Final Exam Review (Part 2)LEARNING GOALSNETWORKING TECHNOLOGIESComputer NetworkWhy Networking ?NewContoso Inc. NetworkNewContoso Inc. Network (cont.)SECURITY & PRIVACYSlide 9Attack strategyAttack strategy (cont.)Major security threatsContent attacksTrojan horseSlide 15NewContoso Inc. network securityNewContoso Inc. network security (cont.)Slide 18Slide 19Summary Questions1Final Exam Review(Part 2)BUS3500 - Abdou Illia, Fall 2007(Thursday 12/6/2007)2LEARNING GOALSUnderstand the advantages of a LAN vs. stand-alone computers.Identify hardware and software needed to implement a LAN.Choose between P2P and C/SUnderstand security attack strategyRecognize different malware threats based on their MO3NETWORKINGTECHNOLOGIES4Computer NetworkAn interconnection of computers and computing equipment using either wires or radio waves over small or large geographic distances“Connect to GHI”ABCDEFGHIJKLMNOOnce connected to the network, the computer (or another device) becomes a network node5Why Networking ? Resource sharingSharing Hardware (printers, CPU, etc.)Sharing Software (programs, data files) High reliabilityAutomatic backup of programs and data at different locations) Cost savingThrough programs sharingThrough hardware (e.g. printers) sharing Communication toolInternal email serviceRemote Access service6NewContoso Inc. NetworkNewContoso Inc. has 25 desktop PCs. All of the PCs have Windows XP Professional installed. The PCs are used as stand-alone computers by the company’s employees to perform regular office work like word processing, creating spreadsheet documents, and managing databases. Ten out of the 25 PCs have a 100 Mbps Ethernet NIC. The company is thinking about implementing a LAN to provide shared Internet access to all employees, as well as software sharing and database service through a new model of server computer that is scheduled to be on the market next month. The new server will also be used to provide print service with a non-existing network laser printer. A consultant hired by the company recommended installing a 100BaseTX local area network.7NewContoso Inc. Network (cont.)1) What hardware and software items the company needs to get in order to implement the local area network?2) Based on the information provided in the case, what network architecture will allow providing the services in a more effective way: P2P or Client/Server? Explain. 3) Assuming that a 100BaseTX switch is used as the central collection point of the network, how many seconds or minutes it will take to send twenty five documents, of 0.5 megabytes each, from one node to another? You should assume that only the two nodes involved are sending/receiving, and no other nodes are sending/receiving during the time the two nodes are involved in the transmission.8SECURITY & PRIVACY9Received: from hotmail.com (bay103-f21.bay103.hotmail.com [65.54.174.31]) by barracuda1.eiu.edu (Spam Firewall) with ESMTP id B10BA1F52DC for <[email protected]>; Wed, 8 Feb 2006 18:14:59 -0600 (CST)Received: from mail pickup service by hotmail.com with Microsoft SMTPSVC; Wed, 8 Feb 2006 16:14:58 -0800Message-ID: <[email protected]>Received: from 65.54.174.200 by by103fd.bay103.hotmail.msn.com with HTTP; Thu, 09 Feb 2006 00:14:58 GMTX-Originating-IP: [192.30.202.14]X-Originating-Email: [[email protected]]X-Sender: [email protected]: <10E30E5174081747AF9452F4411465410C5BB560@excma01.cmamdm.enterprise.corp>X-PH: V4.4@ux1From: <[email protected]>To: [email protected]: RE: FW: Same cell#Subject: RE: FW: Same cell#Date: Thu, 09 Feb 2006 00:14:58 +0000Mime-Version: 1.0Content-Type: text/plain; format=flowedX-OriginalArrivalTime: 09 Feb 2006 00:14:58.0614 (UTC) FILETIME=[DCA31D60:01C62D0D]X-Virus-Scanned: by Barracuda Spam Firewall at eiu.eduX-Barracuda-Spam-Score: 0.0010Attack strategyScanningPing messages (To know if a potential victim exist, is connected to the network, and is responsive)Supervisory messages (To know if victim available)Tracert, Traceroute (to know about the route that lead to target)Check the Internet (e.g. www.cert.org) for latest systems vulnerabilitiesUse Social engineering strategy to get other informationTricking employees to provide passwords, keys and other info.Misleading people to provide confidential info through email, fake websites, etc.11Attack strategy (cont.)Examining collected dataUsers login names and passwordIP addresses of potential victimsWhat services servers are running.Different services have different weaknessesPotential victim’s operating systems, version number, etc.Deciding types of attacksDoS attacks using servers valid IP addressesPing of Death on servers with older operating systemsContent attacks using identified Open Mail servers & collected emailsSystem intrusion on improperly configured serversLaunch the attacks12Major security threatsDenial of Service (DoS) attacksThe attacker makes a target (usually a server) deny service to legitimate usersContent attackSending messages with illicit or malicious contentSystem intrusionGetting unauthorized access to a network13Content attacksIncoming messages with:Malicious content (or malware)Viruses (infect files on a single computer)Worms (Propagate across system by themselves)Trojan horses (programs designed to damage or take control of the host computer)Illicit contentPornographySexually or racially harassing e-mailsSpams (unsolicited commercial e-mails)14Trojan horseA computer programThat appears as a useful program like a game, a screen saver, etc.But, is really a program designed to damage or take control of the host computerWhen executed, a Trojan horse couldFormat disksDelete filesAllow a remote computer to take control of the host computerNetBus and SubSeven used to be attackers’ favorite programs for target remote control15Trojan horseNetBus Interface16NewContoso Inc. network securityDuring the last few months, NewContoso Inc. has been the target of a series of computer and network security attacks. As a result, the IT personnel at NewContoso Inc. have been busy working on the computers in order to assess and fix the damage caused by the attacks with the goal of restoring network services. The IT personnel have
View Full Document