Download presentation
Presentation is loading. Please wait.
1
Introduction to Networking Security
GenCyber 2019
2
Purpose of Computer Networks Resource Availability
Networking Basics Purpose of Computer Networks Provide access to shared resources, like printers, applications, and services Resource Availability Physical and virtual infrastructure strives to provide 24x7 access to networked resources
3
Physical and Virtual Infrastructure TCP/IP Stack
Application How a pair of applications interact Examples: HTTP, FTP, SMTP Transport Communication between applications on separate computers Specs: Maximum data rates, congestion control Internet Fundamental basis of the Internet – multiple interconnected networks Network Interface Communication between hardware and software protocols Specs: network addresses, packet sizes Physical Underlying transmission media and hardware Examples: Wiring, radio, satellite
4
Only as strong as the weakest link…
APPLICATION TRANSPORT Without strong security at each TCP/IP layer, the entire system is vulnerable INTERNET NETWORK INTERFACE Understanding each step of data communications is crucial for networking security PHYSICAL
5
What’s the worst that could happen?
What was breached? Sensitive personal information for 145 million Americans What caused it? Web application vulnerability (which they knew about two months before the breach) What was breached? Account details for more than 3 billion users What caused it? Phishing link clicked resulting in installation of database backdoor What was breached? Travel and other details for 500 million customers What caused it? Still unknown – though it has been uncovered hackers had long-term access
6
How a pair of applications interact
Application Layer APPLICATION TRANSPORT INTERNET How a pair of applications interact Common Security Issues Protocol configuration Security policies Firewall implementation NETWORK INTERFACE Examples HTTP FTP SMTP PHYSICAL Attack Prevention User education Policy enforcement
7
Communication between applications on separate computers
Transport Layer APPLICATION TRANSPORT INTERNET Communication between applications on separate computers Common Security Issues Encryption methods Replay attacks NETWORK INTERFACE Examples TCP UDP SSL SSH PHYSICAL Attack Prevention Authentication Data integrity assurance SSL/TLS
8
Fundamental basis for the Internet – interconnected networks
Internet Layer APPLICATION TRANSPORT INTERNET Fundamental basis for the Internet – interconnected networks Common Security Issues Router configuration IP spoofing NETWORK INTERFACE Examples Routers PHYSICAL Attack Prevention VPNs Secure passwords Firewalls
9
Understanding HTTP Packets
Download the HTTP Packets Lab from Follow the instructions, and complete the questions on the last page
10
Network Interface Layer
APPLICATION TRANSPORT INTERNET Communication between hardware and software protocols Common Security Issues Wireless security protocol (e.g., WEP) NETWORK INTERFACE Examples Switches WPA2 PHYSICAL Attack Prevention VLANs
11
Underlying transmission media and hardware
Physical Layer APPLICATION TRANSPORT INTERNET Underlying transmission media and hardware Common Security Issues Internal threats Eavesdropping NETWORK INTERFACE Examples Ethernet Fiber cabling PHYSICAL Attack Prevention Physical access control
12
Know Your Attack Take an Attack Card from the whiteboard in the back of the room. Research and prepare brief answers to the following questions. Describe how this attack occurs from a technology perspective. Identify the layer(s) of the TCP/IP stack affected. What security flaws enable this attack to happen? What should people know to protect themselves from this attack? Man In The Middle
13
Questions?
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.