Data and Digital Communication Module 13-16
Data and Digital Communication Module 13-16
BUILD A
HOME
NETWORK
MODULE 13 - IRISH PARING
CONNECTING HOME
DEVICES
A home network is a small LAN with devices that
usually conne ct to a n integrated router a nd to ea ch
other in order to e xchange information.
• Ethernet Ports - These ports connect to the internal switch portion of the router.
• Internet Port - This port is used to connect the device to another network.
In addition to the wired ports, many home routers include a radio antenna and a built-in wireless
access point
THE ELECTROMAGNETIC SPECTRUM
Authentication Methods
• If there's no guest mode, control access with authentication methods.
• Users need a password or passphrase to connect to the SSID.
• Combine non-broadcast SSID with a passphrase for added security.
These measures help secure your network while considering convenience and flexibility.
CPE313
CONNECT TO
THE
INTERNET
MODULE 14 - OLAY, STEPHEN LOUIE ALEXIE, PABELLAN EULYSIS
CONTENT
01 ISP CONNECTIVITY OPTIONS
02 NETWORK VIRTUALIZATION
04 SUMMARY
14.1 ISP CONNECTIVITY
OPTIONS
CONTENT
01 ISP SERVICES
02 ISP CONNECTIONS
04 ADDITIONAL CONNECTIVITY
OPTIONS
14.1.1 ISP
SERVICES
An Internet Service Provider (ISP) provides the link between the home network and the internet. An
ISP can be the local cable provider, a landline telephone service provider, the cellular network that
provides your smart phone service, or an independent provider who leases bandwidth on the physical
network infrastructure of another company.
14.1.1 ISP
SERVICES
Many ISPs also o ffer additio nal services to
th eir con tract subscribers, as sh own in the
fig ure. T hese serv ices can inclu de em ail
accoun ts, network sto rag e, and website
ho sting and au to mated back up or security
services.
CONNECTIONS
ISP connection approach. It involves a modem that
directly links a computer to the ISP. However, this option
is not recommended, as it leaves your computer
unprotected when connected to the internet.
02 CLOUD COMPUTING
03 TYPES OF CLOUDS
04 CLOUD SERVICES
09 NETWORK VIRTUALIZATION
12 SDN ARCHITECTURE
14.2.1 CLOUD AND
VIRTUALIZATION
14.2.2 CLOUD
COMPUTING
What is Cloud computing?
Cloud computing is one of the ways that we access and store data. Cloud
computing allows you to store personal files and full drive backups on online
servers. It also provides access to applications such as word processing and
photo editing via the Internet. Data centers including servers, storage devices,
and network infrastructure make cloud computing possible.
14.2.3 TYPES OF
CLOUDS
• Public clouds
• Private clouds
• Hybrid clouds
• Community clouds
14.2.3 TYPES OF CLOUDS
Cloud-based applications and In private cloud, cloud-based applications and A hybrid cloud is a combination of
servicesPublic Cloudsin public
available PrivateforClouds
services are designed specific organizations such multipleHybrid
clouds Clouds
(e.g., private and
clouds are accessible to the as government. This can be built upon by the public) as distinct entities connected
general public, usually for free or organization’s own network, which can be expensive by a unified infrastructure. In a
through a pay-as-you-go method, to build and maintain. Alternatively, a private cloud hybrid cloud, users can access
can be managed by an outside organization with strict different services with different
such as payment for online
access security. permissions based on their user
storage. This service is provided
privileges.
via the Internet.
14.2.3 TYPES OF
CLOUDS
IMPROVED
LEGACY SUPPORT:
DISASTER
RECOVERY: Virtualization can
Most enterprise server
extend the life of OSs
virtualization platforms
and applications
have software that can
providing more time for
help test and automate
failover before a disaster organizations to migrate
happens. to new er solutions.
14.2.7 HYPERVISORS
The hypervisor is a program, firmware, or hardware that adds an
abstraction layer on top of the physical hardware. The abstraction layer
is used to create virtual machines which have access to all the hardware
of the physical machine such as CPUs, memory, disk controllers, and
NICs. Each of these virtual machines runs a complete and separate
operating system. With virtualization, it is not uncommon for 100
physical servers to be consolidated as virtual machines on top of 10
physical servers that are using hypervisors.
14.2.7 HYPERVISORS
Type 1 hypervisors are also called the “bare metal”
approach because the hypervisor is installed directly
Type 1
on the hardware.
Hypervisor:
Type 1 hypervisors are usually used on enterprise
servers and data center networking devices.
Server virtualization takes advantage of idle resources and consolidates the number of required
servers. This also allows for multiple operating systems to exist on a single hardware platform.
For example, in the figure, the previous eight dedicated servers have been consolidated into
two servers using hypervisors to support multiple virtual instances of the operating systems.
14.2.9 Network Virtualization
The SDN controller is a logical entity that enables network administrators to manage and dictate how the data plane of
switches and routers should handle network traffic. It typically runs on a server. It orchestrates, mediates, and facilitates
communication between applications and network elements.
14.3 Mobile Device
Connectivity
CONTENT
01 MOBILE DEVICES AND WI-FI
02 WI-FI SETTINGS
To connect an Android or iOS device to Wi-Fi, simply enable Wi-Fi, and the device will scan the available networks and display them in a list. Go to
the desired web page and enter a password if necessary.
When the mobile device goes into Wi-Fi range, it searches for another available Wi-Fi network. If none are found, it goes to the cellular
data network. When Wi-Fi is enabled, the device will connect to known networks. It displays the available options for the new network or
asks permission to add them.
14.3.3 Configure Mobile Wi-Fi Connectivity
Step 2: Enter the network SSID. Step 2: Enter the network SSID.
Step 3: Touch Security and select a security type. Step 3: Touch Security and select a security type.
Step 4: Touch Password and enter the password. Step 4: Touch Other Network.
Step 5: Touch Save. Step 5: Touch Password and enter the password.
Mobile devices are preprogrammed to use a Wi-Fi network for internet if one is available and the device can connect to the access point and receive an
IP address. If no Wi-Fi network is available, the device uses the cellular data capability if it is configured. Most of the time, transitions from one
network to another are not obvious to the user. For example, as a mobile device moves from an area of 4G coverage to 3G coverage, the 4G radio shuts
off and turns on the 3G radio. Connections are not lost during this transition.
14.3.5 BLUETOOTH
CONFIGURATION
14.3.6 Simple Connectivity with Bluetooth
Mobile devices connect using different methods such as cellular and Wi-Fi, which
can be difficult to configure and require additional equipments such as towers,
access points. Cable connections to connect headsets or speakers together may not
be practical sometimes. In contrast, Bluetooth offers a simple, wireless solution
for devices and accessories to support communication. It is automatic, power
efficient, saves battery life and supports up to eight connections simultaneously.
14.3.6 SIMPLE
CONNECTIVITY WITH
These are some examples of how devices use Bluetooth:
BLUETOOTH
HANDS-FREE K EYBO ARD OR STEREO CON TROL -
A small earpiece with
HEADSET - a MOorUSE
A keyboard - can be
mouse A mobile device can connect
microphone can be used for connected to a mobile device to to a home or car stereo to
making and receiving calls. make input easier. play music.
14.3.6 SIMPLE
CONNECTIVITY WITH
These are some examples of how devices use Bluetooth:
BLUETOOTH
CAR TETH ERIN MO BILE SPEA K ER -
ASPEAKERPHONE
device that contains - a A mobile device can connect to another Portable speakers can connect
G -
mobile device or computer to share a
speaker and a microphone can to mobile devices to provide
network connection. Tethering can also be
be used for making and performed with a Wi-Fi connection or a high-quality audio without a
receiving calls. cable connection such as USB. stereo system.
14.3.7 BLUETOOTH
PAIRING
Bluetooth pairing occurs when two Bluetooth devices establish a connection to share resources. In
order for the devices to pair, the Bluetooth radios are turned on, and one device begins searching
for other devices. Other devices must be set to discoverable mode, also called visible, so that they
can be detected. When a Bluetooth device is in discoverable mode, it transmits the following
information when another Bluetooth device requests it:
• Name
• Bluetooth class
• Services that the device can use
• Technical information, such as the features or the Bluetooth specification that it supports
14.3.7 BLUETOOTH
PAIRING
During the pairing process, a personal identification number (PIN) may be requested to
authenticate the pairing process. The PIN is often a number, but can also be a numeric code or
passkey. The PIN is stored using pairing services, so it does not have to be entered the next time
the device tries to connect. This is convenient when using a headset with a smart phone, because
they are paired automatically when the headset is turned on and within range.
14.3.3 CONFIGURE MOBILE WI-FI
CONNECTIVITY
Remember that mobile device operating systems are updated frequently. Always refer to the documentation of the manufacturer for your specific
model device for the latest command reference.
• Step 1. Follow the instructions for your device to place it in discoverable mode.
• Step 2. Check the instructions for your device to find the connection PIN.
• Step 1. Follow the instructions for your device to place it in discoverable mode.
• Step 2. Check the instructions for your device to find the connection PIN.
An ISP provides the link between the home network and the internet. Each ISP connects to other ISPs to form a
network of links called the internet backbone, which interconnects users all over the world. The internet backbone
uses fiber-optic cable to provide high-speed data links to connect the various service provider networks in major
metropolitan areas around the world.
Use a router to securely connect a computer to an ISP. The router includes a switch to connect wired hosts and a
wireless AP to connect wireless hosts. The router also provides client addresses and security for inside hosts.
The most common connection options for small office and home users are cable and DSL. Other ISP connection
options include cellular, satellite, and dial-up using a telephone line.
14.4 SUMMARY - NETWORK VIRTUALIZATION
14.2 Network Virtualization
Cloud computing allows us to store personal files, even backup an entire drive on servers over the internet. Cloud computing is possible
because of data centers. Data centers are facilities used to house computer systems and associated components. There are public, private,
hybrid, and community clouds. The four main cloud computing services are SaaS, PaaS, IaaS, and ITaaS.
Virtualization is the foundation of cloud computing. Virtualization reduces costs and enables prototyping, faster server provisioning,
increased server uptime, improved disaster recovery, and extends legacy support. The hypervisor is a program, firmware, or hardware
that adds an abstraction layer on top of the physical hardware. The abstraction layer is used to create virtual machines which have access
to all the hardware of the physical machine such as CPUs, memory, disk controllers, and NICs. The Type 2 Hypervisor is the “hosted”
approach. The Type 1 Hypervisor is known as the “bare metal” approach.
Virtualization separates the operating system (OS) from the hardware. Network virtualization combines traditional networking hardware
and software network resources into a software-based entity, a virtual network. The control plane is typically regarded as the brains of a
device. The data plane (forwarding plane) is typically the switch fabric that is connecting the network ports to a device.
14.4 SUMMARY - NETWORK VIRTUALIZATION
SDN is basically the separation of the control plane and data plane. The control plane function is removed from each device and is
performed by a centralized controller. The centralized controller communicates control plane functions to each device. Each device
can now focus on forwarding data while the centralized controller manages data flow, increases security, and provides other services.
The SDN controller is a logical entity that enables network administrators to manage and dictate how the data plane of switches and
routers should handle network traffic. It typically runs on a server. It orchestrates, mediates, and facilitates communication between
applications and network elements.
14.4 SUMMARY - MOBILE DEVICE CONNECTIVITY
Where possible, connect to Wi-Fi networks because data used over Wi-Fi does not count against most cellular
data plans. Because Wi-Fi radios use less power than cellular radios, connecting to Wi-Fi networks conserves
battery power. Use security when connecting to Wi-Fi networks:
Two popular operating systems for mobile devices are Android and Apple iOS. They each let you configure them
to connect to wireless networks. When a mobile device is out of the range of the Wi-Fi network, it attempts to
connect to another Wi-Fi network in range. If no Wi-Fi networks are in range, the mobile device connects to the
cellular data network.
14.4 SUMMARY - MOBILE DEVICE CONNECTIVITY
Cellular data plans are offered by most cell phone carriers, but the bandwidth limitations and charges for usage
vary widely by carrier and by plan within carrier. As a result, many mobile device users only use their cellular data
plans when Wi-Fi service is not available.
Bluetooth pairing is when two Bluetooth devices establish a connection to share resources. In order for the
devices to pair, the Bluetooth radios are turned on, and one device begins searching for other devices. Other
devices must be set to discoverable mode, also called visible, so that they can be detected.
Bluetooth technology provides a simple way for mobile devices to connect to each other and to wireless
accessories. Bluetooth is wireless, automatic, and uses very little power, which helps conserve battery life. Up to
eight Bluetooth devices can be connected together at any one time.
CPE313
SECURITY
CONSIDERATIO
NS
MODULE 15 - ED JAY OGOY, KIENSHEEN BARROS
TYPES OF THREATS
Wired or wireless, computer networks are crucial to daily life. Organizations and individuals
use computers and networks for email, accounting, organizing, and file management.
Unauthorized intrusions can cause costly network interruptions and lost work. Network
attacks can destroy or steal critical data, costing time and money. Computer vulnerabilities,
hardware assaults, and guessing usernames and passwords can allow intruders to enter a
network. Threat actors tweak software or exploit flaws to get access.
When the threat actor gains access to the network, four types of threat may arise:
• Information theft
• Data loss and manipulation
• Identity theft
• Disruption of service
TYPES OF THREATS
Information theft - is breaking into a computer to obtain confidential
information. Information can be used or sold for various purposes such as when
someone is stealing proprietary information of an organization, like research and
development data.
Data loss and manipulation - is breaking into a computer to destroy or alter data
records. An example of data loss is a threat actor sending a virus that re formats
a computer hard drive. An example of data manipulation is breaking into a
records system to change information, such as the price of an item.
TYPES OF THREATS
Identity theft - is a form of information theft where personal
information is stolen for the purpose of taking over the identity of
someone. Using this information, a threat actor can obtain legal
documents, apply for credit, and make unauthorized online
purchases. Identify theft is a growing problem costing billions of
dollars per year.
INTERNAL AND
EXTERNAL
THREATS
INTERNAL AND EXTERNAL
THREATS
External threats arise from individuals
working outside of an organization.
They are not permitted to use the
computers or the network. Most
attempts by outsiders to breach a
network are made through the
internet, either via wireless access
points or dial-up servers.
Internal threats occur when someone has authorized
access to the network through a user account, or has
physical access to the network equipment. Internal
attackers know the internal policies and people. They
often know what information is both valuable and
vulnerable, and how to get to it. However, not all
internal attacks are intentional. In some cases, an
internal threat can come from a trustworthy employee
who picks up a virus or security threat while outside
the company and unknowingly brings it into the
internal network. Most companies spend a lot of
money securing against external attacks, but trusted
internal users trigger some of the worst incidents. Lost
smart phones, detachable storage devices, computers,
and inadequate data removal before disposal are
major ways user data finds up in the wrong hands.
SOCIAL ENGINEERING
ATTACKS
Social engineering is a term that refers to the ability of something or someone to influence
the behavior of a person or group of people. In the context of computer and network
security, social engineering refers to a collection of techniques used to deceive internal
users into performing specific actions or revealing confidential information. The attacker
uses these methods to steal bank account numbers and passwords from unsuspecting
genuine users.
Social engineering attacks exploit the fact that users are generally considered one of the
weakest links in security. Social engineers can be internal or external to the organization,
but most often do not come face-to-face with their victims.
SOCIAL ENGINEERING
ATTACKS
CPE313
TYPES OF
SOCIAL
ENGINEERING
ATTACKS
TYPES OF SOCIAL ENGINEERING
Pretexting ATTACKS
Pretexting is a form of social engineering where an invented scenario (the
pretext) is used on a victim in order to get the victim to release information or
perform an action. The target is typically contacted over the telephone. For
pretexting to be effective, the attacker must be able to establish legitimacy
with the intended target, or victim. This often requires some prior knowledge
or research on the part of the attacker. For example, if a threat actor knows
the social security number of the target, the threat actor may use that
information to gain the trust of the target. The target is then more likely to
release further information.
TYPES OF SOCIAL ENGINEERING
ATTACKS
TYPES OF SOCIAL ENGINEERING
Phishing ATTACKS
Phishing is a form of social engineering where the phisher pretends to
represent a legitimate person from another organization. The phisher
typically contacts the target individual via email, as shown in the figure,
or text messaging. The phisher might ask for verification of information,
such as passwords or usernames in order to prevent some terrible
consequence from occurring.
TYPES OF SOCIAL ENGINEERING
Vishing / Phone Phishing ATTACKS
A new form of social engineering that uses Voice over IP (VoIP) is known
as vishing. With vishing, unsuspecting users are sent a voice mail
instructing them to call a number which appears to be a legitimate
telephone-banking service. The call is then intercepted by a thief. Bank
account numbers or passwords entered over the phone for verification
are then stolen.
In addition to social engineering, there are other types of attacks launched by malicious
software which exploit the vulnerabilities in computer software. Malware is the short name
for malicious software.
Examples of malware attacks include viruses, worms, and trojan horses. All of these are types
of malware introduced onto a host. They can damage a system, destroy data, as well as
deny access to networks, systems, or services. They can also forward data and personal
details from unsuspecting PC users to criminals. In many cases, they can replicate
themselves and spread to other hosts connected to the network. Imagine how difficult it
would be to recreate saved files, such as game files, license key files, photographs, and
videos. These methods are often used with social engineering to lure a person into a hack.
MALWARE
In addition to social engineering, there are various sorts of assaults that
are conducted by malicious software and which exploit the
vulnerabilities in computer software. These attacks take use of
loopholes in the program. The phrase "malicious software" is often
abbreviated to "malware".
VIRUSES
A virus is a program that spreads by modifying other programs or files. A
virus cannot start by itself; it needs to be activated. When activated, a virus
may do nothing more than replicate itself and spread. Though simple, even
this type of virus is dangerous as it can quickly use all available memory and
bring a system to a halt. A more serious virus may be programmed to delete
or corrupt specific files before spreading. Viruses can be transmitted via
email, downloaded files, and instant messages, or via CD or USB devices.
WORMS
A worm is similar to a virus, but unlike a virus, it does not need to attach itself to
an existing program. A worm uses the network to send copies of itself to any
connected hosts. Worms can run independently and spread quickly. They do not
necessarily require activation or human intervention. Self-spreading network
worms can have a much greater impact than a single virus and can infect large
parts of the internet quickly.
TROJAN HORSES
A Trojan horse is a program that is written to appear like a legitimate
program, when in fact it is an attack tool. It cannot replicate itself. A
Trojan horse relies upon its legitimate appearance to deceive the victim
into initiating the program. It may be relatively harmless or may contain
code that can damage the hard drive content of the computer. Trojans
can also create a back door into a system that then allows threat actors
to gain access.
SPYWARE
A spyware is any program that gathers personal information from your computer
without your permission or knowledge. This information is sent to advertisers or
others on the internet and can include passwords and account numbers.
Bot software can also compromise the security of infected machines. Installed software may
track keystrokes, acquire passwords, capture and analyze packets, gather financial data,
perform DoS attacks, and relay spam. Bots take advantage of time zones, often waking up the
zombie systems during the idle times in each time zone. Many users keep their computers
always connected to the internet, even when they are away from home or sleeping. This
creates the perfect environment for botnet creators to use the bandwidth and processing
power of the idle devices.
15.4 DENIAL OF
SERVICE
DENIAL OF SERVICES
(DOS)
•These are aggressive attacks on an individual computer
computers with the intent to deny services to intended users
or groups of
•It can target end user systems, servers, routers, and network links. DoS
attacks are relatively simple and can be initiated by an unskilled threat actor.
•Ping of death - This is when a packet that is greater in size than the
maximum allowed by IP (65,535 bytes) is sent to a device. This can cause the
receiving system to crash.
DENIAL OF SERVICES
(DOS)
DISTRIBUTED DENIAL OF
SERVICE (DDOS)
•It is a more sophisticated and potentially damaging form of the DoS attack.
•Its designed to saturate and overwhelm network links with useless data. DDoS operates on a much
larger scale than DoS attacks.
•The systems that are infected with the DDoS code attack the target site when invoked. This group
of infected computers is often called a botnet.
Brute Force
•With brute force attacks, a fast computer is used to try to guess passwords or to decipher an
encryption code. The attacker tries a large number of possibilities in rapid succession to gain access
or crack the code.
•Brute force attacks can cause a denial of service due to excessive traffic to a specific resource, or
by locking out user accounts.
DISTRIBUTED DENIAL OF
SERVICE (DDOS)
15.5 SECURITY
TOOLS
SECURITY PRACTICES AND
PROCEDURES
•Taking protective measures can guard you from loss of sensitive or confidential
data, and can protect your systems from being damaged or compromised.
Security procedures can range from simple, inexpensive tasks such as
maintaining up-to-date software releases, to complex implementations of
firewalls and intrusion detection systems.
•Some of the most effective security procedures are simple to implement and do
not require extensive technical knowledge. A username and password are two
pieces of information that a user needs to log on to a computer or application.
SECURITY PRACTICES AND
PROCEDURES
• Bios Password
SECURITY PRACTICES AND
PROCEDURES
• Windows Login
SECURITY PRACTICES AND
PROCEDURES
• Network Login
SECURITY PRACTICES AND
PROCEDURES
•It is important to change the default username for accounts such as administrator or guest,
because these default usernames are widely known.
•Whenever possible, change the default usernames of all users on computers and network
equipment.
•Internet security is a major concern around the world. As a result, many tools are available
to network users to protect the devices from attacks and to help remove malware from
infected machines.
•Internet security is a major concern around the world. As a result, many tools are available
to network users to protect the devices from attacks and to help remove malware from
SECURITY PRACTICES AND
APPLICATIONS
PATCHES AND UPDATES
Some of the signs that a virus, worm, or Trojan horse may be present include the
following:
•Computer starts acting abnormally
•Program does not respond to mouse and keystrokes
•Programs starting or shutting down on their own
•Email program begins sending out large quantities of email
•CPU usage is very high
•There are unidentifiable processes or a large number of processes running
•Computer slows down significantly or crashes, such as the when the Windows “blue
screen of death” (BSoD) appears,
SIGNS OF INFECTIONS
Windows BSoD
ANTIVIRUS SOFTWARE
•Antivirus software can be used as both a preventive tool and as a reactive
tool. It prevents infection. It detects and removes viruses, worms, and Trojan
horses. Antivirus software should be installed on all computers connected to
the network.
•Antivirus software relies on known “virus signatures” to find and prevent new
viruses from infecting the computer. Virus signatures are patterns within the
programs that are common to other malicious programs that have already been
identified as harmful. When new virus programs are found on the internet, the
signature files for the antivirus are updated with the new information. It is
important to keep virus checker software updated with the latest signature files
to protect the system from infection.
ANTIVIRUS SOFTWARE
Some of the features that can be included in antivirus programs are:
•Email checking - Scans incoming and outgoing emails, and identifies spam
and suspicious attachments.
•Resident dynamic scanning - Checks program files and documents when they
are accessed.
•Scheduled scans - Virus scans can be scheduled to run at regular intervals and
check specific drives or the entire computer.
•Automatic Updates - Checks for and downloads known virus characteristics
and patterns. Can be scheduled to check for updates on a regular basis.
ANTIVIRUS SOFTWARE
ANTISPAM SOFTWARE
•Antispam software protects hosts by identifying spam and performing an
action, such as placing it into a junk folder or deleting it. Spam filters can
be loaded on individual devices, but can also be loaded on email servers.
In addition, many ISPs offer spam filters. Antispam software does not
recognize all spam, so it is important to open email carefully. It may also
accidentally identify wanted email as spam and treat it as such.
ANTISPYWARE SOFTWARE
Antispyware and Adware
•Spyware and adware can also cause virus-like symptoms. Antispyware
software detects and deletes spyware applications, as well as prevents future
installations from occurring. Many antispyware applications also include
detection and deletion of cookies and adware. Some antivirus packages include
antispyware functionality.
Popup Blockers
•Popup blocking software can be installed to prevent popups and pop-unders.
Many web browsers include a popup blocker feature by default. Note that
some programs and web pages create necessary and desirable popups. Most
popup blockers offer an override feature for this purpose.
ADITIONAL SAFEGUARDS
•One of the most common types of spam forwarded is a virus warning.
Although some virus warnings sent via email are true, a large number of them
are hoaxes and do not really exist.
•This type of spam can create problems because people warn others of the
impending disaster and so flood the email system. In addition, network
administrators may overreact and waste time investigating a problem that does
not exist. Finally, many of these emails can actually contribute to the spread of
viruses, worms, and Trojan horses.
ADITIONAL SAFEGUARDS
In addition to using spam blockers, other actions to prevent the spread of spam
include the following:
•Apply OS and application updates when available.
•Run an antivirus program regularly and keep it up to date.
•Do not forward suspicious emails.
•Do not open email attachments, especially from people you do not know.
•Set up rules in your email to delete spam that bypass the antispam software.
•Identify sources of spam and report it to a network administrator so it can be
blocked.
•Report incidents to the governmental agency that deals with abuse by spam.
ADITIONAL SAFEGUARDS
15.7 SECURITY
CONSIDERATIONS
SUMMARY
SECURITY THREATS
•When a threat actor gains access to the network, four types of threat may arise:
information theft, identity theft, data loss or manipulation, and disruption of
service. Security threats from network intruders can come from both internal and
external sources.
•External threats come from threat actors working outside of an organization who
do not have authorized access to the computer systems or network. They work
their way into a network mainly from the internet, wireless links, or dialup access
servers.
•Internal threats occur when someone has authorized access to the network
through a user account or has physical access to the network equipment. In some
cases, an internal threat can come from a trustworthy employee who picks up a
OCIAL ENGINEERING ATTACKS
•Social engineering attacks exploit the fact that users are generally considered one
of the weakest links in security. Social engineers are threat actors and can be
internal or external to the organization. Three of the most common methods used
to obtain information directly from authorized users are pretexting, phishing, and
vishing.
•A worm is similar to a virus, but unlike a virus does not need to attach itself to an
existing program. A worm uses the network to send copies of itself to any
connected hosts. Worms can run independently and spread quickly.
•One of the major ways that spam can be sent is through the use of a botnet or bot.
MALWARE
•Spyware is any program that gathers personal information from your computer without
your permission or knowledge. This information is sent to advertisers or others on the
internet and can include passwords and account numbers. Cookies are a form of spyware
used to record information about internet users when they visit websites.
•Adware is a form of spyware used to collect information about a user based on websites the
user visits. That information is then used for targeted advertising. . Popups and pop-unders
are additional advertising windows that display when visiting a web site. Unlike adware,
popups and pop-unders are not intended to collect information about the user.
•Malicious bot software infects a host, usually through an email or web page link, by
downloading and installing a remote control function. When infected, the “zombie”
computer contacts servers managed by the botnet creator. These servers act as a command
and control (C&C) center for an entire network of compromised devices, or "botnet."
DENIAL OF SERVICE
•A DoS attack floods a system or network with traffic to prevent legitimate network traffic
from flowing and disrupts connections between a client and server to prevent access to a
service. Common DoS attacks are SYN flooding and ping of death.
•DDoS is designed to saturate and overwhelm network links with useless data. Typically
hundreds or thousands of attack points attempt to overwhelm a target simultaneously. The
attack points may be unsuspecting computers that have been previously infected by the
DDoS code.
•A brute force attack may also result in denial of services. With brute force attacks, a fast
computer is used to try to guess passwords or to decipher an encryption code. Brute force
attacks can cause a denial of service due to excessive traffic to a specific resource, or by
locking out user accounts.
SECURITY TOOLS
•A username and password are two pieces of information that a user needs to log on to a
computer or application. When a threat actor knows one of these entries, the attacker needs
only to crack or discover the other entry to gain access to the computer system. Change the
default usernames of all users on computers and network equipment. View passwords as a
key to valuable data and make them as secure as possible.
•Some of the security tools and applications used in securing a network include software
patches and updates, virus protection, spyware protection, spam blockers, popup blockers,
and firewalls.
•It is important to keep software applications up-to-date with the latest security patches and
updates to help deter threats. A patch is a small piece of code that fixes a specific problem.
An update may include additional functionality to the software package, as well as patches
for specific issues.
ANTIMALWARE SOFTWARE
•Some of the signs that a virus, worm, or Trojan horse may be present include these: when a
computer starts acting abnormally; when a program does not respond to mouse and
keystrokes; when programs start up or shut down on their own; when an email program
begins sending out large quantities of email; when CPU usage is very high; when there are
unidentifiable processes, or a large number of processes running; and when the computer
slows down significantly or crashes.
•Antivirus software can be used as both a preventive tool and as a reactive tool. It prevents
infection and detects, and removes, viruses, worms and Trojan horses. Antivirus software
should be installed on all computers connected to the network.
•Antispam software protects hosts by identifying spam and performing an action, such as
placing it into a junk folder or deleting it.
ANTIMALWARE SOFTWARE
•Antispyware software detects and deletes spyware applications, as well as prevents future
installations from occurring. Many antispyware applications also include detection and
deletion of cookies and adware. Popup blocking software can be installed to prevent popups
and pop-unders.
•Other actions to prevent the spread of spam include the following: apply OS and
application updates when available; run an antivirus program regularly and keep it up to
date; do not forward suspicious emails and do not open email attachments, especially from
people you do not know; set up rules in your email to delete spam that bypasses the
antispam software; identify sources of spam and report it to a network administrator so that
it can be blocked; and report incidents to the government agency that deals with abuse by
spam.
CPE313
CONFIGURE
NETWORK &
DEVICE
MODULE 16 - PAUL F. OGSIMER
SECURITY
WIRELESS
VULNERABILITIES
One of the primary benefits of wireless networking
is ease and convenience of connecting devices.
Unfortunately, that ease of connectivity and the fact
that the information is transmitted through the air
also makes your network vulnerable to interception
and attacks, as shown in the figure. Before your
wireless network is installed, it is important to
consider how you plan to secure access to it.
WAR DRIVING, WAR WALKING, AND WAR
CHALKING
• War-driving is the process of driving around an area searching for wireless
LANs. When a wireless LAN is discovered, the location of the WLAN is
logged and shared. The goal of war-driving may be to access the WLAN to
steal information. In some cases, the goal is to bring attention to the fact
that most wireless networks are insecure.
• With wireless connectivity, the attacker does not need a physical connection
to your computer or any of your devices to access your network. It is
possible for an attacker to tune into signals from your wireless network,
much like tuning into a radio station.
A COMPREHENSIVE SECURITY
PLAN
Security measures should be planned
and configured before connecting
the home wireless router to the
network or ISP.
BASIC WIRELE SS
SETTINGS
• Change the default Service Set
Identifier (SSID)
• Disable SSID broadcast
WIRELESS
SECURITY
Set the security profile for each
band:
• Configure the security mode to
use WPA2 Personal.
• Configure a passphrase.
MAC ADDRESS
FILTERING
Configure the MAC addresses that
you want to prevent or permit on the
WLAN.
PORT
FORWARDING
Configure the ports that should be
forwarded to a specific device,
such as a web server in your
demilitarized zone (DMZ).
DEMILITARIZED ZONE
(DMZ)
Configure the IPv4 address for the
server in the DMZ.
SSID
BROADCASTS
• One easy way to gain entryto a wire less
network is through the network na me , or
SSID.
The figure shows a single port forwarding rules table on a Cisco CVR100W Wireless-N VPN router.
PORT
TRIGGERING
Port triggering allow s the router to temporarily forw ard data through inbound TCP or UD P ports to a specific device.
You can use port triggering to forw ard data to a computer only w hen a designated port range is used to make an
outbound request. For example, a video game might use ports 27000 to 27100 for connecting with other players.
These are the trigger ports. A chat client might use port 56 for connecting the same players so that they can
communicate with each other while playing the game. In this instance, if there is gaming traffic on an outbound port
within the triggered port range, inbound chat traffic on port 56 is forwarded to the computer that is being used to play
the video game and chat with friends. When the game is over and the triggered ports are no longer in use, port 56 is
no longer allowed to send traffic of any type to this computer.
The figure show s a port range triggering rules table on a Cisco CV R100W Wireless-N V PN router.