Lecture 21: Internet Security Intro to IT COSC1078 Introduction to Information Technology Lecture 21 Internet Security James Harland

Slides:



Advertisements
Similar presentations
Lecture 20: Internet Intro to IT COSC1078 Introduction to Information Technology Lecture 20 Internet James Harland
Advertisements

CST Computer Networks NAT CST 415 4/10/2017 CST Computer Networks.
James Harland COSC1078 Introduction to Information Technology Lecture 12 System Fundamentals James Harland
CCNA – Network Fundamentals
Chapter 7: Transport Layer
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 7: Transport Layer Introduction to Networking.
Lecture 7 Transport Layer
(4.4) Internet Protocols Layered approach to Internet Software 1.
Data and Computer Communications Eighth Edition by William Stallings Lecture slides by Lawrie Brown Chapter 2 – Protocol Architecture, TCP/IP, and Internet-Based.
Lecture 19: Internet Intro to IT COSC1078 Introduction to Information Technology Lecture 19 Internet James Harland
Lecture 1: IntroductionIntro to IT COSC1078 Introduction to Information Technology Lecture 2 Overview James Harland
TCP/IP: the transport layer Skills: none IT concepts: layered protocols, transport layer functions, TCP and UDP protocols, isochronous applications This.
Lecture 23: Future of IT Intro to IT COSC1078 Introduction to Information Technology Lecture 23 Future of IT James Harland
Lecture 10: System Fundamentals Intro to IT COSC1078 Introduction to Information Technology Lecture 10 System Fundamentals James Harland
Lecture 14: Review Intro to IT COSC1078 Introduction to Information Technology Lecture 14 Revision and Review James Harland
Lecture 6: Audio Intro to IT COSC1078 Introduction to Information Technology Lecture 6 Audio James Harland
Lecture 22: Internet Security Intro to IT COSC1078 Introduction to Information Technology Lecture 22 Internet Security James Harland
Lecture 1: IntroductionIntro to IT COSC1078 Introduction to Information Technology Lecture 1 Introduction James Harland
Introduction to Management Information Systems Chapter 5 Data Communications and Internet Technology HTM 304 Fall 07.
Lecture 4: ImagesIntro to IT COSC1078 Introduction to Information Technology Lecture 4 Images James Harland
Lecture 3: ImagesIntro to IT COSC1078 Introduction to Information Technology Lecture 3 Images James Harland
Computer Networks Transport Layer. Topics F Introduction  F Connection Issues F TCP.
Lecture 5: Audio Intro to IT COSC1078 Introduction to Information Technology Lecture 5 Audio James Harland
Lecture 24: Review Intro to IT COSC1078 Introduction to Information Technology Lecture 24 Review James Harland
Lecture 4: ImagesIntro to IT COSC1078 Introduction to Information Technology Lecture 4 Images James Harland
1 Review of Important Networking Concepts Introductory material. This slide uses the example from the previous module to review important networking concepts:
CS 356 Systems Security Spring Dr. Indrajit Ray
Lecture 22: Internet Security Intro to IT COSC1078 Introduction to Information Technology Lecture 22 Internet Security James Harland
G64INC Introduction to Network Communications Ho Sooi Hock Internet Protocol.
Lecture 21: Internet Security Intro to IT COSC1078 Introduction to Information Technology Lecture 21 Internet Security James Harland
Lecture 24: Future of IT Intro to IT COSC1078 Introduction to Information Technology Lecture 24 Future of IT James Harland
4: Network Layer4a-1 IP addresses: how to get one? Hosts (host portion): r hard-coded by system admin in a file r DHCP: Dynamic Host Configuration Protocol:
Computer Networks.  The OSI model is a framework containing seven layers that defines the protocols and devices used at each stage of the process when.
Characteristics of Communication Systems
Lecture 11: Machine Processing Intro to IT COSC1078 Introduction to Information Technology Lecture 11 Machine Processing James Harland
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 7: Transport Layer Introduction to Networking.
Lecture 4: ImagesIntro to IT COSC1078 Introduction to Information Technology Lecture 4 Images James Harland
Huda AL_Omairl - Network 71 Protocols and Network Software.
Computer Networks (CS 132/EECS148) General Networking Example Karim El Defrawy Donald Bren School of Information and Computer Science University of California.
Lecture#1 on Internet. Internet Addressing IP address: pattern of 32 or 128 bits often represented in dotted decimal notation IP address: pattern of 32.
Fundamentals of Computer Networks ECE 478/578 Lecture #19: Transport Layer Instructor: Loukas Lazos Dept of Electrical and Computer Engineering University.
Lecture 18: Operating Systems Intro to IT COSC1078 Introduction to Information Technology Lecture 18 Operating Systems James Harland
Copyright © 2012 Pearson Education, Inc. Publishing as Pearson Addison-Wesley Chapter 4: Networking and the Internet Computer Science: An Overview Eleventh.
1 Network Layer Lecture 15 Imran Ahmed University of Management & Technology.
Lecture 1: IntroductionIntro to IT COSC1078 Introduction to Information Technology Lecture 1 Introduction James Harland
Revision Lecture Intro to IT COSC1078 Introduction to Information Technology Extra Lecture Review James Harland
Lecture 23: Future of IT Intro to IT COSC1078 Introduction to Information Technology Lecture 23 Future of IT James Harland
Lecture 11: System Fundamentals Intro to IT COSC1078 Introduction to Information Technology Lecture 11 System Fundamentals James Harland
Presented by Rebecca Meinhold But How Does the Internet Work?
1 OSI and TCP/IP Models. 2 TCP/IP Encapsulation (Packet) (Frame)
Network and the internet Part eight Introduction to computer, 2nd semester, 2009/2010 Mr.Nael Aburas Faculty of Information.
CS470 Computer Networking Protocols
Network Layer (OSI and TCP/IP) Lecture 9, May 2, 2003 Data Communications and Networks Mr. Greg Vogl Uganda Martyrs University.
IT 210: Web-based IT Fall 2012 Lecture: Network Basics, OSI, & Internet Architecture.
NETWORKING (2) Dr. Andy Wu BCIS 4630 Fundamentals of IT Security.
UDP: User Datagram Protocol Brian Jorgage CSC /24/2004.
Data Communications and Networks Chapter 6 – IP, UDP and TCP ICT-BVF8.1- Data Communications and Network Trainer: Dr. Abbes Sebihi.
- 1 - DPNM Review of Important Networking Concepts J. Won-Ki Hong Dept. of Computer Science and Engineering POSTECH Tel:
TCP/IP PROTOCOL UNIT 6. Overview of TCP/IP Application FTP, Telnet, SMTP, HTTP.. Presentation Session TransportHost-to-HostTCP, UDP NetworkInternetIP,
The Transport Layer Implementation Services Functions Protocols
Chapter 9: Transport Layer
Instructor Materials Chapter 9: Transport Layer
Chapter 5 Network and Transport Layers
Magda El Zarki Professor, ICS UC, Irvine
Subject Name: Computer Communication Networks Subject Code: 10EC71
1 TRANSMISSION CONTROL PROTOCOL / INTERNET PROTOCOL (TCP/IP) K. PALANIVEL Systems Analyst, Computer Centre Pondicherry University, Puducherry –
CS4470 Computer Networking Protocols
Process-to-Process Delivery: UDP, TCP
CS 381: Introduction to Computer Networks
Network Basics and Architectures Neil Tang 09/05/2008
Presentation transcript:

Lecture 21: Internet Security Intro to IT COSC1078 Introduction to Information Technology Lecture 21 Internet Security James Harland

Lecture 21: Internet SecurityIntro to IT Introduction to IT 1-4 Introduction, Images, Audio, Video 5-6 Computer Fundamentals Assignment 1, WebLearn Test 1 7 Review 8 Operating Systems WebLearn Test 2 9 Operating Systems Assignment 2 10 Internet 11 Internet & Security WebLearn Test 3 12 Future of ITAssignment 3, Peer and Self Assessment

Lecture 21: Internet SecurityIntro to IT Intro to IT Schedule WeekLecture 1Lecture 2 11Internet ProtocolsInternet Security 12Future of IT Review by request or more Future of IT 13Mock Exam Wednesday 2 nd June

Lecture 21: Internet SecurityIntro to IT Overview  Questions?  Mock Exam  Assignment 3  Internet Security  Questions?

Lecture 21: Internet SecurityIntro to IT Mock Exam  (TBC) on Wednesday 2 rd June in  Bring your own paper, pens, etc.  No calculators allowed  Answers will be available from me when you leave Schedule (times to be confirmed):  Access to room  Reading time commences  Writing time commences  Exam concludes

Lecture 21: Internet SecurityIntro to IT Assignment 3 Review (re-) answer What is IT? questions from Tutorial 1 Identify difficult parts of the course Suggest new questions Include favourites from Assignments 1 and 2 Reflect Answer reflection questions from tutorials Research Write about a particular IT topic of your choice (5-6 paragraphs)

Lecture 19: Internet: ImagesIntro to IT Internet Lisa? Hi Dad! Listen! Lisa? Hi Dad! Listen!

Lecture 21: Internet SecurityIntro to IT Internet Structure Application Transport Network Link Network Link Mordor sucks! 2 dor1 Mor 3 suc4 ks! dor1 Mor 3 suc4 ks! Mordor sucks!

Lecture 21: Internet SecurityIntro to IT Internet Structure 1 Mor 1 6 6

Lecture 21: Internet SecurityIntro to IT Network Layer (Internet Protocol)  Real intelligence is in the network layer  Adds next destination to packet  Not complete list of addresses  Sends to next destination  Retrieves final destination packets for this node  Passes them to the transport layer  Routing tables can be updated when disconnections occur  Hop counts used to stop endless looping

Lecture 21: Internet SecurityIntro to IT Transport layer  Transmission Control Protocol (TCP) often used  User Datagram Protocol (UDP) becoming more common  TCP Establishes connection first Send and wait for acknowledgement Reliable Can adjust flow control to avoid congestion Often best for (which is not real-time) Older

Lecture 21: Internet SecurityIntro to IT Transport layer  UDP Doesn’t establish connection Just sends and forget Efficient No congestion adjustment Works well for DNS lookup Often used for Voice over Internet Protocol (VoIP) applications such as Skype

Lecture 21: Internet SecurityIntro to IT Internet addresses  Unique 32-bit identifier (up to 4,294,967,296)  Soon to become 128-bit identifier  Managed by Internet Corporation for Assigned Names and Numbers (ICANN)  ISPs get “blocks” of addresses  32-bit string represented as N 1.N 2.N 3.N 4 where N i is in the range  means

Lecture 21: Internet SecurityIntro to IT Internet addresses  Dotted decimal notation is still not very kind to humans …  -> ??.??.??.??  Translation done by name servers which look up the Domain Name System (DNS)  Domains such as rmit.edu.au can be structured by the domain owner (eg goanna.cs.rmit.edu.au)

Lecture 21: Internet SecurityIntro to IT Internet Security password patch spam fire wall virus war driving key logger proxy wormphishing Trojan horse

Security vs access  It is always a trade-off (a balance between two competing forces)  More security means less access  More access means less security  Redundancy can be either fatal or vital  Nothing is perfect!

Freedom vs security  `Everything which is not forbidden is allowed’ -- Principle of English Law  `Everything which is not allowed is forbidden’ -- Common security principle  `Anything not mandatory is forbidden’ -- “military policy”  `Anything not forbidden is compulsory’ (??) — T.H. White (The Once and Future King)

Lecture 21: Internet SecurityIntro to IT Conclusion  Work on Assignment 3  Check whether your security defenses are up to date