Network Protocol Attacks & Defenses
Week 1: Network Fundamentals & Attacks
Introduction to AS & BGP
The internet consists of autonomous systems (AS) which function like a cloud of routers that can intercommunicate using the BGP protocol (which seems like an internal routing table within routers, with inter-router communication over 179/tcp). This is related to the concept of gateways.
Attacks on BGP
A good high-level overview of BGP.
BGP Vulnerabilities
- BGP hijacking either by advertising smaller, more-specific subnets or faster
Characters in A Man of the People
Elsie
Elsie is an uninhibited young woman who is a friend of Odili’s. The two of them have a sexual relationship, but she is engaged to another man, and Odili doesn’t regard their relationship as serious, although he is terribly offended when she sleeps with Chief Nanga.
After this happens, Odili is angry. Odili discusses Chief Nanga’s ability to manipulate others into getting him out of any compromising situation. As the narrator watches Chief Nanga argue with journalists and public figures,
Read MoreEssential Network Ports and OSI Model Layers
When a Web client receives an IP address of a Web server, the client browser uses the IP address and port 80 to request Web services. This request is sent to the server using the Hypertext Transfer Protocol (HTTP). The FTP server allows a client to exchange files between devices and manage files remotely, sending management commands to start applications. FTP sessions are sent to the server using destination port 21 (data FTP 20). After opening the session, the server will use port 20 to transfer
Read MoreUnderstanding IP Addresses: Types, Classes, and Configuration
Understanding IP Addresses
An IP address is a series of 32 binary bits (ones and zeros). In a byte, the rightmost bit has a value of 1, and the values of the remaining bits from right to left are 2, 4, 8, 16, 32, 64, and 128. The first part identifies the network, and the second part identifies a host on that network. Both parts are necessary in an IP address. For example, the first three octets (192.168.1.8) identify the network portion of the address, and the last octet (57) identifies the host.
Read MoreEssential Networking Protocols and Concepts Explained
Chapter 3: Networking Essentials
Home Network Properties
A small home network interconnects three computers for gaming and file sharing. Which two properties represent this type of network?
- It is difficult to implement security.
- A computer responds to a file-sharing application running as a server.
MTA Role in Email Handling
Which three statements are correct regarding the role of the MTA (Mail Transfer Agent) in handling email?
- Receives email from the client MUA (Mail User Agent).
- Transfers the email to
Network Management, Cryptography, and Client-Server Architecture
Network Management Functional Areas
Network management maximizes efficiency and productivity in a data network transparently to users. It performs various management tasks:
- Fault Management: Locating and correcting network problems and failures, including configuration adjustments.
- Configuration Management: Identifying and configuring critical devices, requiring an inventory to track updates.
- Security Management: Controlling access to information and data.
- Network Performance Management: Measuring the