Technology In Action Networking and Security Connecting Computers and Protecting Them from Intruders © 2006 Prentice-Hall, Inc. 1 Technology In Action Networking Advantages and Disadvantages • Advantages – – – – Increased productivity More communication options Enable the sharing of resources Facilitate Internet connectivity • Disadvantages – Complexity – Cost Materials Personnel © 2006 Prentice-Hall, Inc. 2 Technology In Action What is a Network? • Computer network: – Two or more computers connected together – Nodes: Any device connected to a network © 2006 Prentice-Hall, Inc. 3 Technology In Action Network Architecture • Network designs: – Locally controlled: Peer-to-peer (P2P) – Centrally controlled: Client/server Peer-to-peer Client/ server © 2006 Prentice-Hall, Inc. 4 Technology In Action Peer-to-Peer Networks • Nodes communicate with each other: – Peers • Share peripheral devices: – Printers • Home and small office networks © 2006 Prentice-Hall, Inc. 5 Technology In Action Client/Server Networks • Client computers: – Users • Server computers: – Provide resources to clients – Central control unit • Data flows efficiently • Servers respond to requests from clients • Scalable network © 2006 Prentice-Hall, Inc. 6 Technology In Action Servers • Depending on the network size and work load servers can perform a single or multiple roles © 2006 Prentice-Hall, Inc. 7 Technology In Action Dedicated Server Types • • • • • • • © 2006 Prentice-Hall, Inc. Application Authentication File Database Email Web Print 8 Technology In Action Classifications of Client/Server Networks • LAN: local area network – Computers linked together over a small geographic region • WAN: wide area network – Computers linked together over large diverse geographic locations • MAN: metropolitan area network – Computers linked together within a city or county • PAN: personal area network – Wireless devices connected in close proximity to each other © 2006 Prentice-Hall, Inc. 9 Technology In Action Network Topology • Physical layout of networks components – Bus – Ring – Star © 2006 Prentice-Hall, Inc. 10 Technology In Action Bus Topology • All nodes are connected in sequence on a single cable • Used most often on peer-to-peer networks • Networked computers communicate with each other • One computer transmits data at a time: – Access methods avoid data collisions – Data is transmitted in “packets” © 2006 Prentice-Hall, Inc. 11 Technology In Action Ring Topology • Nodes are laid out in a ring • Token (data packet) flows in one direction from device to device © 2006 Prentice-Hall, Inc. 12 Technology In Action Star Topology • Nodes connect to a central communications device (hub/switch) • A node sends a signal to the hub which retransmits it to the other nodes • A node accepts the signal addressed to it © 2006 Prentice-Hall, Inc. 13 Technology In Action Network Operating Systems (NOS) • Provide the protocol that controls the communication between devices on the network • Major network operating systems: – Windows Server 2003 – UNIX – Novell NetWare © 2006 Prentice-Hall, Inc. 14 Technology In Action Network Adapters • Devices connected to or installed in nodes: – Network interface cards (NIC) – External network adapter • Enable communication between nodes NIC © 2006 Prentice-Hall, Inc. External adapter 15 Technology In Action Wireless Adapters • Uses radio waves to connect nodes (2.4GHz) • Each node requires a wireless network adapter © 2006 Prentice-Hall, Inc. 16 Technology In Action Transmission Media • Provides communications channel between nodes • Forms of media: – Telephone wire: Twisted pair – Coaxial cable – Fiber-optic cable – Radio waves: Wireless • Bandwidth: – Data transfer rate – Throughput – Measured in megabits per second (Mbps) © 2006 Prentice-Hall, Inc. 17 Technology In Action Choosing a Cable • • • • • • • Maximum run length Bandwidth Bend radius Cable cost Installation costs Susceptibility to interference Signal transmission methods © 2006 Prentice-Hall, Inc. 18 Technology In Action Twisted Pair Cable • Copper wire twisted around each other to reduce interference • STP- Shielded • UTP- Unshielded – Cat 5 – Cat 6 © 2006 Prentice-Hall, Inc. 19 Technology In Action Coaxial Cable • Four components: – – – – Copper core Nonconductive insulating material Braided metal Plastic cover © 2006 Prentice-Hall, Inc. 20 Technology In Action Fiber-Optic Cable • Components include: – Glass or plastic fibers – Cladding – Outer jacket • Uses light impulses to transmit data • Immune to interference © 2006 Prentice-Hall, Inc. 21 Technology In Action Network Navigation Devices • Devices that help make data flow possible – Repeaters – Hubs – Switches – Routers © 2006 Prentice-Hall, Inc. 22 Technology In Action Ethernet Repeater and Hubs • Repeaters – Amplifies the signal • Hubs – Amplifies the signal – Simultaneous broadcasting – Acts like a cable splitter © 2006 Prentice-Hall, Inc. 23 Technology In Action Ethernet Switches and Routers • Switches – Send data to specific nodes on the network • Routers – Communicates data between different networks © 2006 Prentice-Hall, Inc. 24 Technology In Action Data Transmission and Protocols • Computer protocols are rules for electronic information exchange • Open system protocols: – Any computer can communicate with other computers using the same protocols • Circuit switching • Packet switching © 2006 Prentice-Hall, Inc. 25 Technology In Action Circuit Switching • Dedicated connection between two points • Remains active until the transmission is terminated • Telephone communications © 2006 Prentice-Hall, Inc. 26 Technology In Action Packet Switching • Data is broken into small units called packets • Packets are sent over various routes to their destination • Packets are reassembled by the receiving computer • Packets contain: – Destination/source addresses – Reassembling instructions – Data © 2006 Prentice-Hall, Inc. 27 Technology In Action Ports • Source Ports - is assigned to the client and is used to keep track of user sessions. • Destination Ports - are used to route packets to the appropriate application. • Listening Ports - software that responds to a port number is said to be "listening" for its packets. • 65,535 ports • Well known ports are 0-1023. – Port 80 HTTP © 2006 Prentice-Hall, Inc. 28 Technology In Action Headers • Encapsulation- layering of instructions onto the data • Headers are like mailing addresses and handling instructions • Contains information for the handling of the data block © 2006 Prentice-Hall, Inc. 29 Technology In Action TCP, IP, UDP • TCP- Transmission Control Protocol – Reliable Will resend lost packets Error checking – Send in an orderly fashion • UDP - User Datagram Protocol – Faster – Less reliable – Streaming • Internet Protocol - specifies the format of packets © 2006 Prentice-Hall, Inc. 30 Technology In Action MAC Address • Media Access Control address: hardware address that uniquely identifies each node of a network. • Example: 07-a1-34-ff-b5-df © 2006 Prentice-Hall, Inc. 31 Technology In Action IP Addresses • Unique number that identifies NOS/devices connected to the Internet • Example: 134.68.76.100 • Static address: – Address never changes: Enter it manually • Dynamic address: – Temporary address: Automatically assigned © 2006 Prentice-Hall, Inc. 32 Technology In Action Anatomy of a Data Packet © 2006 Prentice-Hall, Inc. 33 Technology In Action OSI (Open Systems Interconnection) Model © 2006 Prentice-Hall, Inc. 34 Technology In Action © 2006 Prentice-Hall, Inc. 35 Technology In Action Questions? © 2006 Prentice-Hall, Inc. 36 Technology In Action Network Security • Why attack a network rather than the computers on the network? – Lower risk of getting caught – Less work – Availability of tools – Numerous methods © 2006 Prentice-Hall, Inc. 37 Technology In Action Networking Attack Methods • • • • Sniffing Spoofing DoS – Denial of Service Port Scanning © 2006 Prentice-Hall, Inc. 38 Technology In Action Ethereal- Packet Sniffer © 2006 Prentice-Hall, Inc. 39 Technology In Action Netstumbler - Wireless Network Scanner © 2006 Prentice-Hall, Inc. 40 Technology In Action NetScan- Port Scanner © 2006 Prentice-Hall, Inc. 41 Technology In Action Wireless Security or Lack Thereof • Lack of user awareness • No authentication • Pervasiveness • Tools are easily available • Poor security design – Weak encryption – Enabled defaults Admin PW Broncast on SSID © 2006 Prentice-Hall, Inc. 42 Technology In Action 150ft = 6 Houses, 1 street © 2006 Prentice-Hall, Inc. 43 Technology In Action 450ft = 40 houses, 4 streets © 2006 Prentice-Hall, Inc. 44 Technology In Action WWWD 2004 Stats • 228537 APs found • 140890 No WEP (60+%) – Wired Equivalent Privacy • 71850 Default SSID (30+%) – Service Set IDentifier • 62859 Default SSID and No WEP (27+%) © 2006 Prentice-Hall, Inc. 45 Technology In Action Wireless Math Open wireless + Netstumbler = War Driving + GPS + Internet = http://www.wifimaps.com/ © 2006 Prentice-Hall, Inc. 46 Technology In Action Wireless Security Best Practices • Change default settings – Admin password – SSID – Service Set identifier Rename Choose wisely • Turn on WEP encryption • Disable SSID Broadcast • Create a VPN and use encryption © 2006 Prentice-Hall, Inc. 47 Technology In Action Wireless Security Paradoxs and Myths • • • • • MAC filtering Disable SSID Broadcast Disable DHCP Antenna placement WEP Enabled © 2006 Prentice-Hall, Inc. 48 Technology In Action Network Security • Firewalls: Block unused ports – Protects against port scanning • Authentication: – User ID and password used to access the network • Access privileges: – Close access to unused network systems – Use encryption and VPNs • Monitor your network – Fake APs – Watch traffic – Scan detectors © 2006 Prentice-Hall, Inc. 49 Technology In Action Links http://netstats.indiana.edu/wanmap/index.h tml http://reviews.cnet.com/Bandwidth_meter/ 7004-7254_7-0.html © 2006 Prentice-Hall, Inc. 50