Uploaded by Nabila Baharom

Assignment Networking DBI40033

advertisement
KOLEJ KEMAHIRAN TINGGI MARA LEDANG
DIPLOMA IN BIOMEDICAL ELECTRONICS ENGINEERING
SESSION JANUARY – JUNE 2024
DBI40033
COMPUTER NETWORKING
ASSIGNMENT
1. NURUL HANIISAH BINTI AHMAD ( DB22226 )
NAME &
MARIX NO.
2. KHAIRUNABILA BINTI BAHAROM ( DB12219 )
PROGRAM
DKB
CLASS
C4A
DATE
LECTURER AHMAD NOOR ARIFF BIN ZAINAL ABIDIN
MARKS
PREPARED BY
CHECKED BY
ASSIGNMENT
SENARIO 1:
Using web search engines like Google, research the non-profit organizations that are
responsible for establishing international standards for the internet and the
development of internet technologies.
Task:
You can find answers to the questions below by searching the following organizational
acronyms and terms: ISO, ITU, ICANN, IANA, IEEE, EIA, TIA, ISOC, IAB, IETF, W3C,
RFC, and Wi-Fi Alliance.
1. Which two related organizations are responsible for managing the top-level domain
name space and the root Domain Name System (DNS) name servers on the
internet?
2. What organization is responsible for publishing Request for Comments (RFC)?
3. What do RFC 349 and RFC 1700 have in common?
4. What RFC number is ARPAWOCKY? What is it?
5. Who founded the World Wide Web Consortium (W3C)?
6. Name 10 World Wide Web (WWW) standards that the W3C develops and
maintains?
7. What is the IEEE standard for the Wi-Fi Protected Access 2 (WPA2) security
protocol?
8. Is the Wi-Fi Alliance a non-profit standards organization? What is their goal?
9. What is the International Telecommunication Union (ITU) and where is it
headquartered?
10. Name the three ITU sectors.
11. What does the RS in RS-232 stand for and which organization introduced it?
12. What is SpaceWire?
13. What is the mission of the ISOC and where are its headquarters located?
14. What organizations does the IAB oversee?
2
ASSIGNMENT
SENARIO 2:
To defend a network against attacks, an administrator must identify external threats
that pose a danger to the network. Security websites can be used to identify emerging
threats and provide mitigation options for defending a network.
One of the most popular and trusted sites for defending against computer and network
security threats is SysAdmin, Audit, Network, Security (SANS). The SANS site
provides multiple resources, including a list of the top 20 Critical Security Controls for
Effective Cyber Defense and the weekly @Risk: The Consensus Security Alert
newsletter. This newsletter details new network attacks and vulnerabilities.
You will navigate to and explore the SANS site, use the SANS site to identify recent
network security threats, research other websites that identify threats, and research
and present the details about a specific network attack.
Task:
1. Search the internet for SANS. From the SANS home page, click on FREE
Resources. List three available resources.
2. From the Newsletters page, select Archive for the @RISK: The Consensus Security
Alert. Scroll down to Archives Volumes and select a recent weekly newsletter.
Review the Notable Recent Security Issues and Most Popular Malware Files
sections. List two (2) recent vulnerabilities. Browse multiple recent newsletters.
3. Besides the SANS site, identify some other websites that provide recent security
threat information. List two (2) of the recent security threats detailed on these
websites.
4. Research a specific network attack that has occurred and create a presentation
based on your findings. Complete the form below based on your findings.
3
ASSIGNMENT
SENARIO 1 ANSWERS :
1. The Internet Corporation for Assigned Name and Numbers ( ICANN ) and Internet Assigned
Number Authority ( IANA ) are two organizations responsible for managing the top-level
domain name space and the root Domain Name System (DNS ) name server on the Internet
2. The Internet Task Force ( IETF ) is responsible for publishing Request for Comments (RFC).
3. RFC 349 and RFC 1700 are both offer application port, protocol, socket and link.
4. RFC number for ARPAWOCKY is RFC 527 a parody of Lewis Carroll’s nonsense poem ‘’
Jabberwocky ‘’.
5. The World Wide Web Consortium (W3C) was founded by Tim Berners-Lee at Massachusetts
Institute of Technology in October 1994.
6. 1) HTML ( Hypertext Markup Language )
2) RDF ( Resource Description Framework )
3) HTTP ( Hypertext Transfer Protocol )
4) CSS ( Cascading Style Sheets )
5) SVG ( Scalable Vector Graphics )
6) XML ( Extensible Markup Language )
7) WebRTC ( Web Real – Time Communication )
8) WebAuthn ( Web Authentication )
9) WebIDL ( Web Interface Definition Language )
10) Web Audio API
7. The IEEE standard for the Wi-Fi Protected Access 2 ( WPA2 ) security protocol is IEEE
802.11i which is 802.11 standard specifying security mechanisms for wireless networks.
8. The Wi-Fi Alliance is a non-profit organization that owns the Wi-Fi trademark. Manufacturers
may use the trademark to brand products certified for Wi-Fi interoperability. Tizatihe goal of
Wi-Fi Alliance is
4
ASSIGNMENT
-
Fostering highly effective global collaboration among member companies
-
Delivering excellent connectivity experiences through interoperability
-
Embracing technology and driving innovation
-
Promoting the adoption of our technologies worldwide
-
Advocating for fair worldwide spectrum rules
-
Leading, developing, and embracing industry-agreed standard
9. The International Telecommunication Union is the United Nations specialized agency for
information and communication technologies. It is committed to connecting all the world's people –
wherever they live and whatever their mean. ITU, headquartered in Geneva, Switzerland.
10. ITU has three main areas of activity organized in three Sectors :
-
The Radiocommunication Sector (ITU-R)
-
The Telecommunication Standardization Sector (ITU-T)
-
The Telecommunication Development Sector (ITU-D)
11. RS 232 ( the ‘’RS’’ stands for ‘’ recommended standard ) was introduced in 1962 by the EIA’s
Radio Sector as a standard for serial communication between data terminal equipment ( such
as a computer terminal ) and data communication equipment ( later redefined as data circuitterminating equipment ) , typically a modem.
12. SpaceWire is a spacecraft communication network based in part on the IEEE Space Agency
standard of communications.
13. Mission is "to promote the open development, evolution, and use of the Internet for the benefit
of all people throughout the world". It has offices in Reston, Virgina, U.S.
14. The IAB supervises the Internet Engineering Task Force (IETF), which oversees the evolution
of TCP/IP, and the Internet Research Task Force (IRTF), which works on network technology.
5
ASSIGNMENT
SENARIO 2 ANWSER :
1. A ) Webcasts
B ) Free Cybersecurity Events
C ) Focus Areas
2. A ) Analyzed in depth by various sources
B ) Exploits
6
ASSIGNMENT
3. A ) Recent ‘MFA Bombing’ Attacks Targeting Apple Users
B ) A Deep Dive on the Recent Widespread DNS Hijacking Attacks
7
ASSIGNMENT
Complete the following form for the selected network attack.
Name of attack:
Recent ‘MFA Bombing’ Attacks
Targeting Apple Users
Type of attack:
Phishing attacks
Dates of attacks:
March 2023
Apple
Computers / Organizations affected:
How it works and what it did:
Appears to be a bug in Apple’s password reset feature. In this scenario, a
target’s Apple devices are forced to display dozens of system-level prompts
that prevent the devices from being used until the recipient responds “Allow”
or “Don’t Allow” to each prompt. Assuming the user manages not to fatfinger the wrong button on the umpteenth password reset request, the
scammers will then call the victim while spoofing Apple support in the caller
ID, saying the user’s account is under attack and that Apple support needs
to “verify” a one-time code.
The phishers abuse a feature or weakness of a multi-factor authentication
(MFA) system in a way that inundates the target’s device(s) with alerts to
approve a password change or login.
All devices started blowing up, watch, laptop and phone.It was like this
system notification from Apple to approve a reset of the account password
but couldn’t do anything else with phone. Had to go through and decline like
100-plus notifications.
Some people confronted with such a deluge may eventually click Allow to
the incessant password reset prompts, just so they can use their phone
again. Others may inadvertently approve one of these prompts, which will
also appear on a user’s Apple watch if they have one.
But the attackers in this campaign had an ace up their sleeves. After
denying all of the password reset prompts from Apple, they received a call
on their iPhone that said it was from Apple Support (the number displayed
was 1-800-275-2273, Apple’s real customer support line).
Mitigation options:
One caveat with the VOIP number idea: Unless include a real mobile
number, Apple’s iMessage and Facetime applications will be disabled for
that device. Apple’s password reset system will accept and respect email
aliases. Adding a “+” character after the username portion of your email
address — followed by a notation specific to the site you’re signing up
References and info links:
Krebs, B. (2024, March). Recent MFA Bombing Attacks Targeting Apple
Users. Krebs on Security. https://krebsonsecurity.com/2024/03/recent-mfabombing-attacks-targeting-apple-users/
8
ASSIGNMENT
9
Download