Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more
Download
Standard view
Full view
of .
Save to My Library
Look up keyword
Like this
5Activity
0 of .
Results for:
No results containing your search query
P. 1
Network

Network

Ratings: (0)|Views: 86 |Likes:
Published by api-3705713
network
network

More info:

Published by: api-3705713 on Oct 14, 2008
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See more
See less

03/18/2014

pdf

text

original

i
i
INFORMATION RESOURCE GUIDE
Computer, Internet and Network Systems Security
An Introduction to Security
ii
ii
Security Manual

Compiled By:
S.K.PARMAR, Cst
N.Cowichan Duncan RCMP Det

6060 Canada Ave., Duncan, BC
250-748-5522
sunny@seaside.net

This publication is for informational purposes only. In no way should this publication by interpreted as offering legal or accounting advice. If legal or other professional advice is needed it is encouraged that you seek it from the appropriate source. All product & company names mentioned in this manual are the [registered] trademarks of their respective owners. The mention of a product or company does not in itself constitute an endorsement.

The articles, documents, publications, presentations, and white papers referenced and used to compile this
manual are copyright protected by the original authors. Please give credit where it is due and obtain
permission to use these. All material contained has been used with permission from the original author(s) or
representing agent/organization.

iii
iii
Table of Content
1.0 INTRODUCTION...........................................................................................................................................................2
1.1 BASIC INTERNET TECHNICAL DETAILS........................................................................................................................2

1.1.1 TCP/IP : Transmission Control Protocol/Internet Protocol............................................................................2 1.1.2 UDP:User Datagram Protocol............................................................................................................................2 1.1.3 Internet Addressing.............................................................................................................................................3 1.1.4 Types of Connections and Connectors............................................................................................................3 1.1.5 Routing..................................................................................................................................................................6 1.2 Internet Applications and Protocols......................................................................................................................6

1.2.1 ARCHIE..................................................................................................................................................................................6 1.2.2 DNS \u2014 Domain Name System...........................................................................................................................................7 1.2.3 E-mail \u2014 Electronic Mail......................................................................................................................................................7 1.2.4 SMTP \u2014 Simple Mail Transport Protocol..........................................................................................................................7 1.2.5 PEM \u2014 Privacy Enhanced Mail..........................................................................................................................................8 1.2.6 Entrust and Entrust-Lite.......................................................................................................................................................8 1.2.7 PGP \u2014 Pretty Good Privacy...............................................................................................................................................8 1.2.8 RIPEM \u2014 Riordan's Internet Privacy-Enhanced Mail......................................................................................................9 1.2.9 MIME \u2014 Multipurpose Internet Mail Extensions..............................................................................................................9

1.3 File Systems............................................................................................................................................................9

1.3.1 AFS \u2014 Andrew File system................................................................................................................................................9 1.3.2 NFS \u2014 Network File System..............................................................................................................................................9 1.3.3 FTP \u2014 File Transfer Protocol...........................................................................................................................................10 1.3.4 GOPHER..............................................................................................................................................................................10 1.3.5 ICMP \u2014 Internet Control Message Protocol...................................................................................................................10 1.3.6 LPD \u2014 Line Printer Daemon.............................................................................................................................................11 1.3.7 NNTP \u2014 Network News Transfer Protocol.....................................................................................................................11 1.3.8 News Readers.....................................................................................................................................................................11 1.3.9 NIS \u2014 Network Information Services..............................................................................................................................11 1.3.10 RPC \u2014 Remote Procedure Call.....................................................................................................................................12 1.3.11 R-utils (rlogin, rcp, rsh).....................................................................................................................................................12 1.3.12 SNMP \u2014 Simple Network Management Protocol........................................................................................................12 1.3.13 TELNET.............................................................................................................................................................................12 1.3.14 TFTP ? Trivial File Transfer Protocol.............................................................................................................................12 1.3.15 Motif...................................................................................................................................................................................13 1.3.16 Openwindows....................................................................................................................................................................13 1.3.17 Winsock..............................................................................................................................................................................13 1.3.18 Windows \u2014 X11...............................................................................................................................................................13 1.3.19 WAIS \u2014 Wide Area Information Servers......................................................................................................................13 1.3.20 WWW \u2014 World Wide Web.............................................................................................................................................13 1.3.21 HTTP \u2014 HyperText Transfer Protocol..........................................................................................................................13

2.0 SECURITY...................................................................................................................................................................16
2.1 SECURITY POLICY......................................................................................................................................................16

2.1.0 What is a Security Policy and Why Have One?............................................................................................16 2.1.1 Definition of a Security Policy..........................................................................................................................17 2.1.2 Purposes of a Security Policy..........................................................................................................................17 2.1.3 Who Should be Involved When Forming Policy?..........................................................................................17 2.1.4 What Makes a Good Security Policy?............................................................................................................18 2.1.5 Keeping the Policy Flexible..............................................................................................................................19

2.2 THREATS.....................................................................................................................................................................19

2.2.0 Unauthorized LAN Access...............................................................................................................................21 2.2.1 Inappropriate Access to LAN Resources.......................................................................................................21 2.2.2 Spoofing of LAN Traffic.....................................................................................................................................23 2.2.3 Disruption of LAN Functions............................................................................................................................24

Activity (5)

You've already reviewed this. Edit your review.
1 thousand reads
1 hundred reads
muthukumars liked this
peterangka liked this
dd1335 liked this

You're Reading a Free Preview

Download
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->