SlideShare a Scribd company logo
CONFIGURING TCP/IP ADDRESSING AND SECURITY Chapter 11
OVERVIEW Understand IP addressing Manage IP subnetting and subnet masks Understand IP security terminology Manage Internet security features of Windows XP Configure and troubleshoot Windows Firewall Chapter 11: CONFIGURING TCP/IP ADDRESSING AND SECURITY
Overview - 2 This chapter addresses advanced TCP/IP addressing and Internet security. It introduces students to  classless interdomain routing  (CIDR) subnetting and subnet masks, and it explores the binary nature of IP addresses and the knowledge necessary to troubleshoot addressing issues. We will also introduce Windows XP Internet security features such as Windows Firewall. Proper configuration and operation of Windows Firewall can protect systems inexpensively.  Chapter 11: CONFIGURING TCP/IP ADDRESSING AND SECURITY
UNDERSTANDING BINARY NUMBERS Chapter 11: CONFIGURING TCP/IP ADDRESSING AND SECURITY
CONVERTING DECIMAL ADDRESSES TO BINARY Chapter 11: CONFIGURING TCP/IP ADDRESSING AND SECURITY
CONVERTING BINARY ADDRESSES TO DECIMAL  Chapter 11: CONFIGURING TCP/IP ADDRESSING AND SECURITY
USING CALCULATOR TO CONVERT NUMBERS Chapter 11: CONFIGURING TCP/IP ADDRESSING AND SECURITY
SUBNET MASKS Chapter 11: CONFIGURING TCP/IP ADDRESSING AND SECURITY
PROBLEMS WITH CLASSFUL ADDRESSES Wasted addresses Shortage of address blocks Excessive routing table entries Netblock - a range of consecutive IP addresses   Chapter 11: CONFIGURING TCP/IP ADDRESSING AND SECURITY
… More detail… Netblocks were rigid, so organizations needing a contiguous address space were assigned an address block that, in some cases, was vastly larger than they needed. One example was any organization assigned a Class A netblock. Who has 1.7 million public systems? The supply of netblocks was limited. The Class A networks were all taken, and Class B networks were getting scarce. To deal with the scarcity of Class B blocks, some organizations obtained multiple Class C blocks to support their requirements. This resulted in a proliferation of routing table entries because several entries would be required to support several Class C networks for a single organization. Chapter 11: CONFIGURING TCP/IP ADDRESSING AND SECURITY
SUBNETTING A LARGE NETWORK Chapter 11: CONFIGURING TCP/IP ADDRESSING AND SECURITY
Previous Slide… This slide shows a Class A network being subnetted first into Class B networks and then into Class C networks.  This is one solution to the scarcity of Class B networks. It creates 256 Class B subnetworks for each Class A network divided in this way.  Each Class B network can then be divided into 256 Class C networks. Chapter 11: CONFIGURING TCP/IP ADDRESSING AND SECURITY
CLASSLESS INTERDOMAIN ROUTING (CIDR) Chapter 11: CONFIGURING TCP/IP ADDRESSING AND SECURITY
SUPERNETS Chapter 11: CONFIGURING TCP/IP ADDRESSING AND SECURITY
SECURING IP COMMUNICATIONS Internet threats Protective technologies Configuring and managing Windows Firewall Monitoring Internet communications security Chapter 11: CONFIGURING TCP/IP ADDRESSING AND SECURITY
INTERNET THREATS Viruses (the oldest threat) Worms (the most persistent threat) Trojan horses Spyware Zombies Direct hacking Chapter 11: CONFIGURING TCP/IP ADDRESSING AND SECURITY
VIRUSES Take advantage of gullible users Infect document, graphics, and executable files Often include mass-mailing components Can carry destructive payloads Chapter 11: CONFIGURING TCP/IP ADDRESSING AND SECURITY
Viruses (continued…) Computer viruses have been around since 1975, when John Walker released a program called Pervade to distribute a game he had invented. The game replicated itself to UNIVAC systems everywhere and, according to some accounts, eventually ended up on UNIVAC system distribution tapes. Since that time, many more virulent viruses have been written, and the damage they have caused in terms of time and money has been enormous. Corporations spend billions of dollars each year to protect themselves against viruses, and billions of dollars more when their protections fail. Chapter 11: CONFIGURING TCP/IP ADDRESSING AND SECURITY
WORMS Self-replicating Network-aware Use bugs in programs or systems to spread Can carry viruses or other payloads Chapter 11: CONFIGURING TCP/IP ADDRESSING AND SECURITY
Worms (continued…) Worms scan networks looking for systems that are running operating systems or applications with certain known vulnerabilities. When they find a vulnerability, they insert themselves into the vulnerable system and begin using it to scan for more victims.  If a system is infected, any unpatched system connected to the network will be infected, repeating the cycle. Discuss any recent news-making worms. Describe their attack vector and their payload. Discuss how infections from that particular worm might be prevented. Chapter 11: CONFIGURING TCP/IP ADDRESSING AND SECURITY
TROJAN HORSES Usually e-mailed or downloaded  Appear to be a useful program or game Carry payload or back door application Chapter 11: CONFIGURING TCP/IP ADDRESSING AND SECURITY
Trojan Horses (continued…) Trojan horses rely on credulous victims. They appear on the Internet as useful programs or fun games.  When they are executed on the victim’s system, they install a back door application to let hackers control the system or they launch a viral payload on the victim. Chapter 11: CONFIGURING TCP/IP ADDRESSING AND SECURITY
SPYWARE Has attributes of Trojan horses or worms Spies on its victim Might transmit marketing data or transmit personal data to the spyware author Chapter 11: CONFIGURING TCP/IP ADDRESSING AND SECURITY
Spyware (continued…) Some spyware is voluntarily installed by users as part of a marketing agreement. Other versions use viral or worm vectors to spread to target systems. Once installed, some versions simply collect demographic data.  Others log keystrokes or redirect browsers to sites that pay a royalty to the author. Chapter 11: CONFIGURING TCP/IP ADDRESSING AND SECURITY
ZOMBIES Payload of worm or Trojan horse Remotely controlled to attack network targets Participate in large-scale assaults on public Web sites Chapter 11: CONFIGURING TCP/IP ADDRESSING AND SECURITY
Zombies (continued…) Zombies are planted and controlled by hackers to attack large sites.  Fleets of zombies can be coordinated by one “zombie master” to direct large-scale attacks against targets. Chapter 11: CONFIGURING TCP/IP ADDRESSING AND SECURITY
DIRECT HACKING Relatively low incidence Hardest form of attack to defeat Although well-publicized by the movie industry, direct interactive penetration by hackers is relatively rare because it takes time, patience, and skill to locate vulnerable components on the intended victim’s system. Many hackers prefer to use mass attacks such as worms, Trojan horses, and viruses to gain access to systems. Chapter 11: CONFIGURING TCP/IP ADDRESSING AND SECURITY
PROTECTIVE TECHNOLOGIES Security Center Windows Firewall Internet Connection Sharing (ICS) Third-party utilities Chapter 11: CONFIGURING TCP/IP ADDRESSING AND SECURITY
SECURITY CENTER Chapter 11: CONFIGURING TCP/IP ADDRESSING AND SECURITY
FIREWALL TERMINOLOGY Packet filtering The process of inspecting packet headers to determine whether they are allowed to enter the network. Those that do not conform with established rules for address, port, or protocol type are dropped. Stateful packet filtering A more advanced form of packet filtering where inbound packets must be received in response to an initial communication from the system. Outbound traffic is tracked in a “state table,” and inbound packets must conform to expected reply traffic to those communications. Chapter 11: CONFIGURING TCP/IP ADDRESSING AND SECURITY
FIREWALL TERMINOLOGY Exceptions (packet filter rules) Rules that allow some inbound traffic to enter your system. For example, to allow Remote Desktop to enter your system if you want to access your system from work or school, you would enable an exception. Chapter 11: CONFIGURING TCP/IP ADDRESSING AND SECURITY
FIREWALL TERMINOLOGY Allowed traffic Packet traffic that is allowed to pass the firewall. Rejected traffic Packet traffic that has not met acceptance rules and is dropped. Logging The process by which firewalls maintain a history of acceptance and rejection events. Logging is often used to discover penetration attempts or troubleshoot connectivity issues. Chapter 11: CONFIGURING TCP/IP ADDRESSING AND SECURITY
ENABLING WINDOWS FIREWALL Chapter 11: CONFIGURING TCP/IP ADDRESSING AND SECURITY
FIREWALL EXCEPTIONS Chapter 11: CONFIGURING TCP/IP ADDRESSING AND SECURITY
ADVANCED WINDOWS FIREWALL SETTINGS Chapter 11: CONFIGURING TCP/IP ADDRESSING AND SECURITY ICMP - Internet Control Message Protocol
MONITORING INTERNET SECURITY Windows Firewall monitoring Service logs Event logs Chapter 11: CONFIGURING TCP/IP ADDRESSING AND SECURITY
WINDOWS FIREWALL ALERTS Chapter 11: CONFIGURING TCP/IP ADDRESSING AND SECURITY
WINDOWS FIREWALL LOGS Chapter 11: CONFIGURING TCP/IP ADDRESSING AND SECURITY
SERVER LOGS Chapter 11: CONFIGURING TCP/IP ADDRESSING AND SECURITY
SUMMARY IP addresses are 32-bit binary addresses. The network portion of IP addresses determines location. CIDR allows creation of custom netblocks. CIDR permits use of variable-length subnet masks. Windows Firewall blocks unauthorized packets. Windows Firewall exceptions allow specified traffic to pass through the firewall. Alerts and logs warn of attempted attacks. Chapter 11: CONFIGURING TCP/IP ADDRESSING AND SECURITY

More Related Content

What's hot (20)

IP Security
IP SecurityIP Security
IP Security
Ambo University
 
Network seurity
Network seurityNetwork seurity
Network seurity
Naqash Rasheed
 
Cyber security tutorial1
Cyber security tutorial1Cyber security tutorial1
Cyber security tutorial1
sweta dargad
 
Wireless Security
Wireless SecurityWireless Security
Wireless Security
siDz
 
Making Threat Management More Manageable
Making Threat Management More ManageableMaking Threat Management More Manageable
Making Threat Management More Manageable
IBM Security
 
Network defenses
Network defensesNetwork defenses
Network defenses
G Prachi
 
Ip security
Ip security Ip security
Ip security
Naveen Dubey
 
Firewall presentation m. emin özgünsür
Firewall presentation   m. emin özgünsürFirewall presentation   m. emin özgünsür
Firewall presentation m. emin özgünsür
emin_oz
 
IP Security
IP SecurityIP Security
IP Security
sahilshah200
 
Firewall fundamentals
Firewall fundamentalsFirewall fundamentals
Firewall fundamentals
Thang Man
 
The 5 most dangerous proxies
The 5 most dangerous proxiesThe 5 most dangerous proxies
The 5 most dangerous proxies
seldridgeD9
 
BAIT1103 Chapter 6
BAIT1103 Chapter 6BAIT1103 Chapter 6
BAIT1103 Chapter 6
limsh
 
Linta
LintaLinta
Linta
galaxy201
 
Firewall
FirewallFirewall
Firewall
Apo
 
Presentation Prepared By: Mohamad Almajali
Presentation Prepared By: Mohamad AlmajaliPresentation Prepared By: Mohamad Almajali
Presentation Prepared By: Mohamad Almajali
webhostingguy
 
Ip security
Ip securityIp security
Ip security
Jernej Virag
 
Firewall
FirewallFirewall
Firewall
reddivarihareesh
 
100197
100197100197
100197
Abhishek Malik
 
802.11 Wireless, WEP, WPA lecture
802.11 Wireless, WEP, WPA lecture802.11 Wireless, WEP, WPA lecture
802.11 Wireless, WEP, WPA lecture
Martyn Price
 
All about Firewalls ,IPS IDS and the era of UTM in a nutshell
All  about Firewalls ,IPS IDS and the era of UTM in a nutshellAll  about Firewalls ,IPS IDS and the era of UTM in a nutshell
All about Firewalls ,IPS IDS and the era of UTM in a nutshell
Hishan Shouketh
 
Cyber security tutorial1
Cyber security tutorial1Cyber security tutorial1
Cyber security tutorial1
sweta dargad
 
Wireless Security
Wireless SecurityWireless Security
Wireless Security
siDz
 
Making Threat Management More Manageable
Making Threat Management More ManageableMaking Threat Management More Manageable
Making Threat Management More Manageable
IBM Security
 
Network defenses
Network defensesNetwork defenses
Network defenses
G Prachi
 
Firewall presentation m. emin özgünsür
Firewall presentation   m. emin özgünsürFirewall presentation   m. emin özgünsür
Firewall presentation m. emin özgünsür
emin_oz
 
Firewall fundamentals
Firewall fundamentalsFirewall fundamentals
Firewall fundamentals
Thang Man
 
The 5 most dangerous proxies
The 5 most dangerous proxiesThe 5 most dangerous proxies
The 5 most dangerous proxies
seldridgeD9
 
BAIT1103 Chapter 6
BAIT1103 Chapter 6BAIT1103 Chapter 6
BAIT1103 Chapter 6
limsh
 
Firewall
FirewallFirewall
Firewall
Apo
 
Presentation Prepared By: Mohamad Almajali
Presentation Prepared By: Mohamad AlmajaliPresentation Prepared By: Mohamad Almajali
Presentation Prepared By: Mohamad Almajali
webhostingguy
 
802.11 Wireless, WEP, WPA lecture
802.11 Wireless, WEP, WPA lecture802.11 Wireless, WEP, WPA lecture
802.11 Wireless, WEP, WPA lecture
Martyn Price
 
All about Firewalls ,IPS IDS and the era of UTM in a nutshell
All  about Firewalls ,IPS IDS and the era of UTM in a nutshellAll  about Firewalls ,IPS IDS and the era of UTM in a nutshell
All about Firewalls ,IPS IDS and the era of UTM in a nutshell
Hishan Shouketh
 

Viewers also liked (20)

La computadora
La computadoraLa computadora
La computadora
silovera
 
Test bram
Test bramTest bram
Test bram
bramgeenen
 
IT103Microsoft Windows XP/OS Chap08
IT103Microsoft Windows XP/OS Chap08IT103Microsoft Windows XP/OS Chap08
IT103Microsoft Windows XP/OS Chap08
blusmurfydot1
 
IT109 Microsoft Windows 7 Operating Systems Unit 02
IT109 Microsoft Windows 7 Operating Systems Unit 02IT109 Microsoft Windows 7 Operating Systems Unit 02
IT109 Microsoft Windows 7 Operating Systems Unit 02
blusmurfydot1
 
Itt operating systems unit 05 lesson 06
Itt operating systems unit 05 lesson 06Itt operating systems unit 05 lesson 06
Itt operating systems unit 05 lesson 06
blusmurfydot1
 
IT103 Microsoft Windows XP/OS Chap07
IT103 Microsoft Windows XP/OS Chap07IT103 Microsoft Windows XP/OS Chap07
IT103 Microsoft Windows XP/OS Chap07
blusmurfydot1
 
Assistive technology
Assistive technologyAssistive technology
Assistive technology
kturne10
 
A Track Record of Ingenuity...
A Track Record of Ingenuity...A Track Record of Ingenuity...
A Track Record of Ingenuity...
EricFermin
 
La energia y la relacion con el desarrollo tecnologico
La energia y la relacion con el desarrollo tecnologicoLa energia y la relacion con el desarrollo tecnologico
La energia y la relacion con el desarrollo tecnologico
Euler Ruiz
 
Building Advanced Web UI in The Enterprise World
Building Advanced Web UI in The Enterprise WorldBuilding Advanced Web UI in The Enterprise World
Building Advanced Web UI in The Enterprise World
efim13
 
IT109 Microsoft Windows 7 Operating Systems Unit 07 lesson 10
IT109 Microsoft Windows 7 Operating Systems Unit 07 lesson 10IT109 Microsoft Windows 7 Operating Systems Unit 07 lesson 10
IT109 Microsoft Windows 7 Operating Systems Unit 07 lesson 10
blusmurfydot1
 
IT109 Microsoft Windows 7 Operating Systems Unit 06 lesson 07
IT109 Microsoft Windows 7 Operating Systems Unit 06 lesson 07IT109 Microsoft Windows 7 Operating Systems Unit 06 lesson 07
IT109 Microsoft Windows 7 Operating Systems Unit 06 lesson 07
blusmurfydot1
 
El aprendizaje y el cerebro humano
El aprendizaje y el cerebro humanoEl aprendizaje y el cerebro humano
El aprendizaje y el cerebro humano
Euler Ruiz
 
IT103Microsoft Windows XP/OS Chap13
IT103Microsoft Windows XP/OS Chap13IT103Microsoft Windows XP/OS Chap13
IT103Microsoft Windows XP/OS Chap13
blusmurfydot1
 
Zonas erroneas y la salud mental
Zonas erroneas y la salud mentalZonas erroneas y la salud mental
Zonas erroneas y la salud mental
Euler Ruiz
 
IT103Microsoft Windows XP/OS Chap16
IT103Microsoft Windows XP/OS Chap16IT103Microsoft Windows XP/OS Chap16
IT103Microsoft Windows XP/OS Chap16
blusmurfydot1
 
Parking hormigon prefabricado
Parking hormigon prefabricadoParking hormigon prefabricado
Parking hormigon prefabricado
CAMPUS11
 
El pensamiento positivo y la mente humana
El pensamiento positivo y la mente humanaEl pensamiento positivo y la mente humana
El pensamiento positivo y la mente humana
Euler Ruiz
 
Stay Out Please
Stay Out PleaseStay Out Please
Stay Out Please
efim13
 
IT109 Microsoft Windows 7 Operating Systems Unit 06 lesson 08
IT109 Microsoft Windows 7 Operating Systems Unit 06 lesson 08IT109 Microsoft Windows 7 Operating Systems Unit 06 lesson 08
IT109 Microsoft Windows 7 Operating Systems Unit 06 lesson 08
blusmurfydot1
 
La computadora
La computadoraLa computadora
La computadora
silovera
 
IT103Microsoft Windows XP/OS Chap08
IT103Microsoft Windows XP/OS Chap08IT103Microsoft Windows XP/OS Chap08
IT103Microsoft Windows XP/OS Chap08
blusmurfydot1
 
IT109 Microsoft Windows 7 Operating Systems Unit 02
IT109 Microsoft Windows 7 Operating Systems Unit 02IT109 Microsoft Windows 7 Operating Systems Unit 02
IT109 Microsoft Windows 7 Operating Systems Unit 02
blusmurfydot1
 
Itt operating systems unit 05 lesson 06
Itt operating systems unit 05 lesson 06Itt operating systems unit 05 lesson 06
Itt operating systems unit 05 lesson 06
blusmurfydot1
 
IT103 Microsoft Windows XP/OS Chap07
IT103 Microsoft Windows XP/OS Chap07IT103 Microsoft Windows XP/OS Chap07
IT103 Microsoft Windows XP/OS Chap07
blusmurfydot1
 
Assistive technology
Assistive technologyAssistive technology
Assistive technology
kturne10
 
A Track Record of Ingenuity...
A Track Record of Ingenuity...A Track Record of Ingenuity...
A Track Record of Ingenuity...
EricFermin
 
La energia y la relacion con el desarrollo tecnologico
La energia y la relacion con el desarrollo tecnologicoLa energia y la relacion con el desarrollo tecnologico
La energia y la relacion con el desarrollo tecnologico
Euler Ruiz
 
Building Advanced Web UI in The Enterprise World
Building Advanced Web UI in The Enterprise WorldBuilding Advanced Web UI in The Enterprise World
Building Advanced Web UI in The Enterprise World
efim13
 
IT109 Microsoft Windows 7 Operating Systems Unit 07 lesson 10
IT109 Microsoft Windows 7 Operating Systems Unit 07 lesson 10IT109 Microsoft Windows 7 Operating Systems Unit 07 lesson 10
IT109 Microsoft Windows 7 Operating Systems Unit 07 lesson 10
blusmurfydot1
 
IT109 Microsoft Windows 7 Operating Systems Unit 06 lesson 07
IT109 Microsoft Windows 7 Operating Systems Unit 06 lesson 07IT109 Microsoft Windows 7 Operating Systems Unit 06 lesson 07
IT109 Microsoft Windows 7 Operating Systems Unit 06 lesson 07
blusmurfydot1
 
El aprendizaje y el cerebro humano
El aprendizaje y el cerebro humanoEl aprendizaje y el cerebro humano
El aprendizaje y el cerebro humano
Euler Ruiz
 
IT103Microsoft Windows XP/OS Chap13
IT103Microsoft Windows XP/OS Chap13IT103Microsoft Windows XP/OS Chap13
IT103Microsoft Windows XP/OS Chap13
blusmurfydot1
 
Zonas erroneas y la salud mental
Zonas erroneas y la salud mentalZonas erroneas y la salud mental
Zonas erroneas y la salud mental
Euler Ruiz
 
IT103Microsoft Windows XP/OS Chap16
IT103Microsoft Windows XP/OS Chap16IT103Microsoft Windows XP/OS Chap16
IT103Microsoft Windows XP/OS Chap16
blusmurfydot1
 
Parking hormigon prefabricado
Parking hormigon prefabricadoParking hormigon prefabricado
Parking hormigon prefabricado
CAMPUS11
 
El pensamiento positivo y la mente humana
El pensamiento positivo y la mente humanaEl pensamiento positivo y la mente humana
El pensamiento positivo y la mente humana
Euler Ruiz
 
Stay Out Please
Stay Out PleaseStay Out Please
Stay Out Please
efim13
 
IT109 Microsoft Windows 7 Operating Systems Unit 06 lesson 08
IT109 Microsoft Windows 7 Operating Systems Unit 06 lesson 08IT109 Microsoft Windows 7 Operating Systems Unit 06 lesson 08
IT109 Microsoft Windows 7 Operating Systems Unit 06 lesson 08
blusmurfydot1
 

Similar to IT103Microsoft Windows XP/OS Chap11 (20)

Comprehensive Guide On Network Security
Comprehensive Guide On Network SecurityComprehensive Guide On Network Security
Comprehensive Guide On Network Security
Briskinfosec Technology and Consulting
 
Firewall ppt
Firewall pptFirewall ppt
Firewall ppt
saloni mittal
 
Solving Downgrade and DoS Attack Due to the Four Ways Handshake Vulnerabiliti...
Solving Downgrade and DoS Attack Due to the Four Ways Handshake Vulnerabiliti...Solving Downgrade and DoS Attack Due to the Four Ways Handshake Vulnerabiliti...
Solving Downgrade and DoS Attack Due to the Four Ways Handshake Vulnerabiliti...
Dr. Amarjeet Singh
 
Kali Linux - Falconer
Kali Linux - FalconerKali Linux - Falconer
Kali Linux - Falconer
Tony Godfrey
 
Thesis Statement On Digital Security
Thesis Statement On Digital SecurityThesis Statement On Digital Security
Thesis Statement On Digital Security
Lindsey Jones
 
Wireless Security
Wireless SecurityWireless Security
Wireless Security
Università Degli Studi Di Salerno
 
T C P I P Weaknesses And Solutions
T C P I P Weaknesses And SolutionsT C P I P Weaknesses And Solutions
T C P I P Weaknesses And Solutions
eroglu
 
Network security
Network securityNetwork security
Network security
-jyothish kumar sirigidi
 
Wi-FI Hacking
Wi-FI Hacking Wi-FI Hacking
Wi-FI Hacking
Mehul Jariwala
 
Hacking Wireless Networks : Null Delhi (November)
Hacking Wireless Networks : Null Delhi (November)Hacking Wireless Networks : Null Delhi (November)
Hacking Wireless Networks : Null Delhi (November)
Mandeep Jadon
 
Hacking Wireless Networks by Mandeep Singh Jadon
Hacking Wireless Networks by Mandeep Singh JadonHacking Wireless Networks by Mandeep Singh Jadon
Hacking Wireless Networks by Mandeep Singh Jadon
OWASP Delhi
 
Network security on Cisco routers and switches
Network security on Cisco routers and switchesNetwork security on Cisco routers and switches
Network security on Cisco routers and switches
Alexandros Britzolakis
 
Chapter 7 - Wireless Network Security.pptx
Chapter 7 - Wireless Network Security.pptxChapter 7 - Wireless Network Security.pptx
Chapter 7 - Wireless Network Security.pptx
AmanuelZewdie4
 
Firewall
FirewallFirewall
Firewall
Shiva Krishna Chandra Shekar
 
Firewall
FirewallFirewall
Firewall
Shiva Krishna Chandra Shekar
 
Security Issues of 802.11b
Security Issues of 802.11bSecurity Issues of 802.11b
Security Issues of 802.11b
guestd7b627
 
Security Issues of IEEE 802.11b
Security Issues of IEEE 802.11bSecurity Issues of IEEE 802.11b
Security Issues of IEEE 802.11b
Sreekanth GS
 
Wifi Security, or Descending into Depression and Drink
Wifi Security, or Descending into Depression and DrinkWifi Security, or Descending into Depression and Drink
Wifi Security, or Descending into Depression and Drink
SecurityTube.Net
 
Networkin new
Networkin newNetworkin new
Networkin new
rajujast
 
Us 13-opi-evading-deep-inspection-for-fun-and-shell-wp
Us 13-opi-evading-deep-inspection-for-fun-and-shell-wpUs 13-opi-evading-deep-inspection-for-fun-and-shell-wp
Us 13-opi-evading-deep-inspection-for-fun-and-shell-wp
Olli-Pekka Niemi
 
Solving Downgrade and DoS Attack Due to the Four Ways Handshake Vulnerabiliti...
Solving Downgrade and DoS Attack Due to the Four Ways Handshake Vulnerabiliti...Solving Downgrade and DoS Attack Due to the Four Ways Handshake Vulnerabiliti...
Solving Downgrade and DoS Attack Due to the Four Ways Handshake Vulnerabiliti...
Dr. Amarjeet Singh
 
Kali Linux - Falconer
Kali Linux - FalconerKali Linux - Falconer
Kali Linux - Falconer
Tony Godfrey
 
Thesis Statement On Digital Security
Thesis Statement On Digital SecurityThesis Statement On Digital Security
Thesis Statement On Digital Security
Lindsey Jones
 
T C P I P Weaknesses And Solutions
T C P I P Weaknesses And SolutionsT C P I P Weaknesses And Solutions
T C P I P Weaknesses And Solutions
eroglu
 
Hacking Wireless Networks : Null Delhi (November)
Hacking Wireless Networks : Null Delhi (November)Hacking Wireless Networks : Null Delhi (November)
Hacking Wireless Networks : Null Delhi (November)
Mandeep Jadon
 
Hacking Wireless Networks by Mandeep Singh Jadon
Hacking Wireless Networks by Mandeep Singh JadonHacking Wireless Networks by Mandeep Singh Jadon
Hacking Wireless Networks by Mandeep Singh Jadon
OWASP Delhi
 
Network security on Cisco routers and switches
Network security on Cisco routers and switchesNetwork security on Cisco routers and switches
Network security on Cisco routers and switches
Alexandros Britzolakis
 
Chapter 7 - Wireless Network Security.pptx
Chapter 7 - Wireless Network Security.pptxChapter 7 - Wireless Network Security.pptx
Chapter 7 - Wireless Network Security.pptx
AmanuelZewdie4
 
Security Issues of 802.11b
Security Issues of 802.11bSecurity Issues of 802.11b
Security Issues of 802.11b
guestd7b627
 
Security Issues of IEEE 802.11b
Security Issues of IEEE 802.11bSecurity Issues of IEEE 802.11b
Security Issues of IEEE 802.11b
Sreekanth GS
 
Wifi Security, or Descending into Depression and Drink
Wifi Security, or Descending into Depression and DrinkWifi Security, or Descending into Depression and Drink
Wifi Security, or Descending into Depression and Drink
SecurityTube.Net
 
Networkin new
Networkin newNetworkin new
Networkin new
rajujast
 
Us 13-opi-evading-deep-inspection-for-fun-and-shell-wp
Us 13-opi-evading-deep-inspection-for-fun-and-shell-wpUs 13-opi-evading-deep-inspection-for-fun-and-shell-wp
Us 13-opi-evading-deep-inspection-for-fun-and-shell-wp
Olli-Pekka Niemi
 

More from blusmurfydot1 (15)

IT103Microsoft Windows XP/OS Chap05
IT103Microsoft Windows XP/OS Chap05IT103Microsoft Windows XP/OS Chap05
IT103Microsoft Windows XP/OS Chap05
blusmurfydot1
 
IT109 Microsoft Operating Systems Unit 05 lesson 06
IT109 Microsoft Operating Systems Unit 05 lesson 06IT109 Microsoft Operating Systems Unit 05 lesson 06
IT109 Microsoft Operating Systems Unit 05 lesson 06
blusmurfydot1
 
IT103Microsoft Windows XP/OS Chap15
IT103Microsoft Windows XP/OS Chap15IT103Microsoft Windows XP/OS Chap15
IT103Microsoft Windows XP/OS Chap15
blusmurfydot1
 
IT103Microsoft Windows XP/OS Chap12
IT103Microsoft Windows XP/OS Chap12IT103Microsoft Windows XP/OS Chap12
IT103Microsoft Windows XP/OS Chap12
blusmurfydot1
 
IT103Microsoft Windows XP/OS Chap04
IT103Microsoft Windows XP/OS Chap04IT103Microsoft Windows XP/OS Chap04
IT103Microsoft Windows XP/OS Chap04
blusmurfydot1
 
Microsoft Windows XP/OS Chapt03
Microsoft Windows XP/OS Chapt03Microsoft Windows XP/OS Chapt03
Microsoft Windows XP/OS Chapt03
blusmurfydot1
 
IT103Microsoft Windows XP/OS Chap02
IT103Microsoft Windows XP/OS Chap02IT103Microsoft Windows XP/OS Chap02
IT103Microsoft Windows XP/OS Chap02
blusmurfydot1
 
IT103Microsoft Windows XP/OS Chap01
IT103Microsoft Windows XP/OS Chap01IT103Microsoft Windows XP/OS Chap01
IT103Microsoft Windows XP/OS Chap01
blusmurfydot1
 
IT109 Microsoft Windows Operating Systems Unit 09 lesson12
IT109 Microsoft Windows Operating Systems Unit 09 lesson12IT109 Microsoft Windows Operating Systems Unit 09 lesson12
IT109 Microsoft Windows Operating Systems Unit 09 lesson12
blusmurfydot1
 
IT109 Microsoft Windows 7 Operating Systems Unit 08 lesson 11
IT109 Microsoft Windows 7 Operating Systems Unit 08 lesson 11IT109 Microsoft Windows 7 Operating Systems Unit 08 lesson 11
IT109 Microsoft Windows 7 Operating Systems Unit 08 lesson 11
blusmurfydot1
 
IT109 Microsoft Windows 7 Operating Systems Unit 04 lesson 04
IT109 Microsoft Windows 7 Operating Systems Unit 04 lesson 04IT109 Microsoft Windows 7 Operating Systems Unit 04 lesson 04
IT109 Microsoft Windows 7 Operating Systems Unit 04 lesson 04
blusmurfydot1
 
IT109 Microsoft Windows 7 Operating Systems Unit 03 lesson 02
IT109 Microsoft Windows 7 Operating Systems Unit 03 lesson 02IT109 Microsoft Windows 7 Operating Systems Unit 03 lesson 02
IT109 Microsoft Windows 7 Operating Systems Unit 03 lesson 02
blusmurfydot1
 
IT109 Microsoft Windows 7 Operating Systems Unit 03 lesson 01
IT109 Microsoft Windows 7 Operating Systems Unit 03 lesson 01IT109 Microsoft Windows 7 Operating Systems Unit 03 lesson 01
IT109 Microsoft Windows 7 Operating Systems Unit 03 lesson 01
blusmurfydot1
 
IT109 Microsoft Windows 7 Operating Systems Unit 01
IT109 Microsoft Windows 7 Operating Systems Unit 01IT109 Microsoft Windows 7 Operating Systems Unit 01
IT109 Microsoft Windows 7 Operating Systems Unit 01
blusmurfydot1
 
IT103Microsoft Windows XP/OS Chap14
IT103Microsoft Windows XP/OS Chap14IT103Microsoft Windows XP/OS Chap14
IT103Microsoft Windows XP/OS Chap14
blusmurfydot1
 
IT103Microsoft Windows XP/OS Chap05
IT103Microsoft Windows XP/OS Chap05IT103Microsoft Windows XP/OS Chap05
IT103Microsoft Windows XP/OS Chap05
blusmurfydot1
 
IT109 Microsoft Operating Systems Unit 05 lesson 06
IT109 Microsoft Operating Systems Unit 05 lesson 06IT109 Microsoft Operating Systems Unit 05 lesson 06
IT109 Microsoft Operating Systems Unit 05 lesson 06
blusmurfydot1
 
IT103Microsoft Windows XP/OS Chap15
IT103Microsoft Windows XP/OS Chap15IT103Microsoft Windows XP/OS Chap15
IT103Microsoft Windows XP/OS Chap15
blusmurfydot1
 
IT103Microsoft Windows XP/OS Chap12
IT103Microsoft Windows XP/OS Chap12IT103Microsoft Windows XP/OS Chap12
IT103Microsoft Windows XP/OS Chap12
blusmurfydot1
 
IT103Microsoft Windows XP/OS Chap04
IT103Microsoft Windows XP/OS Chap04IT103Microsoft Windows XP/OS Chap04
IT103Microsoft Windows XP/OS Chap04
blusmurfydot1
 
Microsoft Windows XP/OS Chapt03
Microsoft Windows XP/OS Chapt03Microsoft Windows XP/OS Chapt03
Microsoft Windows XP/OS Chapt03
blusmurfydot1
 
IT103Microsoft Windows XP/OS Chap02
IT103Microsoft Windows XP/OS Chap02IT103Microsoft Windows XP/OS Chap02
IT103Microsoft Windows XP/OS Chap02
blusmurfydot1
 
IT103Microsoft Windows XP/OS Chap01
IT103Microsoft Windows XP/OS Chap01IT103Microsoft Windows XP/OS Chap01
IT103Microsoft Windows XP/OS Chap01
blusmurfydot1
 
IT109 Microsoft Windows Operating Systems Unit 09 lesson12
IT109 Microsoft Windows Operating Systems Unit 09 lesson12IT109 Microsoft Windows Operating Systems Unit 09 lesson12
IT109 Microsoft Windows Operating Systems Unit 09 lesson12
blusmurfydot1
 
IT109 Microsoft Windows 7 Operating Systems Unit 08 lesson 11
IT109 Microsoft Windows 7 Operating Systems Unit 08 lesson 11IT109 Microsoft Windows 7 Operating Systems Unit 08 lesson 11
IT109 Microsoft Windows 7 Operating Systems Unit 08 lesson 11
blusmurfydot1
 
IT109 Microsoft Windows 7 Operating Systems Unit 04 lesson 04
IT109 Microsoft Windows 7 Operating Systems Unit 04 lesson 04IT109 Microsoft Windows 7 Operating Systems Unit 04 lesson 04
IT109 Microsoft Windows 7 Operating Systems Unit 04 lesson 04
blusmurfydot1
 
IT109 Microsoft Windows 7 Operating Systems Unit 03 lesson 02
IT109 Microsoft Windows 7 Operating Systems Unit 03 lesson 02IT109 Microsoft Windows 7 Operating Systems Unit 03 lesson 02
IT109 Microsoft Windows 7 Operating Systems Unit 03 lesson 02
blusmurfydot1
 
IT109 Microsoft Windows 7 Operating Systems Unit 03 lesson 01
IT109 Microsoft Windows 7 Operating Systems Unit 03 lesson 01IT109 Microsoft Windows 7 Operating Systems Unit 03 lesson 01
IT109 Microsoft Windows 7 Operating Systems Unit 03 lesson 01
blusmurfydot1
 
IT109 Microsoft Windows 7 Operating Systems Unit 01
IT109 Microsoft Windows 7 Operating Systems Unit 01IT109 Microsoft Windows 7 Operating Systems Unit 01
IT109 Microsoft Windows 7 Operating Systems Unit 01
blusmurfydot1
 
IT103Microsoft Windows XP/OS Chap14
IT103Microsoft Windows XP/OS Chap14IT103Microsoft Windows XP/OS Chap14
IT103Microsoft Windows XP/OS Chap14
blusmurfydot1
 

IT103Microsoft Windows XP/OS Chap11

  • 1. CONFIGURING TCP/IP ADDRESSING AND SECURITY Chapter 11
  • 2. OVERVIEW Understand IP addressing Manage IP subnetting and subnet masks Understand IP security terminology Manage Internet security features of Windows XP Configure and troubleshoot Windows Firewall Chapter 11: CONFIGURING TCP/IP ADDRESSING AND SECURITY
  • 3. Overview - 2 This chapter addresses advanced TCP/IP addressing and Internet security. It introduces students to classless interdomain routing (CIDR) subnetting and subnet masks, and it explores the binary nature of IP addresses and the knowledge necessary to troubleshoot addressing issues. We will also introduce Windows XP Internet security features such as Windows Firewall. Proper configuration and operation of Windows Firewall can protect systems inexpensively. Chapter 11: CONFIGURING TCP/IP ADDRESSING AND SECURITY
  • 4. UNDERSTANDING BINARY NUMBERS Chapter 11: CONFIGURING TCP/IP ADDRESSING AND SECURITY
  • 5. CONVERTING DECIMAL ADDRESSES TO BINARY Chapter 11: CONFIGURING TCP/IP ADDRESSING AND SECURITY
  • 6. CONVERTING BINARY ADDRESSES TO DECIMAL Chapter 11: CONFIGURING TCP/IP ADDRESSING AND SECURITY
  • 7. USING CALCULATOR TO CONVERT NUMBERS Chapter 11: CONFIGURING TCP/IP ADDRESSING AND SECURITY
  • 8. SUBNET MASKS Chapter 11: CONFIGURING TCP/IP ADDRESSING AND SECURITY
  • 9. PROBLEMS WITH CLASSFUL ADDRESSES Wasted addresses Shortage of address blocks Excessive routing table entries Netblock - a range of consecutive IP addresses Chapter 11: CONFIGURING TCP/IP ADDRESSING AND SECURITY
  • 10. … More detail… Netblocks were rigid, so organizations needing a contiguous address space were assigned an address block that, in some cases, was vastly larger than they needed. One example was any organization assigned a Class A netblock. Who has 1.7 million public systems? The supply of netblocks was limited. The Class A networks were all taken, and Class B networks were getting scarce. To deal with the scarcity of Class B blocks, some organizations obtained multiple Class C blocks to support their requirements. This resulted in a proliferation of routing table entries because several entries would be required to support several Class C networks for a single organization. Chapter 11: CONFIGURING TCP/IP ADDRESSING AND SECURITY
  • 11. SUBNETTING A LARGE NETWORK Chapter 11: CONFIGURING TCP/IP ADDRESSING AND SECURITY
  • 12. Previous Slide… This slide shows a Class A network being subnetted first into Class B networks and then into Class C networks. This is one solution to the scarcity of Class B networks. It creates 256 Class B subnetworks for each Class A network divided in this way. Each Class B network can then be divided into 256 Class C networks. Chapter 11: CONFIGURING TCP/IP ADDRESSING AND SECURITY
  • 13. CLASSLESS INTERDOMAIN ROUTING (CIDR) Chapter 11: CONFIGURING TCP/IP ADDRESSING AND SECURITY
  • 14. SUPERNETS Chapter 11: CONFIGURING TCP/IP ADDRESSING AND SECURITY
  • 15. SECURING IP COMMUNICATIONS Internet threats Protective technologies Configuring and managing Windows Firewall Monitoring Internet communications security Chapter 11: CONFIGURING TCP/IP ADDRESSING AND SECURITY
  • 16. INTERNET THREATS Viruses (the oldest threat) Worms (the most persistent threat) Trojan horses Spyware Zombies Direct hacking Chapter 11: CONFIGURING TCP/IP ADDRESSING AND SECURITY
  • 17. VIRUSES Take advantage of gullible users Infect document, graphics, and executable files Often include mass-mailing components Can carry destructive payloads Chapter 11: CONFIGURING TCP/IP ADDRESSING AND SECURITY
  • 18. Viruses (continued…) Computer viruses have been around since 1975, when John Walker released a program called Pervade to distribute a game he had invented. The game replicated itself to UNIVAC systems everywhere and, according to some accounts, eventually ended up on UNIVAC system distribution tapes. Since that time, many more virulent viruses have been written, and the damage they have caused in terms of time and money has been enormous. Corporations spend billions of dollars each year to protect themselves against viruses, and billions of dollars more when their protections fail. Chapter 11: CONFIGURING TCP/IP ADDRESSING AND SECURITY
  • 19. WORMS Self-replicating Network-aware Use bugs in programs or systems to spread Can carry viruses or other payloads Chapter 11: CONFIGURING TCP/IP ADDRESSING AND SECURITY
  • 20. Worms (continued…) Worms scan networks looking for systems that are running operating systems or applications with certain known vulnerabilities. When they find a vulnerability, they insert themselves into the vulnerable system and begin using it to scan for more victims. If a system is infected, any unpatched system connected to the network will be infected, repeating the cycle. Discuss any recent news-making worms. Describe their attack vector and their payload. Discuss how infections from that particular worm might be prevented. Chapter 11: CONFIGURING TCP/IP ADDRESSING AND SECURITY
  • 21. TROJAN HORSES Usually e-mailed or downloaded Appear to be a useful program or game Carry payload or back door application Chapter 11: CONFIGURING TCP/IP ADDRESSING AND SECURITY
  • 22. Trojan Horses (continued…) Trojan horses rely on credulous victims. They appear on the Internet as useful programs or fun games. When they are executed on the victim’s system, they install a back door application to let hackers control the system or they launch a viral payload on the victim. Chapter 11: CONFIGURING TCP/IP ADDRESSING AND SECURITY
  • 23. SPYWARE Has attributes of Trojan horses or worms Spies on its victim Might transmit marketing data or transmit personal data to the spyware author Chapter 11: CONFIGURING TCP/IP ADDRESSING AND SECURITY
  • 24. Spyware (continued…) Some spyware is voluntarily installed by users as part of a marketing agreement. Other versions use viral or worm vectors to spread to target systems. Once installed, some versions simply collect demographic data. Others log keystrokes or redirect browsers to sites that pay a royalty to the author. Chapter 11: CONFIGURING TCP/IP ADDRESSING AND SECURITY
  • 25. ZOMBIES Payload of worm or Trojan horse Remotely controlled to attack network targets Participate in large-scale assaults on public Web sites Chapter 11: CONFIGURING TCP/IP ADDRESSING AND SECURITY
  • 26. Zombies (continued…) Zombies are planted and controlled by hackers to attack large sites. Fleets of zombies can be coordinated by one “zombie master” to direct large-scale attacks against targets. Chapter 11: CONFIGURING TCP/IP ADDRESSING AND SECURITY
  • 27. DIRECT HACKING Relatively low incidence Hardest form of attack to defeat Although well-publicized by the movie industry, direct interactive penetration by hackers is relatively rare because it takes time, patience, and skill to locate vulnerable components on the intended victim’s system. Many hackers prefer to use mass attacks such as worms, Trojan horses, and viruses to gain access to systems. Chapter 11: CONFIGURING TCP/IP ADDRESSING AND SECURITY
  • 28. PROTECTIVE TECHNOLOGIES Security Center Windows Firewall Internet Connection Sharing (ICS) Third-party utilities Chapter 11: CONFIGURING TCP/IP ADDRESSING AND SECURITY
  • 29. SECURITY CENTER Chapter 11: CONFIGURING TCP/IP ADDRESSING AND SECURITY
  • 30. FIREWALL TERMINOLOGY Packet filtering The process of inspecting packet headers to determine whether they are allowed to enter the network. Those that do not conform with established rules for address, port, or protocol type are dropped. Stateful packet filtering A more advanced form of packet filtering where inbound packets must be received in response to an initial communication from the system. Outbound traffic is tracked in a “state table,” and inbound packets must conform to expected reply traffic to those communications. Chapter 11: CONFIGURING TCP/IP ADDRESSING AND SECURITY
  • 31. FIREWALL TERMINOLOGY Exceptions (packet filter rules) Rules that allow some inbound traffic to enter your system. For example, to allow Remote Desktop to enter your system if you want to access your system from work or school, you would enable an exception. Chapter 11: CONFIGURING TCP/IP ADDRESSING AND SECURITY
  • 32. FIREWALL TERMINOLOGY Allowed traffic Packet traffic that is allowed to pass the firewall. Rejected traffic Packet traffic that has not met acceptance rules and is dropped. Logging The process by which firewalls maintain a history of acceptance and rejection events. Logging is often used to discover penetration attempts or troubleshoot connectivity issues. Chapter 11: CONFIGURING TCP/IP ADDRESSING AND SECURITY
  • 33. ENABLING WINDOWS FIREWALL Chapter 11: CONFIGURING TCP/IP ADDRESSING AND SECURITY
  • 34. FIREWALL EXCEPTIONS Chapter 11: CONFIGURING TCP/IP ADDRESSING AND SECURITY
  • 35. ADVANCED WINDOWS FIREWALL SETTINGS Chapter 11: CONFIGURING TCP/IP ADDRESSING AND SECURITY ICMP - Internet Control Message Protocol
  • 36. MONITORING INTERNET SECURITY Windows Firewall monitoring Service logs Event logs Chapter 11: CONFIGURING TCP/IP ADDRESSING AND SECURITY
  • 37. WINDOWS FIREWALL ALERTS Chapter 11: CONFIGURING TCP/IP ADDRESSING AND SECURITY
  • 38. WINDOWS FIREWALL LOGS Chapter 11: CONFIGURING TCP/IP ADDRESSING AND SECURITY
  • 39. SERVER LOGS Chapter 11: CONFIGURING TCP/IP ADDRESSING AND SECURITY
  • 40. SUMMARY IP addresses are 32-bit binary addresses. The network portion of IP addresses determines location. CIDR allows creation of custom netblocks. CIDR permits use of variable-length subnet masks. Windows Firewall blocks unauthorized packets. Windows Firewall exceptions allow specified traffic to pass through the firewall. Alerts and logs warn of attempted attacks. Chapter 11: CONFIGURING TCP/IP ADDRESSING AND SECURITY

Editor's Notes

  • #3: This chapter addresses advanced TCP/IP addressing and Internet security. It introduces students to classless interdomain routing (CIDR) subnetting and subnet masks, and it explores the binary nature of IP addresses and the knowledge necessary to troubleshoot addressing issues. We will also introduce Windows XP Internet security features such as Windows Firewall. Proper configuration and operation of Windows Firewall can protect systems inexpensively.
  • #5: This slide depicts the relationship between decimal number 179 and its binary equivalent. Many students will be familiar with the principles of the binary numbering system. Make sure that the others understand this slide. Without a basic understanding of binary numbering and the base 2 number system, students will not understand the next part of this chapter.
  • #6: This slide shows the conversion of a dotted decimal IP address to its binary equivalent. Make it clear that IP operates at the binary level and that the dotted decimal representations we see are only for our convenience.
  • #7: This slide shows the conversion of a binary IP address to its dotted decimal equivalent. Walk through the conversion with students.
  • #8: This slide depicts the use of Calculator to convert the decimal number 179 to binary and back again. Stress the importance of maintaining leading zeros when converting numbers in this way. IP addresses require complete octets to be effective.
  • #9: This slide shows a decimal subnet mask and the same subnet mask in binary form. Point out how the subnet mask designates the portion of the address that belongs to the network and the portion that belongs to the host.
  • #10: This slide lists three disadvantages of classful IP addressing: Netblocks were rigid, so organizations needing a contiguous address space were assigned an address block that, in some cases, was vastly larger than they needed. One example was any organization assigned a Class A netblock. Who has 1.7 million public systems? The supply of netblocks was limited. The Class A networks were all taken, and Class B networks were getting scarce. To deal with the scarcity of Class B blocks, some organizations obtained multiple Class C blocks to support their requirements. This resulted in a proliferation of routing table entries because several entries would be required to support several Class C networks for a single organization.
  • #12: This slide shows a Class A network being subnetted first into Class B networks and then into Class C networks. This is one solution to the scarcity of Class B networks. It creates 256 Class B subnetworks for each Class A network divided in this way. Each Class B network can then be divided into 256 Class C networks. The remaining problem with this method is that there is no provision for organizations that need 300 addresses (a fraction of a Class B) or 6 addresses (a fraction of a Class C). The next slide shows the solution. Find out how many of your students know the answer already.
  • #14: Spend some time on this slide, which presents a lot of information. We are using a CIDR subnet mask to divide a Class B netblock into eight smaller netblocks, each with 8,190 addresses. Point out how the new network address combinations added by extending the subnet mask are used to generate the new network IDs. Also explain how the new netblock ranges are calculated by beginning with the network ID and ending with the value for a host portion of all 1s. Explain how the network ID and the broadcast are reserved, yielding 2n–2 possible addresses. Finally, point out the CIDR notation that is used to define the new subnet masks. Ask students how the scenario might differ if we used the subnet mask /18 or /20 .
  • #15: This slide depicts the use of CIDR to create a supernet from eight Class C netblocks. Describe this process and have students calculate the number of addresses in the new network.
  • #16: This slide introduces the section of Chapter 11 dealing with IP communications security. Conduct a discussion of current threats, and then explain how Windows XP deals with those threats. End with a discussion of security monitoring.
  • #17: This slide lists the major categories of Internet threats. Discuss each in turn, and have students provide examples of each. Point out the persistent nature of worms. (All it takes to keep a worm alive is a single unattended Windows XP system somewhere.)
  • #18: Computer viruses have been around since 1975, when John Walker released a program called Pervade to distribute a game he had invented. The game replicated itself to UNIVAC systems everywhere and, according to some accounts, eventually ended up on UNIVAC system distribution tapes. Since that time, many more virulent viruses have been written, and the damage they have caused in terms of time and money has been enormous. Corporations spend billions of dollars each year to protect themselves against viruses, and billions of dollars more when their protections fail.
  • #20: Worms scan networks looking for systems that are running operating systems or applications with certain known vulnerabilities. When they find a vulnerability, they insert themselves into the vulnerable system and begin using it to scan for more victims. If a system is infected, any unpatched system connected to the network will be infected, repeating the cycle. Discuss any recent news-making worms. Describe their attack vector and their payload. Discuss how infections from that particular worm might be prevented.
  • #22: Trojan horses rely on credulous victims. They appear on the Internet as useful programs or fun games. When they are executed on the victim’s system, they install a back door application to let hackers control the system or they launch a viral payload on the victim.
  • #24: Some spyware is voluntarily installed by users as part of a marketing agreement. Other versions use viral or worm vectors to spread to target systems. Once installed, some versions simply collect demographic data. Others log keystrokes or redirect browsers to sites that pay a royalty to the author.
  • #26: Zombies are planted and controlled by hackers to attack large sites. Fleets of zombies can be coordinated by one “zombie master” to direct large-scale attacks against targets.
  • #28: Although well-publicized by the movie industry, direct interactive penetration by hackers is relatively rare because it takes time, patience, and skill to locate vulnerable components on the intended victim’s system. Many hackers prefer to use mass attacks such as worms, Trojan horses, and viruses to gain access to systems.
  • #29: The technologies you can use to protect a Windows XP system range from the built-in Windows Firewall and ICS to third-party antivirus tools that can detect and defeat almost any known malware. In this section, we concentrate on the Windows tools. We also present the Security Center, an application that allows users to monitor security configuration on their systems.
  • #30: This slide depicts the Security Center console. Demonstrate this console on a classroom system and show how it monitors the status of antivirus software, firewall software, and Automatic Updates. These are widely considered to be the three most important ways to defeat malicious software. Point out the numerous links to additional information on various aspects of system security.
  • #31: This slide presents some common firewall terms. Discuss each briefly to ensure that students recognize them later during discussions of firewall configuration. Packet filtering The process of inspecting packet headers to determine whether they are allowed to enter the network. Those that do not conform with established rules for address, port, or protocol type are dropped. Stateful packet filtering A more advanced form of packet filtering where inbound packets must be received in response to an initial communication from the system. Outbound traffic is tracked in a “state table,” and inbound packets must conform to expected reply traffic to those communications. Exceptions Rules that allow some inbound traffic to enter your system. For example, to allow Remote Desktop to enter your system if you want to access your system from work or school, you would enable an exception. Allowed traffic Packet traffic that is allowed to pass the firewall. Rejected traffic Packet traffic that has not met acceptance rules and is dropped. Logging The process by which firewalls maintain a history of acceptance and rejection events. Logging is often used to discover penetration attempts or troubleshoot connectivity issues.
  • #32: This slide presents some common firewall terms. Discuss each briefly to ensure that students recognize them later during discussions of firewall configuration. Packet filtering The process of inspecting packet headers to determine whether they are allowed to enter the network. Those that do not conform with established rules for address, port, or protocol type are dropped. Stateful packet filtering A more advanced form of packet filtering where inbound packets must be received in response to an initial communication from the system. Outbound traffic is tracked in a “state table,” and inbound packets must conform to expected reply traffic to those communications. Exceptions Rules that allow some inbound traffic to enter your system. For example, to allow Remote Desktop to enter your system if you want to access your system from work or school, you would enable an exception. Allowed traffic Packet traffic that is allowed to pass the firewall. Rejected traffic Packet traffic that has not met acceptance rules and is dropped. Logging The process by which firewalls maintain a history of acceptance and rejection events. Logging is often used to discover penetration attempts or troubleshoot connectivity issues.
  • #33: This slide presents some common firewall terms. Discuss each briefly to ensure that students recognize them later during discussions of firewall configuration. Packet filtering The process of inspecting packet headers to determine whether they are allowed to enter the network. Those that do not conform with established rules for address, port, or protocol type are dropped. Stateful packet filtering A more advanced form of packet filtering where inbound packets must be received in response to an initial communication from the system. Outbound traffic is tracked in a “state table,” and inbound packets must conform to expected reply traffic to those communications. Exceptions Rules that allow some inbound traffic to enter your system. For example, to allow Remote Desktop to enter your system if you want to access your system from work or school, you would enable an exception. Allowed traffic Packet traffic that is allowed to pass the firewall. Rejected traffic Packet traffic that has not met acceptance rules and is dropped. Logging The process by which firewalls maintain a history of acceptance and rejection events. Logging is often used to discover penetration attempts or troubleshoot connectivity issues.
  • #34: This slide shows the three main tabs of the Windows Firewall dialog box. Point out the settings as you step through the frames. If possible, demonstrate some of them on a classroom system.
  • #35: This slide shows the configuration of firewall exceptions. Describe when an exception might be necessary to allow a system to provide a service or communicate with other systems using a nonstandard port or protocol. Point out the Change Scope feature, which allows you to designate which interface the exceptions apply to. Discuss how this might be important for file-sharing networks that also access the Internet.
  • #36: This slide depicts the dialog boxes accessible from the Advanced tab of the Windows Firewall Properties dialog box. Point out how to designate which connections are protected by Windows Firewall and the services you can enable by using the Services tab. Explain why some of these settings might be used (for example, for a system that acts as a Web server for a small office). Describe how ICMP settings can be enabled and disabled, either per connection or globally. Refer students to the textbook for descriptions of the ICMP settings.
  • #37: This slide introduces the topic of Internet security monitoring. Use the analogy of the Internet as a vast hotel or apartment building. Internet users lock their own doors for safety and privacy. They unlock them for room service or the maid but do not allow potential intruders to enter. They can hear if someone tries to pick their lock, and they can take appropriate action to call in the authorities or otherwise protect themselves. On the Internet, we also need a way to alert ourselves to attempted attacks. For this purpose, Windows Firewall has alerts and logs. Alerts notify the user when an attempt is made to open a restricted port. Logs record accepted and rejected traffic for later analysis. In addition, Internet services keep their own logs to track use of the service. These can often offer a clue as to the intent of an attacker.
  • #38: Windows Firewall notifies users of new applications trying to communicate with their system and lets them take action to allow or block such applications. Describe the process and effects of adding exceptions to Windows Firewall.
  • #39: This slide depicts the configuration and format of Windows Firewall logs. Point out the attempted attack on the HTTP port (the three dropped packets for port 80). If possible, open a logfile in class and examine its contents. Describe the entries and their implications.
  • #40: This slide shows an excerpt of a Web server log for IIS in Windows XP. Point out the 403 (authentication) and 404 (file not found) errors. Discuss the implications of seeing a large number of these in your logs (hack attempts or searches for known vulnerabilities).
  • #41: This list summarizes this chapter. As you discuss the items, return to the main points of your lecture. Make sure students understand the principles of CIDR subnet masks and CIDR notation. Stress the importance of having a strong understanding of IP addressing and security topics in real-world network designs.