Tuesday 25 December 2012

Virtual Private Network (VPN


VIRTUAL PRIVATE NETWORK (VPN)
Virtual Private Network (VPN) is the technology that you can use to access the office or home network remotely and securely over the Internet, so that the communication data is protected from sniffing or hijacking by hackers. It enables a host computer to send and receive data across shared or public networks as if it were a private network with all the functionality, security and management policies of the private network. This is done by establishing a virtual point-to-point connection through the use of dedicated connections, encryption, or a combination of the two.
Remote Access VPN
Remote access VPN connections enable users working at home or on the road to access a server on a private network using the infrastructure provided by a public network, such as the Internet. From the user’s perspective, the VPN is a point-to-point connection between the computer (the VPN client) and an organization’s server. The exact infrastructure of the shared or public network is irrelevant because it appears logically as if the data is sent over a dedicated private link




Ethernet Cable


ETHERNET CABLING

An Ethernet cable is one of the most popular forms of network cable used on wired networks. Ethernet cables connect devices on local area networks such as PCs, routers and switches.

Types of Ethernet Cabling
·         Straight-through cable
·         Crossover cable
·         Rolled cable

Straight-Through Cable
The straight-through cable is used to connect
·         Host to switch or hub
·         Router to switch or hub
Four wires are used in straight-through cable to connect Ethernet devices. Straight-Through refers to cables that have the pin assignments on each end of the cable. In other words Pin 1 connector A goes to Pin 1 on connector B, Pin 2 to Pin 2 etc. Straight-Through wired cables are most commonly used to connect a host to client. When we talk about cat5e patch cables, the Straight-Through wired cat5e patch cable is used to connect computers, printers and other network client devices to the router switch or hub (the host device in this instance).

CONNECTOR (A)                                                                                            CONNECTOR (B)

Crossover Cable

A crossover cable is a special type of Ethernet cable specially designed for connecting two computers to each other. By contrast, most Ethernet cables are designed to connect one computer to a router or switch.
The crossover cable can be used to connect
·         Switch to switch
·         Hub to hub
·         Hub to switch
·         Router direct to host



Rolled Cable

Although rolled cable isn’t used to connect any Ethernet connections together, you can use a rolled Ethernet cable to connect a host to a router console serial communication (com) port.

          If you have a cisco router or switch, you would use this cable to connect your PC running Hyper Terminal to the cisco hardware. Eight wires are used in this cable to connect serial devices, although not all eight are used to send information, just as in Ethernet networking.
 
 

Wireless Network


WIRELESS NETWORK

Wireless network refers to any type of computer network that is not connected by cables of any kind. It is a method by which homes, telecommunications networks and enterprise (business) installations avoid the costly process of introducing cables into a building, or as a connection between various equipment locations. Wireless network uses radio frequencies to transmit data through the air. This means that if you have a laptop user who wishes to be mobile within the office, you can allow her to access the network through a wireless access point as long as she has a wireless network card in her laptop.
There are two types of wireless networks you can create: an ad hoc mode wireless network or an infrastructure mode wireless network. Each of these is known as a wireless mode, and each has its advantages.
 With ad hoc mode the wireless device, such as a laptop, is connected to other wireless devices in a peer-to-peer environment without the need for a wireless access point. With infrastructure mode, the wireless clients are connected to a central device, known as a wireless access point. The wireless client sends data to the access point, which then sends the data on to the destination, as mentioned previously; the wireless client can access network resources on the wired network once connected to the access point because the access point has a connection to the wired network.           
The advantage of ad hoc mode is that you don’t need to purchase the access point, but the benefit of infrastructure mode is that when you use the wireless access point you get to control that can connect to the wireless network and filter out types of network traffic. For example, if you use a wireless access point to allow wireless clients to connect to the Internet, you can control which web sites the users can connect to. This type of centralized control makes infrastructure mode extremely popular.

Network Security Threat


NETWORK SECURITY THREAT

WHAT IS NETWORK SECURITY

Network security refers to any activities designed to protect your network. Specifically, these activities protect the usability, reliability, integrity, and safety of your network and data. Effective network security targets a variety of threats and stops them from entering or spreading on your network. Networks are subject to attacks from malicious sources. Attacks can be from two categories: "Passive" when a network intruder intercepts data traveling through the network, and "Active" in which an intruder initiates commands to disrupt the network's normal operation.
Understanding Attack Types
Due to the complexity of software and networks today, most systems and applications are susceptible to a number of different types of security attacks. Understanding the different types of attacks and methods that hackers are using to compromise systems is essential to understanding how to secure your environment. This section will introduce you to a number of different types of attacks.

There are two major types of attacks:

·         Social engineering attacks

·         Network attacks

 Social Engineering
With a social engineering attack, the attacker compromises the network or system through social interaction with an individual, through an e-mail message or phone call, and tricks the individual into divulging information that can be used to compromise security. The information that the victim divulges to the hacker would most likely be used in a subsequent attack to gain unauthorized access to a system or network. The key to protecting yourself and fellow employees from social engineering attacks is education! Keeping all personnel aware of the popularity of social engineering attacks and the different scenarios that could be examples of social engineering attacks will help raise the security level of the organization. There are a number of different examples of social engineering attacks.

 

The following are some of the most popular scenarios:

·         Hacker impersonates administrator in this example, the hacker may call the employee and impersonate the network administrator. The hacker will try to convince the employee to change their password or divulge password information.

·         Hacker impersonates user In this example, the hacker calls an unsuspecting network administrator and plays the role of a frustrated user who cannot log on to the network. The network administrator naturally helps the “user” by resetting the password and helping them log on—problem being it is actually the hacker!

·         Hacker impersonates vendor In this example, the hacker may e-mail a customer pretending to be the vendor of a piece of software. In this example, the hacker tries to get the user to install an update, but the user doesn’t realize the update is really a Trojan virus that gives the hacker access to the system.

Phishing Attack
A very popular type of attack today is what is known as a phishing attack! A phishing attack is when the hacker creates a fake web site that looks exactly like a popular site such as the bank or eBay. The phishing part of the attack is that the hacker then sends an e-mail message trying to trick the user into clicking a link that leads to the fake site. When the user attempts to log on with their account information, the hacker records the username and password and then tries that information on the real site.

 Network-Based Attacks
Most types of attacks are considered network-based attacks where the hacker performs the attack from a remote system. There are a number of different types of network attacks:

·         Eavesdropping attack this widely used type of attack typically involves the use of network monitoring tools to analyze and read communications on the network.

·         Spoof attack in a spoof attack, the hacker modifies the source address of the packets he or she is sending so that they appear to be coming from someone else. This may be an attempt to bypass your firewall rules.

·         Hijack attack in a hijack attack, a hacker takes over a session between you and another individual and disconnects the other individual from the communication. You still believe that you are talking to the original party and may send private information to the hacker unintentionally.

·         Denial of service a denial of service (DOS) is a type of attack that causes the system or its services to crash. As a result, the system cannot perform its purpose and provide those services.

·         Distributed denial of service (DDOS) The hacker uses multiple systems to attack a single target system. A good example is the SMURF attack, in which the hacker pings a number of computers but modifies the source address of those packets so that they appear to come from another system (the victim in this case). When all of these systems receive the ping request, all systems will reply to the same address, essentially overburdening that system with data.

·         Buffer overflow a buffer overflow attack is when the attacker sends more data to an application than is expected. A buffer overflow attack usually results in the attacker gaining administrative access to the system in a command prompt or shell.

·         Exploit attack in this type of attack, the attacker knows of a security problem within an operating system or a piece of software and leverages that knowledge by exploiting the vulnerability.

·         Password attack an attacker tries to crack the passwords stored in a network account database or a password-protected file. There are three major types of password attacks: a dictionary attack, a brute-force attack, and a hybrid attack. A dictionary attack uses a word list file, which is a list of potential passwords. A brute-force attack is when the attacker tries every possible combination of characters. With brute force a file is not read. A hybrid attack is similar to a dictionary attack in that it uses a word list file, but it also places numbers at the end of the word to catch passwords that are not dictionary words because the user placed a number at the end. For example, a dictionary attack would not find the password “pass1,” but a hybrid attack would.

Certification

Switch


NETWORK SWITCH

Definition: A network switch is a computer networking device that links network segments or network devices together in a local area network (LAN). Technically, network switches operate at layer two (Data Link Layer) of the OSI model.  Network switches appear nearly identical to network hubs, but a switch generally contains more intelligence (and a slightly higher price tag) than a hub.

Switches aren’t used to create internetworks (they do not break up broadcast domains by default); they’re employed to add functionality to a network LAN. The main purpose of a switch is to make a LAN work better – to optimize its performance – providing more bandwidth for the LAN’s users. And switches don’t forward packets to other networks as routers do. Instead, they only “switch” frames from one port to another within the switched network.

    By default, switches break up collision domains. This is an Ethernet term used to describe a network scenario wherein one particular device sends a packet on a network segment, forcing every other device on that same segment to pay attention to it. At the same time, a different device tries to transmit, leading to a collision, after which both devices must retransmit, one at a time. Not very efficient! This situation is typically found in a hub environment where each host segment connects to a hub that represents only one collision domain and only one broadcast domain. By contrast, each and every port on a switch represents its own collision domain.

Advantages of a Switched Network

Switched networks have virtually replaced hub-based networks due to their ability to provide all of the bandwidth available on the wire by eliminating collisions. This advantage of switched networks played a large role in the battle between Ethernet and Token Ring technologies in the last decade of the twentieth century.



LAN switches significantly reduce, or even eliminate, the number of collisions on a LAN. Unlike hubs, switches do not create a single shared bus. Instead, switches do the following:

  • Switches interpret the bits in the received frame so that they can typically send the frame out to the one required port, rather than all other ports.
  • If a switch needs to forward multiple frames out the same port, the switch buffers the frames in memory, sending one at a time, thereby avoiding collisions

·         Devices connected to one switch port do not share their bandwidth with devices connected to another switch port. Each has its own separate bandwidth, meaning that a switch with 100 Mbps ports has 100 Mbps of bandwidth per port.

·         MAC filtering and other types of "port security" features which prevent MAC flooding. MAC Filtering refers to a security access control method whereby the 48-bit address assigned to each network card is used to determine access to the network. MAC addresses are uniquely assigned to each card, so using MAC filtering on a network permits and denies network access to specific devices through the use of blacklists and whitelists.

·         Switch increases the available network bandwidth.

·         It reduces workload on individual computers.

·         Increased network performance.

 

 
Related Posts Plugin for WordPress, Blogger...