Computer Network Workshop 2022 - DA
Computer Network Workshop 2022 - DA
Introduction to
Computer Networks & Cyber Security
Prepared By : Mohamed AboSehly
Agenda
❖ Session 1
Network Essentials
❖ Session 2
Cyber Security Essentials
❖ Session 3
Distributed System
Computer Network Workshop
References:
o CompTIA Network
Session 1 (Network Essentials)
• Session Outlines
• Computer Networks
• Definition and Basic Terminologies
• Internet layer
• Transport layer
• Application Layer
Session 1 (Computer Networks Definition)
• Computer Network :
• a collection of computers, and other devices, or
peripherals connected together through connecting
media to perform certain task such as :
Share Resources
• Resources can be :
• File Sharing
• Devices Sharing
• Software Sharing with multi-user licenses.
• Voice and Video calls
• Shared Internet Access
Session 1 (Network Elements)
• Network Elements
Hardware
• Devices
• Computers – Printers –Phone – Routers - Switches
• Medium
• Wired -Wireless –Satellites
• Software
• Messages
• Information that travels over the medium such as Mails-WhatsApp….etc
• Protocols
• Governs how messages flow across network such as http –https-FTP-RDP
Session 1 (Network Basic Terminologies )
• NIC (Network Interface Card)/network adapter or LAN adapter.
• a hardware that enable the device to directly access the network
• Repeater
• Regenerate the signal over the same network before the signal
becomes too weak or corrupted
• Switch
• Allow different nodes to communicate with each other at the same
network and time without slowing each other
• Router
• Allow different networks to communicate with each other
Session 1 (LAN VS WAN)
• The internet
• is defined as a global mesh of interconnected networks
• No one actually owns the Internet
• Many Orgs, ISPs, Companies, Govs own pieces of
Internet Infrastructure.
• ISOC: Internet Society
• IETF: Internet Engineering Task Forum
• ICANN: Internet Corporation for Assigned Names and
Numbers
Session 1 (Peer to Peer Vs Client/Server )
• TCP/IP
• Transmission Control Protocol/Internet Protocol.
• Open standard protocol
• Cross Platform ) default protocol for all modern operating systems(
• Microsoft Operating Systems
• LINUX Operating Systems
• Not tied to one vendor
• Direct access to the Internet) TCP/IP is the internet protocol(
• Now internet use TCP/IP v4
• Next version TCP/IP v6
• Routable
Session 1 (TCP/IP Protocol Suite)
A 10.0.0.0 to 10.255.255.255
B 172.16.0.0 to 172.31.255.255
192.168.0.0 to 192.168.255
C
255
2001:0db8:0000:0000:0000:8a2e:0370:7334
=
2001:db8::8a2e:370:7334
Session 1 (TCP/IP Protocol Architecture)
• Transport Layer
TCP UDP
Transmission Control Protocol) User Datagram Protocol
Reliable (Acknowledgement) Unreliable (Best –Effort delivery)
Connection oriented (synchronization) Connectionless (no notification)
Full duplex Full duplex
Error control(Error checking(checksum ) Perform very limited error checking
Data-recovery features Has no Data-recovery features
E-mail Voice Streaming
File sharing Video Streaming
Downloading
Session 1 (TCP/IP Protocol Architecture)
• Application Layer
• Communication between processes or
applications
• Threats is A person, thing, event or idea which poses danger to an asset in terms of that
asset’s confidentiality, integrity, availability or legitimate use
• It's impossible to totally eliminate risk & There is NO simple solution to securing information
• Passive Attack
• Difficult to detect, because the attacker isn’t actively sending traffic
(malicious or otherwise)
• Example: An attacker capturing packets from the network and
attempting to decrypt them
• Active Attack
• Easier to detect, because the attacker is actively sending traffic that
can be detected.
• An attacker might launch an active attack in an attempt to access
information or to modify data on a system.
Session 2 (Attackers Methods)
• Social engineering
• is a term that refers to the ability of something or
someone to influence the behavior of a group of
people.
• PHISHING ATTACK:
• A fake web page which looks exactly like a
popular website such ( facebook, twitter, Gmail ,
paypal , bank page ) to persuade you to enter
information identity such as username ,
passwords and credit cards details
• the hacker records the username and password
and then tries that information on the real site.
Session 2 (Attackers Methods)
• HIJACK ATTACK
• a hacker takes over a session between you
and another individual and disconnects the
other individual from the communication. You
still believe that you are talking to the original
party and may send private information to
the hacker by accident.
• Insider Attack
• involves someone from the inside, such as a
disgruntled employee, attacking the network.
Session 2 (Attackers Methods)
• PASSWORD ATTACK
• An attacker tries to crack the passwords stored in a network
account database or a password-protected file.
• Dictionary attack
• Brute-force attack
• Hybrid attack.
Session 2 (Malicious Software (Malware )types))
• Backdoor or Trapdoor
• Secret entry point into a program ,Have been commonly used by
developers
• Can’t be removed or scanned and the only way is to uninstall sw or
format the system
• Viruses
• A virus is malicious software that is attached to another program to
execute a particular unwanted function on a user's workstation.
• Both propagates itself & carries a payload
• Carries code to make copies of itself
• Trojan Horse
• program with hidden side-effects which is usually superficially attractive
eg game, software upgrade etc .
• allows attacker to indirectly gain access they do not have directly
• used to propagate a virus/worm or install a backdoor
• Open some ports or pass some malicious files
Session 2 (Malicious Software
• Worms
(Malware )types)
• Replicating but not infecting program Typically spreads over a
network Using users distributed privileges or by exploiting system
vulnerabilities Widely used by hackers to create zombie pc's,
subsequently used for further attacks, especially dos
• Major issue is lack of security of permanently connected systems
• Zombie
• Program which secretly takes over another networked computer
then uses it to indirectly launch attacks
• Often used to launch distributed denial of service (DDoS) attacks
• Ransomware
• Malware that locks a computer or device or encrypts data (Crypto
ransomware) on an infected endpoint with an encryption key ,only
the attacker knows the key the data unusable until the victim pays
a ransom (usually cryptocurrency, such as Bitcoin).
Session 2 (Malicious Software
(Malware )types)
• DoS Attack
• Denial of service is about without permission
knocking off services,
used for crashing the whole system.
• This kind of attacks are easy to launch and it is hard
to protect a system against them.
• Consume host resources
• Memory
• Processor cycles
• Consume network resources
• Bandwidth
• Dos Attack (Ping of Death)
• DDoS Attack
• A distributed denial of service attack uses multiple
machines to prevent the legitimate use of a service.
• TCP SYN flood
Session 2 (Malicious Software
(Malware )types)
• Spam
• Spam is a serious network threat that can overload ISPs, email
servers and individual end-user systems. A person or organization
responsible for sending spam is called a spammer. Spammers often
make use of unsecured email servers to forward email. Spammers
can use hacking techniques, such as viruses, worms and Trojan
horses to take control of home computers.
• Spyware
• Spyware is any program that gathers personal information from your
computer without your permission or knowledge. This information is
sent to advertisers or others on the Internet and can include
passwords and account numbers.
• Tracking Cookies
• Cookies are a form of spyware but are not always bad. They are
used to record information about an Internet user when they visit
websites
Session 2 (Attacks Mitigation)
• Firewall
• A Firewall is one of the most effective security tools available for
protecting internal network users from external threats.
• A firewall resides between two or more networks and controls the traffic
between them as well as helps prevent unauthorized access
• Static Packet Filtering (stateless firewall )
• - Prevents or allows access based on IP or MAC addresses.
• Dynamic Packet Filtering (state full firewall)
• Incoming packets must be legitimate responses to requests
from internal hosts. Unsolicited packets are blocked unless
permitted specifically. SPI can also include the capability to
recognize and filter out specific types of attacks such as DoS.
Session 2 (Attack Mitigation)
• Proxy Server
• A computer system (or an application program) that intercepts
internal user requests and then processes that request on behalf of
the user
• Goal is to hide the IP address of client systems inside the secure
network
• VPN
• It Tunnel the traffic between the Two Sides of Network
• Kinds:
• Remote Access VPN
• Site to Site VPN
Session 2 (Attack Mitigation
)
• Intrusion Detection and Prevention Systems
• NIDS:
• Watch the Network Traffic and if there is Intrusion it
Detects that there is Bad traffic Flow.
• it send alarms and logs
• NIPS:
• Stops the traffic if it detects that there is intrusion
• Signature-based: look for the perfect match
• Next generation Firewall (NGFW)
• is,a “deep-packet inspection firewall that moves beyond
port/protocol inspection and blocking to add application-level
inspection, intrusion prevention, and bringing intelligence from
outside the firewall.”
Session 2 (Encryption)
• Encryption
• encryption is the process of encoding
information. This process converts the original
representation of the information, known as
plaintext, into an alternative form known as
ciphertext.
• Unencrypted data, called plaintext, is sent
through an encryption algorithm to generate
a ciphertext. A key is used for encryption.
4- Peer-to-peer :
• No centralized or special machine that does the heavy lifting and
intelligent work in this architecture.
• All the decision making and responsibilities are split up amongst the
machines involved and each could take on client or server roles.
• Blockchain is a good example of this.
Session 3 (Distributed System Examples)
• Community.
• A cloud infrastructure that is used exclusively by a specific group of organizations.
• Private.
• A cloud infrastructure that is used exclusively by a single organization. It may be owned, managed,
and operated by the organization or a third party (or a combination of both), and it may exist on
premises or off premises.
• Hybrid.
• A cloud infrastructure that comprises two or more of the aforementioned deployment models,
bound by standardized or proprietary technology that enables data and application portability (for
example, fail over to a secondary data center for disaster recovery or content delivery networks
across multiple clouds).
Session 3 Practices