Lecture 21: Internet Security Intro to IT COSC1078 Introduction to Information Technology Lecture 21...
-
date post
20-Dec-2015 -
Category
Documents
-
view
217 -
download
0
Transcript of Lecture 21: Internet Security Intro to IT COSC1078 Introduction to Information Technology Lecture 21...
![Page 1: Lecture 21: Internet Security Intro to IT COSC1078 Introduction to Information Technology Lecture 21 Internet Security James Harland james.harland@rmit.edu.au.](https://reader036.fdocuments.net/reader036/viewer/2022062516/56649d535503460f94a2f80a/html5/thumbnails/1.jpg)
Lecture 21: Internet Security Intro to IT
COSC1078 Introduction to Information Technology
Lecture 21
Internet SecurityJames Harland
![Page 2: Lecture 21: Internet Security Intro to IT COSC1078 Introduction to Information Technology Lecture 21 Internet Security James Harland james.harland@rmit.edu.au.](https://reader036.fdocuments.net/reader036/viewer/2022062516/56649d535503460f94a2f80a/html5/thumbnails/2.jpg)
Lecture 21: Internet Security Intro to IT
Introduction to IT
1-4 Introduction, Images, Audio, Video
5-6 Computer Fundamentals Assignment 1, WebLearn Test 1
7 Review
8 Operating Systems WebLearn Test 2
9 Operating Systems Assignment 2
10 Internet
11 Internet & Security WebLearn Test 3
12 Future of IT Assignment 3, Peer and Self Assessment
![Page 3: Lecture 21: Internet Security Intro to IT COSC1078 Introduction to Information Technology Lecture 21 Internet Security James Harland james.harland@rmit.edu.au.](https://reader036.fdocuments.net/reader036/viewer/2022062516/56649d535503460f94a2f80a/html5/thumbnails/3.jpg)
Lecture 21: Internet Security Intro to IT
Intro to IT Schedule
Week Lecture 1 Lecture 2
11 Internet Protocols Internet Security
12 Future of IT Review by request or more Future of IT
13 Mock Exam Wednesday 2nd June
![Page 4: Lecture 21: Internet Security Intro to IT COSC1078 Introduction to Information Technology Lecture 21 Internet Security James Harland james.harland@rmit.edu.au.](https://reader036.fdocuments.net/reader036/viewer/2022062516/56649d535503460f94a2f80a/html5/thumbnails/4.jpg)
Lecture 21: Internet Security Intro to IT
Overview
Questions?
Mock Exam
Assignment 3
Internet Security
Questions?
![Page 5: Lecture 21: Internet Security Intro to IT COSC1078 Introduction to Information Technology Lecture 21 Internet Security James Harland james.harland@rmit.edu.au.](https://reader036.fdocuments.net/reader036/viewer/2022062516/56649d535503460f94a2f80a/html5/thumbnails/5.jpg)
Lecture 21: Internet Security Intro to IT
Mock Exam
10.00-12.30 (TBC) on Wednesday 2rd June in 10.13.03 Bring your own paper, pens, etc. No calculators allowed Answers will be available from me when you leave
Schedule (times to be confirmed):
10.00 Access to room 10.15 Reading time commences 10.30 Writing time commences 12.30 Exam concludes
![Page 6: Lecture 21: Internet Security Intro to IT COSC1078 Introduction to Information Technology Lecture 21 Internet Security James Harland james.harland@rmit.edu.au.](https://reader036.fdocuments.net/reader036/viewer/2022062516/56649d535503460f94a2f80a/html5/thumbnails/6.jpg)
Lecture 21: Internet Security Intro to IT
Assignment 3
Review
(re-) answer What is IT? questions from Tutorial 1
Identify difficult parts of the course
Suggest new questions
Include favourites from Assignments 1 and 2
Reflect
Answer reflection questions from tutorials
Research
Write about a particular IT topic of your choice
(5-6 paragraphs)
![Page 7: Lecture 21: Internet Security Intro to IT COSC1078 Introduction to Information Technology Lecture 21 Internet Security James Harland james.harland@rmit.edu.au.](https://reader036.fdocuments.net/reader036/viewer/2022062516/56649d535503460f94a2f80a/html5/thumbnails/7.jpg)
Lecture 19: Internet: Images Intro to IT
InternetLisa?Hi Dad!
Listen!Lisa?Hi Dad! Listen!
![Page 8: Lecture 21: Internet Security Intro to IT COSC1078 Introduction to Information Technology Lecture 21 Internet Security James Harland james.harland@rmit.edu.au.](https://reader036.fdocuments.net/reader036/viewer/2022062516/56649d535503460f94a2f80a/html5/thumbnails/8.jpg)
Lecture 21: Internet Security Intro to IT
Internet Structure
Application Application
Transport Transport
Network
Link
Network
Link
Mordor sucks!
2 dor1 Mor3 suc 4 ks!
1 2 3 49 5 6 2
14
3
22
1
3
4
2 3 1 49 5 6 2
2 dor1 Mor3 suc 4 ks!
Mordor sucks!
![Page 9: Lecture 21: Internet Security Intro to IT COSC1078 Introduction to Information Technology Lecture 21 Internet Security James Harland james.harland@rmit.edu.au.](https://reader036.fdocuments.net/reader036/viewer/2022062516/56649d535503460f94a2f80a/html5/thumbnails/9.jpg)
Lecture 21: Internet Security Intro to IT
Internet Structure
1 Mor
1
6
6
![Page 10: Lecture 21: Internet Security Intro to IT COSC1078 Introduction to Information Technology Lecture 21 Internet Security James Harland james.harland@rmit.edu.au.](https://reader036.fdocuments.net/reader036/viewer/2022062516/56649d535503460f94a2f80a/html5/thumbnails/10.jpg)
Lecture 21: Internet Security Intro to IT
Network Layer (Internet Protocol) Real intelligence is in the network layer
Adds next destination to packet
Not complete list of addresses
Sends to next destination
Retrieves final destination packets for this node
Passes them to the transport layer
Routing tables can be updated when disconnections occur
Hop counts used to stop endless looping
![Page 11: Lecture 21: Internet Security Intro to IT COSC1078 Introduction to Information Technology Lecture 21 Internet Security James Harland james.harland@rmit.edu.au.](https://reader036.fdocuments.net/reader036/viewer/2022062516/56649d535503460f94a2f80a/html5/thumbnails/11.jpg)
![Page 12: Lecture 21: Internet Security Intro to IT COSC1078 Introduction to Information Technology Lecture 21 Internet Security James Harland james.harland@rmit.edu.au.](https://reader036.fdocuments.net/reader036/viewer/2022062516/56649d535503460f94a2f80a/html5/thumbnails/12.jpg)
Lecture 21: Internet Security Intro to IT
Transport layer
Transmission Control Protocol (TCP) often used
User Datagram Protocol (UDP) becoming more common
TCP
Establishes connection first
Send and wait for acknowledgement
Reliable
Can adjust flow control to avoid congestion
Often best for email (which is not real-time)
Older
![Page 13: Lecture 21: Internet Security Intro to IT COSC1078 Introduction to Information Technology Lecture 21 Internet Security James Harland james.harland@rmit.edu.au.](https://reader036.fdocuments.net/reader036/viewer/2022062516/56649d535503460f94a2f80a/html5/thumbnails/13.jpg)
Lecture 21: Internet Security Intro to IT
Transport layer
UDP
Doesn’t establish connection
Just sends and forget
Efficient
No congestion adjustment
Works well for DNS lookup
Often used for Voice over Internet Protocol (VoIP) applications such as Skype
![Page 14: Lecture 21: Internet Security Intro to IT COSC1078 Introduction to Information Technology Lecture 21 Internet Security James Harland james.harland@rmit.edu.au.](https://reader036.fdocuments.net/reader036/viewer/2022062516/56649d535503460f94a2f80a/html5/thumbnails/14.jpg)
Lecture 21: Internet Security Intro to IT
Internet addresses
Unique 32-bit identifier (up to 4,294,967,296)
Soon to become 128-bit identifier
Managed by Internet Corporation for Assigned Names and Numbers (ICANN)
ISPs get “blocks” of addresses
32-bit string represented as N1.N2.N3.N4 where Ni
is in the range 0..255
17.12.25.0 means
00010001 00001100 00011001 00000000
![Page 15: Lecture 21: Internet Security Intro to IT COSC1078 Introduction to Information Technology Lecture 21 Internet Security James Harland james.harland@rmit.edu.au.](https://reader036.fdocuments.net/reader036/viewer/2022062516/56649d535503460f94a2f80a/html5/thumbnails/15.jpg)
Lecture 21: Internet Security Intro to IT
Internet addresses
Dotted decimal notation is still not very kind to humans …
www.sludgefacethemovie.com -> ??.??.??.??
Translation done by name servers which look up the Domain Name System (DNS)
Domains such as rmit.edu.au can be structured by the domain owner (eg goanna.cs.rmit.edu.au)
![Page 16: Lecture 21: Internet Security Intro to IT COSC1078 Introduction to Information Technology Lecture 21 Internet Security James Harland james.harland@rmit.edu.au.](https://reader036.fdocuments.net/reader036/viewer/2022062516/56649d535503460f94a2f80a/html5/thumbnails/16.jpg)
Lecture 21: Internet Security Intro to IT
Internet Security
pass wordpatch spa
mfire wall
virus war drivingkey logge
r
proxy worm
phishing
Trojan horse
![Page 17: Lecture 21: Internet Security Intro to IT COSC1078 Introduction to Information Technology Lecture 21 Internet Security James Harland james.harland@rmit.edu.au.](https://reader036.fdocuments.net/reader036/viewer/2022062516/56649d535503460f94a2f80a/html5/thumbnails/17.jpg)
Security vs access
It is always a trade-off (a balance between two competing forces)
More security means less access
More access means less security
Redundancy can be either fatal or vital
Nothing is perfect!
![Page 18: Lecture 21: Internet Security Intro to IT COSC1078 Introduction to Information Technology Lecture 21 Internet Security James Harland james.harland@rmit.edu.au.](https://reader036.fdocuments.net/reader036/viewer/2022062516/56649d535503460f94a2f80a/html5/thumbnails/18.jpg)
Freedom vs security `Everything which is not forbidden is allowed’
-- Principle of English Law `Everything which is not allowed is forbidden’
-- Common security principle
`Anything not mandatory is forbidden’
-- “military policy” `Anything not forbidden is compulsory’ (??)
— T.H. White (The Once and Future King)
![Page 19: Lecture 21: Internet Security Intro to IT COSC1078 Introduction to Information Technology Lecture 21 Internet Security James Harland james.harland@rmit.edu.au.](https://reader036.fdocuments.net/reader036/viewer/2022062516/56649d535503460f94a2f80a/html5/thumbnails/19.jpg)
Lecture 21: Internet Security Intro to IT
Conclusion
Work on Assignment 3
Check whether your security defenses are up to date