The Internet The World Wide Web and everything

Slides:



Advertisements
Similar presentations
Module 5: Configuring Access for Remote Clients and Networks.
Advertisements

1 Configuring Virtual Private Networks for Remote Clients and Networks.
Hands-On Microsoft Windows Server 2003 Administration Chapter 11 Administering Remote Access Services.
11 Networks The Great Information Exchange. 2 Networking Fundamentals Computer network: Two or more computers connected together Each is a Node Benefits.
How Clients and Servers Work Together. Objectives Learn about the interaction of clients and servers Explore the features and functions of Web servers.
Remote Networking Architectures
Network Address Translation, Remote Access and Virtual Private Networks BSAD 146 Dave Novak Sources: Network+ Guide to Networks, Dean 2013.
MCTS GUIDE TO MICROSOFT WINDOWS 7 Chapter 14 Remote Access.
NetComm Wireless VPN Functionality Feature Spotlight.
Week #10 Objectives: Remote Access and Mobile Computing Configure Mobile Computer and Device Settings Configure Remote Desktop and Remote Assistance for.
Microsoft Windows Server 2003 TCP/IP Protocols and Services Technical Reference Slide: 1 Lesson 23 Virtual Private Networks (VPNs)
SYSTEM ADMINISTRATION Chapter 13 Security Protocols.
CHAPTER 2 PCs on the Internet Suraya Alias. The TCP/IP Suite of Protocols Internet applications – client/server applications The client requested data.
OpenVPN OpenVPN: an open source, cross platform client/server, PKI based VPN.
© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod9_L8 1 Network Security 2 Module 6 – Configure Remote Access VPN.
WAN Technologies Dial-up modem connections
Chapter 13 – Network Security
VPN Protocol What is a VPN? A VPN is A network that uses Internet or other network service to transmit data. A VPN includes authentication and.
Module 8 Configuring Mobile Computing and Remote Access in Windows® 7.
1 Chapter 8 Copyright 2003 Prentice-Hall Cryptographic Systems: SSL/TLS, VPNs, and Kerberos.
VIRTUAL PRIVATE NETWORK By: Tammy Be Khoa Kieu Stephen Tran Michael Tse.
Abdullah Alshalan Garrett Drown Team 3 CSE591: Virtualization and Cloud Computing.
Chapter 23 Internet Authentication Applications Kerberos Overview Initially developed at MIT Software utility available in both the public domain and.
Hands-On Microsoft Windows Server Introduction to Remote Access Routing and Remote Access Services (RRAS) –Enable routing and remote access through.
CHAPTER 2 PCs on the Internet Suraya Alias. The TCP/IP Suite of Protocols Internet applications – client/server applications ◦The client requested data.
BZUPAGES.COM. What is a VPN VPN is an acronym for Virtual Private Network. A VPN provides an encrypted and secure connection "tunnel" path from a user's.
C3 confidentiality classificationIntegrated M2M Terminals Introduction Vodafone MachineLink 3G v1.0 1 Vodafone MachineLink 3G VPN functionality Feature.
1 Chapter Overview Password Protection Security Models Firewalls Security Protocols.
1 Security Protocols in the Internet Source: Chapter 31 Data Communications & Networking Forouzan Third Edition.
Introduction to Information Systems Lecture 06 Telecommunications and Networks Business Value of Networks Jaeki Song.
IP Security IP sec IPsec is short for Internet Protocol Security. It was originally created as a part of IPv6, but has been retrofitted into IPv4. It.
The Intranet.
Lect 8 Tahani al jehain. Types of attack Remote code execution: occurs when an attacker exploits a software and runs a program that the user does not.
Remote Access and Long-Distance Communications. Permission granted to reproduce for educational use only.© Goodheart-Willcox Co., Inc. Typical Telephone.
Securing Access to Data Using IPsec Josh Jones Cosc352.
Defining Network Infrastructure and Network Security Lesson 8.
Windows 10 Common VPN Error Tech Support Number
Virtual Private Networks
Virtual Private Network Access for Remote Networks
MTA Network Fundamental Cram Sesion
Module 9: Configuring Network Access
Virtual Private Network (VPN)
Module 3: Enabling Access to Internet Resources
The Intranet.
Virtual Private Network
Microsoft Windows NT 4.0 Authentication Protocols
Virtual Private Networks
CONNECTING TO THE INTERNET
Virtual Private Networks
Internet and Intranet.
IP Security IP sec IPsec is short for Internet Protocol Security. It was originally created as a part of IPv6, but has been retrofitted into IPv4. It works.
IbVPN: Ensures Your Online Safety and Access Blocked Websites
Virtual Private Networks
Virtual Private Networks (VPN)
Ken Gunnells, Ph.D. - Networking Paul Crigler - Programming
Internet and Intranet.
Chapter 3: Branch Connections
Intro To Computer Networks
PPPoE Internet Point to Point Protocol over Ethernet
Goals Introduce the Windows Server 2003 family of operating systems
Configuring Internet-related services
Security in the Internet: IPSec, SSL/TLS, PGP, VPN, and Firewalls
Internet and Intranet.
Cengage Learning: Computer Networking from LANs to WANs
Chapter 12: Remote Access and Virtual Private Networks
Designing IIS Security (IIS – Internet Information Service)
Virtual Private Networks (VPN)
Virtual Private Network zswu
Internet and Intranet.
Topic 12: Virtual Private Networks
Presentation transcript:

The Internet The World Wide Web and everything 10/22/2018

In The Beginning sound – vibration - sound Sound – vibration – voltage – vibration - sound 10/22/2018

World Wide Communication Voltage amplitude (signal strength) is lost over distance (100+ miles). Voltage is easily amplified after certain distances preserving content. 10/22/2018

1980 Feeds and Speeds Acoustical MODEMS typical 300-1200 baud (30-120/char/sec) 56K baud maximum dial-up 1 twisted pair $15 a month plus time and distance Digital Communication 256K baud using 2 twisted pair “dial-up” $100 a month plus time and distance baud – a unit of measure named for Emile Baudot (French) –telegraphy and PPT codes 10/22/2018

What The Internet Was Supposed To Look Like 10/22/2018

DARPANET 1971 Meathead in meters Stifle Yourself X Axis 10/22/2018

Compuserve 1983 Remember MCI (LDDS) ? 10/22/2018

The Internet Today 10/22/2018

Digital Subscriber Line (DSL) Identical methodology for copper twisted pair (balanced line) or coaxial cable (unbalanced line) Very High Frequency (VHF) carrier is impressed with data using frequency shift keying (FSK) Theoretical maximum speed of 5M baud Signal creates an EM field about the “twist”. Signal amplitude (strength) is tuned limiting distance subscriber is to the telco switch. Only subscriber data on line. More secure. Signal creates an EM field about the ground braid. Signal amplitude can be as high as tolerable crosstalk. Possible multiple channels. All subscribers‘ data downwind of ISP’s switch/router appears at all subscribers‘ MODEMs. 10/22/2018

Anonymity Personally Identifiable Data Collection Security Surveillance In 2017, the trump administration removed all privacy safeguard regulations from the Internet separate from the public domain. Your ISP is now enabled to legally surveil you and collect any information passing through their circuits and disperse that data to whomever they please. Marketing companies like AdChoice read other companies’ cookies on your computer, without consulting the “Terms and Agreements”, to determine the advertising they will deliver to you. To what level a user wishes to achieve anonymity, prevent personally identifiable data collection, secure all data, and defeat intrusive surveillance, will involve additional software, an investment of time and effort, third party services, and significantly more processor power. 10/22/2018

What Is A Proxy Server ? you are here… or here… or here … At its simplest, a proxy server makes you appear somewhere else: you are here… or here… or here … The proxy places the user beyond the reach of an ISP’s DNS surveillance. Prior to W7 the NIC could only forward network data to the default gateway or a proxy server using an IP address. W7 and forward has a built-in VPN client and the ability to manage multiple VPN connections. Adding VPN reduces the success of user data surveillance. 10/22/2018

What Is A VPN ? Virtual Private Network. A point-to-point communication method providing the maximum privacy and security possible over an otherwise public network. There is a lot going on in a VPN: Authentication of the participants. Administration of at least 3 levels of TCP/IP Utilization of security certificates Encryption/Decryption of TCP/IP headers/trailers, URL destination, origination IP, and data. Operation of the VPN involves trade-offs in: overall security communication speed consumption of processor power ability to forestall failover Often the VPN server side provides the VPN client with Internet Proxy services. 10/22/2018

A Multitude Of Tunneling Protocols IKEv2 Internet Key Exchange – developed by MS and Cisco using IPsec IPsec is a framework of methodologies concerning cryptology OpenVPN Open Source – utilizes SSL/TLS for key exchange SoftEther Open-source, cross-platform, multi-protocol developed as part of Daiyuu Nobori's master's thesis research at the University of Tsukuba. L2TP/IPsec Layer 2 Tunneling Protocol – low level. Uses IPsec for Anonymity SSTP Secure Socket Tunneling Protocol (SSTP) transports PPP traffic using SSL/TLS with key negotiation, encryption and traffic integrity checking. PPTP Point-to-Point Tunneling Protocol is an obsolete method with many known security issues. 10/22/2018

Setting Up A 3rd Party VPN I chose Hide.me VPN. It is free to try; did not require a credit card. It could be installed without downloading anything. Click register. Enter a user ID and password. Provide an email address. Click the verify button in the email. Done. 10/22/2018

Setting Up A 3rd Party VPN Windows key +r Powershell <type> Add-Vpn Connection -Name “hide.me IKEv2” -ServerAddress “sg.hide.me” -TunnelType “Ikev2” -RememberCredential Wait for the prompt to return Settings-> Network & Internet-> (left pane) VPN ->(right pane) hide.me IKEv2 click Connect 10/22/2018

Windows Key + r 10/22/2018

POWERSHELL 10/22/2018

Network & Internet 10/22/2018

Success 10/22/2018