/server Peer-to-peer Client/server
Peer-to-Peer Networks • Nodes communicate with each other: • Peers • Share peripheral devices: • Printers • Home and small office networks
Client/Server Networks • Client computers: • Users • Server computers: • Provide resources to clients • Central control unit • Data flows efficiently • Servers respond to requests from clients • Scalable network
Servers • Depending on the network size and work load servers can perform a single or multiple roles
Dedicated Server Types • Application • Authentication • File • Database • Email • Web • Print
Classifications of Client/Server Networks • LAN: local area network • Computers linked together over a small geographic region • WAN: wide area network • Computers linked together over large diverse geographic locations • MAN: metropolitan area network • Computers linked together within a city or county • PAN: personal area network • Wireless devices connected in close proximity to each other
Network Topology • Physical layout of networks components • Bus • Ring • Star
Bus Topology • All nodes are connected in sequence on a single cable • Used most often on peer-to-peer networks • Networked computers communicate with each other • One computer transmits data at a time: • Access methods avoid data collisions • Data is transmitted in “packets”
Ring Topology • Nodes are laid out in a ring • Token (data packet) flows in one direction from device to device
Star Topology • Nodes connect to a central communications device (hub/switch) • A node sends a signal to the hub which retransmits it to the other nodes • A node accepts the signal addressed to it
Network Operating Systems (NOS) • Provide the protocol that controls the communication between devices on the network • Major network operating systems: • Windows Server 2003 • UNIX • Novell NetWare
NIC Network Adapters • Devices connected to or installed in nodes: • Network interface cards (NIC) • External network adapter • Enable communication between nodes External adapter
Wireless Adapters • Uses radio waves to connect nodes (2.4GHz) • Each node requires a wireless network adapter
Transmission Media • Provides communications channel between nodes • Forms of media: • Telephone wire: • Twisted pair • Coaxial cable • Fiber-optic cable • Radio waves: • Wireless • Bandwidth: • Data transfer rate • Throughput • Measured in megabits per second (Mbps)
Choosing a Cable • Maximum run length • Bandwidth • Bend radius • Cable cost • Installation costs • Susceptibility to interference • Signal transmission methods
Twisted Pair Cable • Copper wire twisted around each other to reduce interference • STP- Shielded • UTP- Unshielded • Cat 5 • Cat 6
Coaxial Cable • Four components: • Copper core • Nonconductive insulating material • Braided metal • Plastic cover
Fiber-Optic Cable • Components include: • Glass or plastic fibers • Cladding • Outer jacket • Uses light impulses to transmit data • Immune to interference
Network Navigation Devices • Devices that help make data flow possible • Repeaters • Hubs • Switches • Routers
Ethernet Repeater and Hubs • Repeaters • Amplifies the signal • Hubs • Amplifies the signal • Simultaneous broadcasting • Acts like a cable splitter
Ethernet Switches and Routers • Switches • Send data to specific nodes on the network • Routers • Communicates data between different networks
Data Transmission and Protocols • Computer protocols are rules for electronic information exchange • Open system protocols: • Any computer can communicate with other computers using the same protocols • Circuit switching • Packet switching
Circuit Switching • Dedicated connection between two points • Remains active until the transmission is terminated • Telephone communications
Packet Switching • Data is broken into small units called packets • Packets are sent over various routes to their destination • Packets are reassembled by the receiving computer • Packets contain: • Destination/source addresses • Reassembling instructions • Data
Ports • Source Ports - is assigned to the client and is used to keep track of user sessions. • Destination Ports - are used to route packets to the appropriate application. • Listening Ports - software that responds to a port number is said to be "listening" for its packets. • 65,535 ports • Well known ports are 0-1023. • Port 80 HTTP
Headers • Encapsulation- layering of instructions onto the data • Headers are like mailing addresses and handling instructions • Contains information for the handling of the data block
TCP, IP, UDP • TCP- Transmission Control Protocol • Reliable • Will resend lost packets • Error checking • Send in an orderly fashion • UDP - User Datagram Protocol • Faster • Less reliable • Streaming • Internet Protocol - specifies the format of packets
MAC Address • Media Access Control address: hardware address that uniquely identifies each node of a network. • Example: 07-a1-34-ff-b5-df
IP Addresses • Unique number that identifies NOS/devices connected to the Internet • Example: 134.68.76.100 • Static address: • Address never changes: Enter it manually • Dynamic address: • Temporary address: Automatically assigned
Network Security • Why attack a network rather than the computers on the network? • Lower risk of getting caught • Less work • Availability of tools • Numerous methods
Networking Attack Methods • Sniffing • Spoofing • DoS – Denial of Service • Port Scanning
Wireless Security or Lack Thereof • Lack of user awareness • No authentication • Pervasiveness • Tools are easily available • Poor security design • Weak encryption • Enabled defaults • Admin PW • Broncast on • SSID
WWWD 2004 Stats • 228537 APs found • 140890 No WEP (60+%) • Wired Equivalent Privacy • 71850 Default SSID (30+%) • Service Set IDentifier • 62859 Default SSID and No WEP (27+%)
Wireless Math Open wireless + Netstumbler = War Driving + GPS + Internet = http://www.wifimaps.com/
Wireless Security Best Practices • Change default settings • Admin password • SSID – Service Set identifier • Rename • Choose wisely • Turn on WEP encryption • Disable SSID Broadcast • Create a VPN and use encryption
Wireless Security Paradoxs and Myths • MAC filtering • Disable SSID Broadcast • Disable DHCP • Antenna placement • WEP Enabled
Network Security • Firewalls: Block unused ports • Protects against port scanning • Authentication: • User ID and password used to access the network • Access privileges: • Close access to unused network systems • Use encryption and VPNs • Monitor your network • Fake APs • Watch traffic • Scan detectors
Links http://netstats.indiana.edu/wanmap/index.html http://reviews.cnet.com/Bandwidth_meter/7004-7254_7-0.html