The Three Types of Addresses Used on the Internet Is

5
1. The three types of addresses used on the internet is; 1. E-mail addresses 2. Web site URL addresses 3. Internet protocol (IP) addresses of individual computers attached to a network. 2. Every email user on the Internet has a unique e-mail address that identifies an electronic post office box on a network where e-mail can be sent. Different types of networks have different formats for e-mail addresses. On the Internet, all e-mail addresses have a similar form. All addresses must have a user name and a domain. For example, an email address at Unikl might look like this: [email protected] . The first part of the address <itccmail> is also known as the user name. This is the unique name recognized by the mail server. The @ symbol separates the unique user name from the domain. The domain in this case is stedwards.edu. The domain name may also be broken down into parts. Understanding the parts of the domain name is helpful in deciphering the origin of an email address. The last part of the address, <edu>, is the top-level domain (TLD) in the hierarchical Domain Name System. Examples of top-level domains include: gov - Government agencies edu - Educational institutions org - Organizations (nonprofit) mil - Military

Transcript of The Three Types of Addresses Used on the Internet Is

Page 1: The Three Types of Addresses Used on the Internet Is

1. The three types of addresses used on the internet is;

1. E-mail addresses

2. Web site URL addresses

3. Internet protocol (IP) addresses of individual computers attached to a network.

2. Every email user on the Internet has a unique e-mail address that identifies an electronic post

office box on a network where e-mail can be sent. Different types of networks have different

formats for e-mail addresses. On the Internet, all e-mail addresses have a similar form. All

addresses must have a user name and a domain. For example, an email address at Unikl

might look like this: [email protected]. The first part of the address <itccmail> is also

known as the user name. This is the unique name recognized by the mail server. The @

symbol separates the unique user name from the domain. The domain in this case is

stedwards.edu. The domain name may also be broken down into parts. Understanding the

parts of the domain name is helpful in deciphering the origin of an email address. The last

part of the address, <edu>, is the top-level domain (TLD) in the hierarchical Domain Name

System. Examples of top-level domains include:

gov - Government agencies

edu - Educational institutions

org - Organizations (nonprofit)

mil - Military

com - Commercial business

net - Network organizations

3. The World Wide Web (WWW) is a subset of the Net--a collection of interlinked documents

that work together using a specific Internet protocol called Hypertext Transfer Protocol

(HTTP). In other words, the Internet exists independent of the Web, but the Web can't exist

without the Internet. Web pages are written in Hypertext Markup Language (HTML), which

tells the Web browser what to display. The significant feature of the Web is its ability to link

pages to one another. Just click a link, and you're at a Web site on the other side of the world.

Page 2: The Three Types of Addresses Used on the Internet Is

4. IP spoofing refers to connection hijacking through a fake Internet Protocol (IP) address. IP

spoofing is the action of masking a computer IP address so that it looks like it is authentic.

During this masking process, the fake IP address sends what appears to be a malevolent

message coupled with an IP address that appears to be authentic and trusted. In IP spoofing,

IP headers are masked through a form of Transmission Control Protocol (TCP) in which

spoolers discover and then manipulate vital information contained in the IP header such as IP

address and source and destination information.

5. There are three parties in smurf attack: the attacker, the intermediary, and the victim. The

intermediary receives an ICMP echo request packet directed to the IP broadcast address of

their network. If the intermediary does not filter ICMP traffic directed to IP broadcast

addresses, many of the machines on the network will receive this ICMP echo request packet

and send an ICMP echo reply packet back. When (potentially) all the machines on a network

respond to this ICMP echo request, the result can be severe network congestion or outages.

When the attackers create these packets, they do not use the IP address of their own machine

as the source address. The victim is subjected to network congestion that could potentially

make the network unusable

6. In response to customer demand for evidence that a Web based business is trustworthy, a

number of trusted third party organizations are offering seals of assurance that businesses can

display on their Web site home pages. To legitimacy bear the seal, the company must show

that it complies with certain business practices, capabilities and controls. 6 seal granting

organizations is Better Business Bureau, TRUSTe, Veri-Sign, Inc, International Computer

Security Association, AICPA/CICA Web Trust, AICPA/CICA SysTrust.

7. A digital certificate is like an electronic identification card that is used in conjunction with a

public key encryption system to verify the authenticity of the message sender. Trusted third

parties known as certification authorities (CAs) issue digital certificate, also call digital IDs.

The digital certificate is actually the sender’s public key that the CA has digitally signed. The

digital certificate is transmitted with the encrypted message to authenticate the sender. The

receiver uses the the CA’s public key to decrypt the sender’s public key which is attached to

Page 3: The Three Types of Addresses Used on the Internet Is

the message and then uses the sender’s public key to decrypt the actual message. A digital

signature is used to verify a message. It is basically an encrypted hash of the message. The

recipient can check if the message was tampered with by hashing the received message and

comparing this value with the decrypted signature. To decrypt the signature, the

corresponding public key is required. A digital certificate is used to bind public keys to

persons or other entities if there were no certificates, the signature could be easily be forged,

as the recipient could not check if the public key belongs to the sender. The certificate itself

is signed by a trusted third party, a Certificate Authority like VeriSign.

8. Distinguish between a network-level firewall and an application- level firewall.

Network level firewall Application level firewall

Provides basic screening of low security message and routes them to their destinations based on the source and destination addresses attached. Example e-mail.

Network firewalls are typically used when speed is essential. Since packets are not passed to the application layer and the contents of the packet are not being analyzed, packets can be processed quicker

Network level firewalls run on an access control list and do not provide the same high level of protection that application firewalls do, since they cannot monitor the contents of packets.

Provides high level network security. These firewall are configured to run security applications called proxies that perform sophisticated functions such as verifying user authentications

They view information as a data stream and not as a series of packets. In this way, they are able to scan information being passed over them and to ensure that the information is acceptable, based on its own set of rules

Support the ability to report to intrusion detection software. This allows third party software to take control of an intrusive situation and perform tasks above the capabilities of the firewall itself. This is useful if you want to monitor a hacker once they get inside instead of just blocking them or have the system send a page when an intrusion is detected

9. Two types of risk associated with internet commerce are intranet risk and internet risk. Intranet risk contains the interception of network messages, access to corporate database, privileged employees and reluctance to prosecute. Meanwhile the internet risk contains of risk to costumers and risk to business.