Professional Documents
Culture Documents
messages can be received more quickly if many connections require a lot of maintenance
the route to the intended recipient is short
Wireless Connection
Wireless connection tend to use radio signals as
communication medium but could use other wireless methods
such as infrared light.
Thus Wireless connection does not require a physical
connection(cable) between devices
Wire and Wireless connection
Advantages of wire connection Disadvantages of wire connection
Faster than wireless connection Expensive and difficult to install and
Connection and Connection speed to be reconfigure
more reliable Require many cable at a premises
Not easy to intercept or eavesdrop on data
Less susceptible to interference than
wirelesses connection
50 * 1000 * 1000 * 8
Time =
12 * 1000 * 1000
= 33.33 second
Protocol
• Protocol is a set of rule that allow two device to communicate.
• Without protocol, difference computer and other hardware wouldn’t be able to
communicate with each other.
• A protocol might contain detail of:
• How each computer will be identified ( IP address)
• What route the data will be take to get to its destination
• How error will be found ( error checking)
• How the data is to be formatted and so on..
• Different type of protocols are used for different purpose.
Protocol
Email Protocol
Email are sent and received using a standard set of protocols.
There are three main email protocols in use
Protocol Description
SMTP Simple Mail Transfer Protocol
The protocol is used for sending email from client to sever
and then from server to server until it reach its destination
POP3 Post Office Protocol
The protocol is used for retrieving email from a mail server
All the email are downloaded when there is a connection
between client and server and the downloaded email are
removed from server
Thus, Email can be read without connection
IMAP Internet Message Access Protocol
Unlike POP, the messages do not have to be downloaded.
The message can be read and stored on the server.
This is better for users with many different devices
Protocol
Network Protocol
ETHERNET TCP
ETHERNET is a family of protocols that are used in The transmission Control Protocol provides a
wired LANS. reliable connection between computer.
It cover the physical parts of a networks such as how TCP does this by :
data is sent and checked for errors and the speed of Specifying that the received computer sends
the data can be transmitted acknowledgements that the data sent has
been received
Wi- Fi Using checksums to ensure that the data
Wi-Fi is a digital communication protocol that set out received is accurate
how data is transmitted on wireless LANS. Allowing the receiver to tell the sender to
slow down transmission
Ensuring the data sent up to application
layer contains on duplicates and is in the
correct order.
Protocol
HTTP ( Hyper Text Transfer Protocol) File Transfer Protocol
• The rule to be followed by a web server and web FTP is used to transfer files over a network
browser (client) when requesting and responding use the TCP protocol
information.
• HTTP is used for sending the request from web client
to web server and returning the web content (HTML)
from server to client.
yehtetaung.jack@gmail.com
Protocol
TCP/IP Layer
• Network technologies are separated into layers, each one
containing specific hardware and software protocols.
• The benefits of TCP/IP Layer are:
One layer can be developed or changed without affecting the
other layer
It makes easier to identify networking errors and problems
It makes easier to understand the overall model by dividing
it into functional part
The different layer can be combined in different ways
Mobile or cellular network
• A Cellular network or Mobile network is a wireless network distributed
through cells where each cell served by at least one fixed-location transceiver,
known as a cell site or base station.
• These cell together provide wireless coverage over a large geographical area.
• When a user moves out of ranges, the signal falls and the base station makes
a request to transfer control to other base station that is receiving the strongest
signals without notifying the user. This is called hangover
2G : enabled text message to be sent and introduced a multimedia
messaging service
3G: increased data transmission speed to 2Mbps and gave wireless
access to internet that enabled video calls and downloading and
streaming
4G: provided much higher speed , gave rise to the popularity of mobile
gaming and provided a much higher capacity
3G and 4G use IP based protocol for data but 4G also use IP for voice call
5G: is smarter , more efficient ,faster and lower latency than 4G. 5G will be
able to handle current devices and emerging technologies, such as
driverless car and connected home product
Cellular or Mobile network
Advantages of cellular or mobile network
Cover a large area
Less power usage
Use anywhere:
Large capacity
Availability
Integrity
Data should be readily available when it is
Data is useless unless it is correct
needed
Data cannot be modified /changed
Network is useless if data cannot be accessed
without authorization
when it is needed
Virus and Dos attack can affect availability of
data
Network security and its important
The important of network security
• The data stored on the network could be private and confidential, financially valuable and
required for the running of organization
The Way to Secure a Network
Authentication and Validation
Authentication is the process of checking the identity of a user of a computer or network using
username and password
This is done by validating a username and password against the stored on a central server.
As the password have many weakness, the security need to be improved using
Two factor authentication is a security system that requires two distinct forms of identification :
in order to access something. The first factor is a password and the second commonly includes
a text with a code sent to your smartphone (secure token, SMS), or biometrics using your
fingerprint, face, or retina.
Biometric Authentication uses the unique physical characteristics of an individual to verify their
identity. Biometric authentication can include:
• Fingerprints scan
• Facial recognition
• Retina or Iris patterns scan
• Voice recognition
The Way to Secure a Network
Access Control
• is the method that controls whether a particular user will gain access to a particular files
• Decides if the use gets:
Read-only access : user can open the file and read its content(data)
Read and write access (modify access) : user can read the file and alter the contents
and then save the changes
• In the full control access, user can delete the file
• are used to prevent unauthorized access to system resources.
• are set up by system administrators according to the management ‘s requirement
The Way to Secure a Network
Firewall
• are security systems designed to prevent unauthorized access to or from
your computer or private network.
• can be implemented in hardware, software or a combination of both
• sits between the user’s computer and an external network (e.g. the internet)
and filters information in and out of the computer
carried out the following task:
• examining the ‘traffic’ between the user’s computer and a public network
• The checks are to ensure that traffic (data) meets a given set of criteria (rules).
• if the data fails the criteria, the firewall will block the ‘traffic’ and give the user a
warning that there may be a security issue
• logging all incoming and outgoing ‘traffic’
• helping to prevent viruses or hackers entering the user’s computer
• warning the user if some software is trying to access an external data source
• criteria (rule) can be set to prevent access to certain undesirable sites and to
stop certain protocol from being used
The Way to Secure a Network
Physical security
• Ensures the critical part of the network can be only be physically accessed by authorized
people (network technicians and administrator)
• Include installing burglar alarm, security tagging and physically locking down equipment
etc.
• Servers should be kept in a locked, secure room that can only be accessed by authorized
people, such as the network manager.
• This is important as anyone with physical access to a server could remove or access the
hard disks containing private and confidential information and install malware.
Cloud storage and security
Many advantages of cloud storage relate to Cloud storage has security disadvantages
securing availability. • User are relying on third-party storage provider
• The cloud service provider ensure that the data is to keep his/her organization running
accessible and that they maintain the hardware • Data stored anywhere accessible via the
and software needed to make data availability
internet carries the risk of other people gaining
• The amount of storage available can be easily access to it.
changed as and when required – the cloud
• User of cloud storage have to assume that the
provider can make extra storage available in
cloud provider is trustworthy, and that their data
minute
is being held safely and securely
• Having data stored off-site mean that it is
• The cloud storage provider might have its
protected from loss due to fire, theft of computers,
electrical failure and so on servers located in different countries.
• Many cloud storage system also manage the • Access to control storage is dependent on
back-up of data having reliable, high- speed internet connection
Cloud storage and security
The security risk can be reduced by the following factors
USB storage has security disadvantages The security risk of USB can be reduced/
overcome by
This drive can be lost easily
Anyone can find a lost flash drive Use encrypted USB flash drives.
and access the information
Cyber Attack
• Is any of electronic attack on a computer, server, network or IT device.
• These attack might be designed to
• Gain access to data contained within the system
• Delete or modify information
• Make the system unavailable for use
• Physically damage a device connected to the network
Cyber Attack
• Most cyber attacks can be classed as exploiting either human behavior or technical
weakness
Social Engineering
• Attack that rely on exploiting human behavior are often referred to as social engineering
• There are three form of social engineering
• Phishing
• Pharming
• Shouldering surfing
Social Engineering
Phishing Attack
• Attempting to get confidential information by sending a user a message that appear
to come from trustworthy person or organization
• The creator send out a legitimate email, as soon as receiver click on email or
attachment, the user is sent to a fake website.
• When user enter his or her login detail, they are passed to attacker, who will financial
gain
Method to remove Phishing
Many ISPs filter out phishing emails
The user should always be cautions when opening emails or attachments
Social Engineering
Pharming Attack
• Malicious code installed on user’s hard drive or webserver that redirect the user to a
fake/bogus website without their consent in order to obtain personal data
• Malware can also infect the DNS server, so that everybody is directed to the bogus site.
To prevent Pharming Attack
• Check that the http address of the site that is intended to visit
• Check that there is a secure connection
• Check the site’s security certificate
• Install the latest security update
• Install antivirus software
Social Engineering
Shoulder surfing
• Shoulder surfing mean gaining access to confidential information ( username/ password
or PIN) by directly observing a user, possibly looking over their shoulder.
• Shoulder surfing often happens in busy places.
Eavesdropping
• Eavesdropping means intercepting data being sent to/form another computer system
• Eavesdropping on a network is simply reading data without copying or stealing it
• The owner of data might not know the data has been read until it is used by the criminal
Technical Weakness (Vulnerabilities)
Unpatched software
• Software that hasn’t had the latest security updates applied to it, making it vulnerable to attack
• The maker of the software will normally provide updates (patches) to fix the security issues as
they are found
• Some people will attack unpatched software to gain unauthorized access to information
• The patches to fix the security issues often have to be manually installed by a technician
USB device
• This device can potentially be a security thread because it might contain malware that could be
transferred data to the attacker via the internet
• The security weakness such unpatched software or USB device might allow malware to be
installed on the network that allows an eavesdropping attack to be carried out
Protecting against security weakness
• There are many way to strength computer system and network from attacks, starting from
when the software is designed and written, to deciding what kind of OS should be used
and how network security will be implemented.
Design and Implementation of software
• Security must be considered at the system design stage
The software and system engineer will need to consider the following
What kind of authentication is needed
Do difference users need different level of access to the stored data within the system
Should warning be issued before allowing users to carry out risky operation
Does stored data need to be encrypted
What threats will the software face?
Protecting against security weakness
• Once the designer have considered security, they need to look at the implementation phase
• The major issue at this point is guarding against bad programming practice
• Another major issue is that some method used in programming might lead to code vulnerabilities.
This issues can be minimized by having regular code reviews
There are two type of code review
Review by another programmer who is more An automated review : The software is used to
senior and has more experience of writing secure examine the code
code The software will highlight
They will check to see if The vulnerabilities in the programming
Any bad programming practices have been used language
Any code vulnerabilities are present The bad programming practice
This is labor intensive and expensive This software cannot find every issue and is
also fairly expensive
Module Testing
• Testing each block of code as it is completed to ensure the code work as expected
• This testing is important to security because if small problem remain, they might be used by hacker to gain
access to the system or the data
Protecting against security weakness
Other security measure to protect from cyber attacks
Use an audit trail
Audit trail is a record of activities that have taken place on a computer system
This record is generated automatically and will record what has happened and who or what made the
change
This allow technician to figure out what happened during a cyber attack : if the attack was successful;
what section of the system and data were accessed
Domain Name
This is the part of URL for a resource on the internet. http://www.google.com
Domain name are used to identify one or more IP address
Domain name are more convenient to use and easier to remember
than IP address
When domain name is used, it will be converted to the correct IP
address by the domain name server
TCP/IP Protocol
The internet uses the TCP/IP protocol stack to allow communication between all the
different networks.
The internet protocol(IP) provide each device or network to connected to the internet
with a unique address to send data to/from.
Two version of IP ,IPv4 and IPv6 are currently in use.
How the Internet Works
Router
The network that are part of internet are linked together using router.
A router is a piece of networking hardware that forwards packets between networks
A router has a routing table that is essentially a list of rules stating where to send packets
for different destinations
When router receive the packets it looks in the packet header for the destination address
and then uses the rules in the routing table to decide where to send it.
The packets will need to be forwarded between several routers before it reaches its
destination
How the Internet Works
When the internet connected computer wants to send data to another:
The sending computer splits the data into packets
Each packet’s header contains the addresses of send and destination, the current
packet number and the total number of packets
Each packet is sent to ISP
ISP will have a router. The router will inspect the packet header and decide where to
send the packet depending on its destination IP address
The packets will need to be forwarded between several routers before it reaches its
destination
Once the packet reaches its destination, the receiving computer will put the data back
together from the packets. Depending on the protocol being used, the packets might
arrive in the wrong order and have to be put back in order using the information in the
packet header.
Word Wide Web (WWW)
• WWW is a service that runs on the Internet
• It provide access to a web page which are linked together using a hypertext system
• WWW are accessed using a web browser.
• The web browser is used to convert the data received from a web server to a human-
readable format
• When user accesses a website using the client-server system
How the WWW Works
The www uses the internet to transfer data from one computer to another
1. The user of a computer enters the URL(uniform resource locator) he or she
wants to look at.
2. The computer use DNS to find the IP address of the required web server
3. The web browser connects to the web server using the IP address and
requests the relevant web pages
4. The web page is transferred from one computer to another using HTTP or
HTTPS
5. Data sent from a web server to web browser is in HTML format. The web
browser displays the web page
Hyper Text Markup Language is used when writing and developing web pages.
The need for IP Addressing Standards
• An IP address is a set of numbers that are used to identify on particular computer
• It allow internet data and message to be sent to the correct computer.
• IPv4 consists of four-8 bit numbers , for example 216.27.61.137.
• This contain 32 bit binary number and 28 * 28 * 28 * 28 = 4 billion unique address
216 *
• IPv6 was introduced so that more addresses would be available.
• IPv6 used 128 binary bits to create a single unique address
• IPv6 address is expressed by eight groups of hexadecimal numbers separated by colons
• 2001:cdba:0000:0000:0000:0000:3257:9652
• 216 *216 *216 *216 *216 *216 *216 *216 = 3.4 * 1038 unique address
Components Needed to Access Internet
Devices are needed to connect to a local area network
(LAN) and that LAN to a wide area network such as the
internet.
Switch
is a devices that receives incoming data packets and
redirects them to their destination on a local area
network because it build up a table of all addresses on
the network
This cut down on network traffic
Modem
Modem is needed to convert the signals in LAN into the signals that can be
transmitted along the cables provided by ISP.
The type of modem required will depend on the type of cable to the ISP