ICT202 Webinar-Week 1
ICT202 Webinar-Week 1
Courtesy of Pixabay
1
Introduction
1. Australia Post is a government-owned corporation that provides postal, retail, financial, and
digital services to customers across Australia.
2. The company was established in 1809 and has since become an iconic Australian brand, with
a reputation for reliability and trustworthiness.
3. In this slide, we will discuss the top leaders of Australia Post and their leadership style.
4. We will also explore how their leadership style has helped the company adapt to the changing
market dynamics and stay ahead of its competitors.
5. Did you know that Australia Post delivers over 3 billion letters and parcels each year, making
it one of the largest postal services in the world?
2
Objective:
• By the end of this slide, you will have a clear understanding of the top
leaders of Australia Post and their leadership style.
• You will also learn how their leadership style has helped the company
adapt to the changing market dynamics and stay ahead of its competitors.
3
ICT 202 Cyber Security
Unit Coordinator: Dr. Saman Shojae
Lecturer: Dr. Saman Shojae
Any Questions?
Email:
• [email protected]
4
Unit Learning Outcomes
5
Learning Resources
Recommended Reading
Prescribed Text (PT): Lynda
Whitman, M. E., & https://www.lynda.com
PT: Michael, G &
Mattord, H. J. /IT-Infrastructure-
Roberto, T. Introduction
Principles of tutorials/Practical-
to Computer Security,
Information Security, Cybersecurity/164982-
Global Edition.
6th Edition. Cengage 2.html
Pearson.
Learning, USA.
6
Assessment Tasks
No Name Type Description ULO Week %
1 Practical Labs Labs in Packet Tracer Practical Labs to design and LO3, LO4, LO6 3, 6, 9, 11 40
deploy various security In-class
technologies
2 Report and presentation Case study Analyse the designing and 8 40
security of the chosen real-world LO1, LO2,
organization, find its security LO3, LO4,
problems, and discuss the correct LO5, LO6
design/technologies
3 Practical assessment Practical assessment in Design, implement, and secure a LO3, LO4, LO5, LO6 12 20
Packet Tracer network in Packet Tracer In-class
7
Pre-Requisite of Unit
8
The Internet: A “Nuts and Bolts” view
Billions of connected mobile network
computing devices: national or global ISP
hosts = end systems
running network apps at
Internet’s “edge”
Streaming
Protocols are everywhere Skype
IP
video
• control sending, receiving of messages
local or
• e.g., HTTP (Web), Skype, TCP, IP, WiFi, regional ISP
4G, Ethernet
home network content
provider
HTTP network
Internet Standards
datacenter
network
Ethernet
• Defined by IETF: Internet Engineering
Task Force TCP
enterprise
• Request for Comments (RFC): network
Standard documents WiFi
Kurose, J., & Ross, K. (2017). Computer Networking: A Top-Down Approach, Global Edition.
The Internet: A “services” View
enterprise
network
Kurose, J., & Ross, K. (2017). Computer Networking: A Top-Down Approach, Global Edition.
Internet Protocol (IP) Address
• IP address
• IPv4 example: 203.2.218.214
• IPv6 example: 2001:0db8:85a3:0042:1000:8a2e:0370:7334
TEQSA: PRV14311
CRICOS: 03836J 12
What’s a Protocol?
Human Protocols: Network Protocols:
“what’s the time?” Computers (devices) rather than humans
“I have a question” All communication activity in Internet
governed by protocols
introductions
TEQSA: PRV14311
CRICOS: 03836J 13
What’s a Protocol?
A human protocol and a computer network protocol:
Hi TCP connection
request
Hi TCP connection
response
Got the
time? GET http://gaia.cs.umass.edu/kurose_ross
2:00
<file>
time
Q: other human protocols? Kurose, J., & Ross, K. (2017). Computer Networking: A Top-Down Approach, Global Edition.
TEQSA: PRV14311
CRICOS: 03836J 14
Packet Switching
Today’s internet is a packet switched network
Data is divided into packets and sent to the destination
Each packet contains a portion of user data plus some control info.
Each packet has to find its own route to the destination
No predetermined path
Decision as to which node to hop to in the next step is taken only when a
node is reached.
Resources used as needed
Congestion in routers: packets queue, wait for link use
Less reliable
Kurose, J., & Ross, K. (2017). Computer Networking: A Top-Down Approach, Global Edition.
TEQSA: PRV14311
CRICOS: 03836J 15
The Network Core
Mesh of interconnected routers mobile network
national or global ISP
Packet-switching: hosts break data
from applications into packets
• Network forwards packets from
one router to the next, across links local or
regional ISP
enterprise
network
Kurose, J., & Ross, K. (2017). Computer Networking: A Top-Down Approach, Global Edition.
Protocol Layers
Slide form Ross, K. and Kurose, J., 2016. Computer Networking: A Top-Down Approach, Global Edition.
TEQSA: PRV14311
CRICOS: 03836J
Example: Organization of Air Travel
Slide form Ross, K. and Kurose, J., 2016. Computer Networking: A Top-Down Approach, Global Edition.
TCP/IP Protocol Stack
To provide structure to design of network
protocols, network designers organize
protocols in layers
Service – says what a layer does
Protocol – says how the service is
implemented
Advantages
When taken together the protocols of
various layers are called the Protocol
Stack.
Internet Protocol Stack consists of Five
layers
Physical, Link, Internet or Network,
Transport and Application layers. Slide form Ross, K. and Kurose, J., 2016. Computer Networking: A Top-Down Approach, Global Edition.
TCP/IP Protocol Stack
• Application Layer:
Slide form Ross, K. and Kurose, J., 2016. Computer Networking: A Top-Down Approach, Global Edition.
TCP/IP Protocol Stack
• Transport Layer:
• Transmission Control Protocol (TCP) --- For Web browsing, File Transfer, Email
• User Datagram Protocol (UDP) --- For Real time video streaming, Skype calls
Slide form Ross, K. and Kurose, J., 2016. Computer Networking: A Top-Down Approach, Global Edition.
TCP/IP Protocol Stack
• Network Layer or Internet Layer:
• Responsible for moving network layer packets known as datagrams from one host
to another.
• Transport layer passes a transport layer segment and a destination IP address to
the network layer.
• Network layer includes IP Protocol
• Defines the fields in the datagram as well as how end systems and routers act
on these fields
• Commonly referred as IP layer.
• Different routing protocols.
• Determine the route that datagrams take between source and destination
Slide form Ross, K. and Kurose, J., 2016. Computer Networking: A Top-Down Approach, Global Edition.
TCP/IP Protocol Stack
• Link Layer:
Moves a packet from one node (host or router) to the next node in the
route.
Divide the stream of bits received from the network layer into manageable
data units called frames.
Transforms a raw transmission facility to a reliable link.
Mechanism to detect and retransmit damaged or lost frames
Example of link layer protocols include WiFi, Ethernet etc.
Slide form Ross, K. and Kurose, J., 2016. Computer Networking: A Top-Down Approach, Global Edition.
TCP/IP Protocol Stack
• Physical Layer:
The job of this layer is to move the individual bits within frames from one
node to next.
Representation of bits
Physical Layer data consists of a stream of bits (0 or 1)
Generate signals to transfer bits.
The protocol in this layer depend on the actual transmission medium
of the link.
Slide form Ross, K. and Kurose, J., 2016. Computer Networking: A Top-Down Approach, Global Edition.
TCP/IP Protocol Stack
Application: Provides user interfaces and support for services
such as e-mail, file transfer etc. Application
FTP, HTTP
Transport: Transports application-layer messages between
Transport
application end points.
Segmentation and reassembly
TCP, UDP Network
Network: Routing of Datagrams from source to destination
Link
IP, routing protocols
Link: Move a packet from one node (host or router) to the next node in Physical
the route.
Ethernet, WiFi
Physical: Move the individual bits with in frames from one node to next
Slide form Ross, K. and Kurose, J., 2016. Computer Networking: A Top-Down Approach, Global Edition.
OSI Reference Model
application M application
message
Ht M
transport Ht M
transport
segment
Hn Ht M Hn Ht M
network network
datagram
Hl Hn Ht M Hl Hn Ht M
link link
frame
physical physical
source destination
Slide form Ross, K. and Kurose, J., 2016. Computer Networking: A Top-Down Approach, Global Edition.
message M
source
application
Encapsulation and
segment
datagram Hn Ht
Htt M
M
transport
network
De-Encapsulation
frame Hl Hn Ht M link
physical
link
physical
switch
destination Hn Ht M network
M application Hl Hn Ht M link Hn Ht M
Ht M transport physical
Hn Ht M network
Hl Hn Ht M link router
physical
Slide form Ross, K. and Kurose, J., 2016. Computer Networking: A Top-Down Approach, Global Edition.
Network Basics
https://www.youtube.com/watch?v=rIZ61PyDkH8&list=PLR0bgGon_WTKY2irHaG_lNRZTrA7gAaCj&index=1
TEQSA: PRV14311
CRICOS: 03836J 31
What is Security?
• “A state of being secure and free from danger or harm; the actions taken to make
someone or something secure.”
TEQSA: PRV14311
CRICOS: 03836J 32 32
Cyber Security Fundamentals
• An important aspect of computer security is the identification of vulnerabilities in
computer systems, which can, for instance, allow a malicious user to gain access to
private data and even assume full control of a machine.
• Vulnerabilities enable a variety of attacks.
• Analysis of these attacks can determine the severity of damage that can be inflicted
and the likelihood that the attack can be further replicated.
• Actions that need to be taken to defend against attacks include
• Identifying compromised machines
• Removing the malicious code
• Patching systems to eliminate the vulnerability
TEQSA: PRV14311
CRICOS: 03836J 33
Confidentiality, Integrity and Availability (CIA)
Whitman, M & Mattord, J 2018, Principles of Information Security, 6th Edn, Cengage Learning, USA.
TEQSA: PRV14311
CRICOS: 03836J 34
Confidentiality
• In the context of computer security, confidentiality is the avoidance of the
unauthorized disclosure of information.
• Confidentiality involves the protection of data, providing access for those who are
allowed to see it while disallowing others from learning anything about its content.
• Tools to Protect Sensitive Information
• Encryption
• Access Control
• Authentication
• Authorization
• Physical Security
TEQSA: PRV14311
CRICOS: 03836J 35
Encryption
• The transformation of information using a secret, called an
encryption key, so that the transformed information can only be
read using another secret, called the decryption key (which may, in
some cases, be the same as the encryption key).
• To be secure, an encryption scheme should make it extremely
difficult for someone to determine the original information
without use of the decryption key.
TEQSA: PRV14311
CRICOS: 03836J 36
Access Control
• Rules and policies that limit access to confidential information to
those people and/or systems with a “need to know.”
• This need to know may be determined by
• Identity, such as a person’s name or a computer’s serial
number, or
• A role that a person has, such as being a manager or a
computer security specialist.
TEQSA: PRV14311
CRICOS: 03836J 37
Authentication
TEQSA: PRV14311
CRICOS: 03836J 38
Authentication
TEQSA: PRV14311
CRICOS: 03836J 39
Authorization and Physical Security
• Authorization
• The determination if a person or system is allowed access to resources,
based on an access control policy.
• Such authorizations should prevent an attacker from tricking the system
into letting him have access to protected resources.
• Physical Security
• The establishment of physical barriers to limit access to protected
computational resources.
• Such barriers include locks on cabinets and doors etc.
TEQSA: PRV14311
CRICOS: 03836J 40
C.I.A Triad
https://www.youtube.com/watch?v=szcmb-lcYV4
TEQSA: PRV14311
CRICOS: 03836J 41 41
Your Tasks For The Week
42
What’s coming up in the next week?
• Integrity
• Availability
• Types of Attacks
• Encryption Mechanisms
43
Any Questions?
44