Network Protocol Attacks & Defenses

Week 1: Network Fundamentals & Attacks

Introduction to AS & BGP

The internet consists of autonomous systems (AS) which function like a cloud of routers that can intercommunicate using the BGP protocol (which seems like an internal routing table within routers, with inter-router communication over 179/tcp). This is related to the concept of gateways.

Attacks on BGP

A good high-level overview of BGP.

BGP Vulnerabilities

  • BGP hijacking either by advertising smaller, more-specific subnets or faster
Read More

Characters in A Man of the People

Elsie

Elsie is an uninhibited young woman who is a friend of Odili’s. The two of them have a sexual relationship, but she is engaged to another man, and Odili doesn’t regard their relationship as serious, although he is terribly offended when she sleeps with Chief Nanga.

After this happens, Odili is angry. Odili discusses Chief Nanga’s ability to manipulate others into getting him out of any compromising situation. As the narrator watches Chief Nanga argue with journalists and public figures,

Read More

Essential Network Ports and OSI Model Layers

When a Web client receives an IP address of a Web server, the client browser uses the IP address and port 80 to request Web services. This request is sent to the server using the Hypertext Transfer Protocol (HTTP). The FTP server allows a client to exchange files between devices and manage files remotely, sending management commands to start applications. FTP sessions are sent to the server using destination port 21 (data FTP 20). After opening the session, the server will use port 20 to transfer

Read More

Understanding IP Addresses: Types, Classes, and Configuration

Understanding IP Addresses

An IP address is a series of 32 binary bits (ones and zeros). In a byte, the rightmost bit has a value of 1, and the values of the remaining bits from right to left are 2, 4, 8, 16, 32, 64, and 128. The first part identifies the network, and the second part identifies a host on that network. Both parts are necessary in an IP address. For example, the first three octets (192.168.1.8) identify the network portion of the address, and the last octet (57) identifies the host.

Read More

Essential Networking Protocols and Concepts Explained

Chapter 3: Networking Essentials

  1. Home Network Properties

    A small home network interconnects three computers for gaming and file sharing. Which two properties represent this type of network?

    • It is difficult to implement security.
    • A computer responds to a file-sharing application running as a server.
  2. MTA Role in Email Handling

    Which three statements are correct regarding the role of the MTA (Mail Transfer Agent) in handling email?

    • Receives email from the client MUA (Mail User Agent).
    • Transfers the email to
Read More

Network Management, Cryptography, and Client-Server Architecture

Network Management Functional Areas

Network management maximizes efficiency and productivity in a data network transparently to users. It performs various management tasks:

  • Fault Management: Locating and correcting network problems and failures, including configuration adjustments.
  • Configuration Management: Identifying and configuring critical devices, requiring an inventory to track updates.
  • Security Management: Controlling access to information and data.
  • Network Performance Management: Measuring the
Read More