Chapter 15 Networks Part 2 ARPANet in 1969 1 Hofstra University - - PowerPoint PPT Presentation

chapter 15
SMART_READER_LITE
LIVE PREVIEW

Chapter 15 Networks Part 2 ARPANet in 1969 1 Hofstra University - - PowerPoint PPT Presentation

Chapter 15 Networks Part 2 ARPANet in 1969 1 Hofstra University - CSC005 11/29/06 Internet Standards and RFCs Internet Architecture Board (IAB) - overall architecture Internet Engineering Task Force (IETF) - engineering and development


slide-1
SLIDE 1

1 Hofstra University - CSC005 11/29/06

Chapter 15

Networks – Part 2

ARPANet in 1969

slide-2
SLIDE 2

2 Hofstra University - CSC005 11/29/06

Internet Standards and RFCs

Internet Architecture Board (IAB)

  • overall architecture

Internet Engineering Task Force (IETF)

  • engineering and development

Internet Engineering Steering Group (IESG)

  • manages the IETF and standards process
slide-3
SLIDE 3

3 Hofstra University - CSC005 11/29/06

Request For Comments (RFC)

RFCs are the working notes of the Internet research and development community

slide-4
SLIDE 4

4 Hofstra University - CSC005 11/29/06

Standardization Process

Stable and well understood Technically competent Substantial operational experience Significant public support Useful in some or all parts of Internet

Key difference from ISO: operational experience

slide-5
SLIDE 5

5 Hofstra University - CSC005 11/29/06

RFC Publication Process

Internet draft Experimental Informational Proposed standard Draft standard Internet standard Historic IETF IESG < 6 months > 6 months > 4 months two independent implementations

slide-6
SLIDE 6

6 Hofstra University - CSC005 11/29/06

How To Find RFCs

http://www.rfc-editor.org/rfcsearch.html

  • Search for RFCs

Some Popular Ones:

slide-7
SLIDE 7

7 Hofstra University - CSC005 11/29/06

Modern Life In Cyberspace...

http://www.aclu.org/pizza/images/screen.

...All I Wanted Was A Pizza!

slide-8
SLIDE 8

8 Hofstra University - CSC005 11/29/06

Introduction to

Network Security

slide-9
SLIDE 9

9 Hofstra University - CSC005 11/29/06

Security Attacks

slide-10
SLIDE 10

10 Hofstra University - CSC005 11/29/06

Security Services

Confidentiality – protection from passive attacks Authentication – you are who you say you are Integrity – received as sent, no modifications, insertions, shuffling or replays

slide-11
SLIDE 11

11 Hofstra University - CSC005 11/29/06

Security Services

Nonrepudiation – can’t deny a message was sent or received Access Control – ability to limit and control access to host systems and apps Availability – attacks affecting loss or reduction on availability

slide-12
SLIDE 12

12 Hofstra University - CSC005 11/29/06

Network Security Model

slide-13
SLIDE 13

13 Hofstra University - CSC005 11/29/06

Network Security Model

Design algorithm Generate secret information to be used Develop methods to distribute and share info Specify a protocol to be used by the two principals Four basic tasks in designing a security service:

slide-14
SLIDE 14

14 Hofstra University - CSC005 11/29/06

Protocols – Simple To Complex

slide-15
SLIDE 15

15 Hofstra University - CSC005 11/29/06

Protocols in a Simplified Architecture

slide-16
SLIDE 16

16 Hofstra University - CSC005 11/29/06

Protocol Data Units in TCP/IP

TCP Header User Data IP Header User Data Network Header User Data User Data Application Byte Stream TCP Segment IP Datagram Network-level Packet

slide-17
SLIDE 17

17 Hofstra University - CSC005 11/29/06

Operation of a Protocol Architecture

slide-18
SLIDE 18

18 Hofstra University - CSC005 11/29/06

TCP and UDP Headers

slide-19
SLIDE 19

19 Hofstra University - CSC005 11/29/06

IP Headers

128-bit field 32-bit field QoS max # allowable hops

slide-20
SLIDE 20

20 Hofstra University - CSC005 11/29/06

TP/IP Concepts

slide-21
SLIDE 21

21 Hofstra University - CSC005 11/29/06

Some TCP/IP Protocols

slide-22
SLIDE 22

22 Hofstra University - CSC005 11/29/06

Assigned Port Numbers

Sun NFS 2049 kerberos 88 radiusauth 1812 http 80 rip2 520 DNS 53 isakmp 500 rip 39 https 443 smtp 25 ldap 389 telnet 23 ntp 123 ftp 21 nntp 119 ftp-data 20 pop3 110 echo 7 Service Port Service Port

slide-23
SLIDE 23

23 Hofstra University - CSC005 11/29/06

Configuration of TCP/IP

slide-24
SLIDE 24

24 Hofstra University - CSC005 11/29/06

Alternate Routing Diagram

slide-25
SLIDE 25

25 Hofstra University - CSC005 11/29/06

Ethereal

Ethereal is a free network protocol analyzer for Unix and Windows Packet Sniffer - data can be captured "off the wire" from a live network connection www.ethereal.com - Everything you ever wanted to know about ethereal wiki.ethereal.com - This is the “User's Manual;” also has has a nice “References” section

slide-26
SLIDE 26

26 Hofstra University - CSC005 11/29/06

cookie is captured getting a quote business.nytimes.com dns query ACK

slide-27
SLIDE 27

27 Hofstra University - CSC005 11/29/06

Ethereal Etiquette

Be careful when and where you use this tool It makes people nervous Use prudence with the information you collect When in doubt, seek permission!

slide-28
SLIDE 28

28 Hofstra University - CSC005 11/29/06

Network Access Security Model

slide-29
SLIDE 29

29 Hofstra University - CSC005 11/29/06

Information Security

Physical Administrative “Lockup the file cabinet”

slide-30
SLIDE 30

30 Hofstra University - CSC005 11/29/06

Private Networks

Isolated to individual organizations Emergence of computer security Sharing a system Protecting data

slide-31
SLIDE 31

31 Hofstra University - CSC005 11/29/06

Networking

Networks start talking to each other Gateways Arpanet TCP/IP Everywhere Vinton Cerf, “IP On Everything!”

slide-32
SLIDE 32

32 Hofstra University - CSC005 11/29/06

Maturing of the Internet

Telephones used by 50% of worlds population Internet attains similar level of growth by 2010 – max growth Connecting computers and programmable devices More devices than people

slide-33
SLIDE 33

33 Hofstra University - CSC005 11/29/06

Early Hacking

Cap’n Crunch cereal prize Giveaway whistle produces 2600 MHz tone Blow into receiver – free phone calls “Phreaking” encouraged by Abbie Hoffman Doesn’t hurt anybody

slide-34
SLIDE 34

34 Hofstra University - CSC005 11/29/06

Captain Crunch

John Draper `71: Bluebox built by many Jobs and Wozniak were early implementers Developed “EasyWriter” for first IBM PC High-tech hobo White-hat hacker

slide-35
SLIDE 35

35 Hofstra University - CSC005 11/29/06

The Eighties

1983 – “War Games” movie Federal Computer Fraud and Abuse Act - 1986 Robert Morris – Internet worm -1988 Brings over 6000 computers to a halt $10,000 fine His Dad worked for the NSA!!!

slide-36
SLIDE 36

36 Hofstra University - CSC005 11/29/06

It Got Worse

1995 – Kevin Mitnick arrested for the 2nd time Stole 20,000 credit card numbers First hacker on FBI’s Most Wanted poster Tools: password sniffers, spoofing http://www.2600.com

slide-37
SLIDE 37

37 Hofstra University - CSC005 11/29/06

Tracking Attacks

http://www.cert.org

slide-38
SLIDE 38

38 Hofstra University - CSC005 11/29/06

Just because you’re paranoid, doesn’t mean they’re not out to get you!

  • Anonymous
slide-39
SLIDE 39

39 Hofstra University - CSC005 11/29/06

Firewalls

Figure 15.8 A firewall protecting a LAN

slide-40
SLIDE 40

40 Hofstra University - CSC005 11/29/06

Firewalls Make It To The Movies

slide-41
SLIDE 41

41 Hofstra University - CSC005 11/29/06

Why Firewalls?

Internet connectivity is no longer an

  • ption for most corporations

The Internet allows you access to worldwide resources, but… …the Internet also allows the world to try and access your resources This is a grave risk to most

  • rganizations
slide-42
SLIDE 42

42 Hofstra University - CSC005 11/29/06

Why Firewalls?

A firewall is inserted between the premises network and the Internet Establishes a perimeter Provides a choke point where security and audits can be imposed Single computer system or a set of systems can perform the firewall function

slide-43
SLIDE 43

43 Hofstra University - CSC005 11/29/06

Good Fences Make Good Neighbors – Robert Frost, “Mending Wall”

slide-44
SLIDE 44

44 Hofstra University - CSC005 11/29/06

Design Goals

All traffic, from inside to outside and vice versa, must pass through the firewall Only authorized traffic (defined by the security policy) is allowed to flow Firewall is immune to penetration – uses a trusted system

slide-45
SLIDE 45

45 Hofstra University - CSC005 11/29/06

Other Types Of Firewalls

Personal Firewalls Appliances – personal firewall appliances are designed to protect small networks such as networks that might be found in home

  • ffices

Provide: print server, shared broadband use, firewall, DHCP server and NAT

(NB: This is not an endorsement of any product)

slide-46
SLIDE 46

46 Hofstra University - CSC005 11/29/06

Viruses

slide-47
SLIDE 47

47 Hofstra University - CSC005 11/29/06

Viruses

A virus is a submicroscopic parasitic particle that infects cells in biological

  • rganisms.

Viruses are non-living particles that can only replicate when an

  • rganism reproduces the

viral RNA or DNA. Viruses are considered non-living by the majority

  • f virologists

www.virology.net

slide-48
SLIDE 48

48 Hofstra University - CSC005 11/29/06

Viruses

Viruses: code embedded within a program that causes a copy of itself to be inserted in other programs and performs some unwanted function Infects other programs Code is the DNA of the virus

slide-49
SLIDE 49

49 Hofstra University - CSC005 11/29/06

Worms

slide-50
SLIDE 50

50 Hofstra University - CSC005 11/29/06

Worms

Worms: program that can replicate itself and send copies to computers across the network and performs some unwanted function Uses network connections to spread from system to system

slide-51
SLIDE 51

51 Hofstra University - CSC005 11/29/06

Useful Websites

http://www.rfc-editor.org/rfcsearch.html Search RFCs http://www.cert.org Center for Internet security http://www.counterpane.com/alerts.html Some recent alerts

slide-52
SLIDE 52

52 Hofstra University - CSC005 11/29/06

Assignment #3

Research these two RFCs: RFC1129 and

  • RFC968. Given a brief - paragraph, not a

single sentence – description based on the abstract, introduction, or basic content Pick google.com and one other site. Using whois and ARIN, get as much information as possible about the IP addressing, the DNS and the site (location, owner, etc.) Due next Wednesday, December 6 – or you can email it earlier

slide-53
SLIDE 53

53 Hofstra University - CSC005 11/29/06

Homework

Read Chapter Fifthteen – and review slides ...Next Class We'll Cover Artificial Intelligence...

slide-54
SLIDE 54

54 Hofstra University - CSC005 11/29/06

...Have A Nice Weekend

“The City” At 1200 Feet In December