Académique Documents
Professionnel Documents
Culture Documents
AMARESWARA RAO
INTRODUCTION TO NETWORKING
What is a Network?
A ``network'' has been defined as ``any set of interlinking lines resembling a net, a network of roads || an interconnected system, a network of alliances.'
network of computer networks that use the TCP/IP network protocols to facilitate data transmission and exchange. LAN : local area network
A B B
INTERNET
ISP : Internet service provider
Service Provider)
TCP/IP
Open Design Engineers and scientists from all over the world
participate in the IETF (Internet Engineering Task Force) working groups that design the protocols that make the Internet work.
IP
looking at the email, and then can execute any commands he wishes as the attacked user.
packets, whether they ever made it to their destination, etc., it has lower overhead than TCP.
nastiest, and most difficult to address. These are the nastiest, because they're very easy to launch, difficult track, and it isn't easy to refuse the requests of the attacker, without also refusing legitimate requests for service.
refer to a number of different sorts of attacks. The goal of these attacks is to access some resource that your machine should not provide the attacker
FIREWALL
As we've seen in our
discussion of the Internet and similar networks, connecting an organization to the Internet provides a two-way flow of traffic. This is clearly undesirable in many organizations, as proprietary information is often displayed freely within a corporate intranet.
Types of Firewalls
Application Gateways(proxy gateways) These are made up of bastion hosts that run special software to act as a proxy server. This software runs at the Application Layer Packet Filtering packet filtering is done with routers. packet filtering is used to detect the threat packet Hybrid Systems The benefits here include providing a measure of protection against your machines that provide services to the Internet.
means both sender and receiver use the same secret key to encrypt and decrypt the data
Asymmetric (or public) key encryption
Asymmetric encryption uses two related keys known as a key pair. A public key is made available to anyone who might want to send you an encrypted message. A second, private key is kept secret
STEGANOGRAPHY
Understanding Steganography Technologies
Steganography is the process of hiding data in other types of data such as images or text files