Module A
This is a module that some teachers will cover while others will not This module is a refresher on networking concepts, which are important in information security If your teacher does not cover networking, you might want to cover it yourself, to “get the rust out” of your networking knowledge Copyright Pearson Prentice-Hall
3
4
5
6
7
8 Network Browser Packet Router Packet Router Packet Route Webserver Software Router The global Internet has thousands of networks connected by routers The global Internet has thousands of networks connected by routers
Copyright Pearson Prentice-Hall Packet travels in a different frame in each network Packet travels in a different frame in each network
Copyright Pearson Prentice-Hall
Copyright Pearson Prentice-Hall Super LayerDescription ApplicationCommunication between application programs on different hosts attached to different networks on an internet. InternetworkingTransmission of packets across an internet. Packets contain application layer messages. NetworkTransmission of frames across a network. Frames contain packets.
Copyright Pearson Prentice-Hall Super LayerTCP/IPOSIHybrid TCP/IP-OSI Application Presentation Session InternetTransport InternetNetworkInternet Single NetworkSubnet AccessData Link Physical
Copyright Pearson Prentice-Hall Switched Network 1 Data Link Physical LinkFrame In a single network, a physical link connects adjacent devices. A data link is the path that a frame takes across a single network. One data link; three physical links.
Copyright Pearson Prentice-Hall
Copyright Pearson Prentice-Hall Total Length (16 bits) Identification (16 bits) Header Checksum (16 bits) Time to Live (8 bits) Flags Protocol (8 bits) 1=ICMP, 6=TCP, 17=TCP Bit 0Bit 31 IP Version 4 Packet Source IP Address (32 bits) Fragment Offset (13 bits) Diff-Serv (8 bits) Header Length (4 bits) Version (4 bits) Destination IP Address (32 bits) Options (if any)Padding Data Field 0100
Copyright Pearson Prentice-Hall
Copyright Pearson Prentice-Hall
Copyright Pearson Prentice-Hall Source Port Number (16 bits)Destination Port Number (16 bits) Acknowledgment Number (32 bits) Sequence Number (32 bits) TCP Checksum (16 bits) Window Size (16 bits) Flag Fields (6 bits) Reserved (6 bits) Header Length (4 bits) Urgent Pointer (16 bits)
Copyright Pearson Prentice-Hall PC Transport Process Webserver Transport Process 1. SYN (Open) 2. SYN, ACK (1) (Acknowledgement of 1) 3. ACK (2) Open (3) 3-Way Open
Copyright Pearson Prentice-Hall PC Transport Process Webserver Transport Process 1. SYN (Open) 2. SYN, ACK (1) (Acknowledgement of 1) 3. ACK (2) 4. Data = HTTP Request 5. ACK (4) 6. Data = HTTP Response 7. ACK (6) Open (3) Carry HTTP Req & Resp (4)
Copyright Pearson Prentice-Hall PC Transport Process Webserver Transport Process 8. Data = HTTP Request (Error) Carry HTTP Req & Resp (4) 9. Data = HTTP Request (No ACK so Retransmit) 10. ACK (9) 11. Data = HTTP Response 12. ACK (11) Error Handling
Copyright Pearson Prentice-Hall PC Transport Process Webserver Transport Process Close (4) 13. FIN (Close) 14. ACK (13) 15. FIN 16. ACK (15) Note: An ACK may be combined with the next message if the next message is sent quickly enough Normal Four-Way Close
Copyright Pearson Prentice-Hall PC Transport Process Webserver Transport Process Close (1) RST Abrupt Close Either side can send A Reset (RST) Segment At Any Time Ends the Session Immediately
Copyright Pearson Prentice-Hall
Copyright Pearson Prentice-Hall
Copyright Pearson Prentice-Hall
Copyright Pearson Prentice-Hall Source Port Number (16 bits)Destination Port Number (16 bits) UDP Length (16 bits)UDP Checksum (16 bits) Data Field
Copyright Pearson Prentice-Hall
Copyright Pearson Prentice-Hall
Copyright Pearson Prentice-Hall
Copyright Pearson Prentice-Hall
Application Exploits ◦ By taking over applications, hackers gain the permissions of the exploited program ◦ A multitude of application standards ◦ Consequently, there is a multitude of security issues at the application level Copyright Pearson Prentice-Hall
Many Applications Need Two Types of Standards ◦ One for the transmission of messages, one for the content of application documents ◦ For the World Wide Web, these are HTTP and HTML, respectively ◦ For transmission, uses SMTP, POP, and IMAP ◦ For message content, uses RFC 2822 (all- text), HTML, and MIME Copyright Pearson Prentice-Hall
FTP and Telnet ◦ Have no security ◦ Passwords are transmitted in the clear so can be captured by sniffers ◦ Secure Shell (SSH) can replace both securely Copyright Pearson Prentice-Hall
Many Other Application Standards Have Security Issues ◦ Voice over IP ◦ Service-oriented architecture (SOA); web services ◦ Peer-to-peer applications Copyright Pearson Prentice-Hall
Copyright Pearson Prentice-Hall