Section 9.1: Introduction to Network Security
Learning Objectives
After completing this section, you should be able to
- identify security risks in computer networks;
- Â implement certain techniques to secure a computer network.
Tasks
- Study Chapter 11 of the TD textbook to find answers to the study questions.
- If possible, do the hands-on Project 11-1.
- Complete Case Project 11-1, 11-2, and 11-3.
Study Questions
You may want to use the Personal Study Space wiki to answer these questions, which may require some Internet research. You can also post comments and queries in the Unit 9 Forum.
- What are hackers and crackers? What are the differences between the two?
- What is root?
- What is a firewall?
- What should be done in a security audit?
- What network security risks are associated with people?
- What network security risks are associated with hardware and network design?
- What network security risks are associated with protocols and software?
- What network security risks are associated with Internet access?
- What is an IP spoofing attack?
- What is a flashing attack?
- What is a denial-of-service attack?
- How are risks associated with people addressed?
- How is an effective security policy developed?
- What are the typical goals for security policies?
- What should be included in a security policy?
- What policy should be made for response to security breaches?
- How are secure passwords created?
- How are passwords kept secure?
- How should administrators physically secure an enterprise computer network?
- How are risks associated with hardware and network design addressed?
- What does a packet-filtering firewall do?
- What does a screening firewall do?
- How are firewalls used to secure an enterprise computer network?
- What roles does a proxy server play?
- What security feature should be sought in a remote control program?
- What security features should be provided by a secure remote access server package for dial-up networking?
- How are risks associated with protocols and software addressed?
- What restrictions may be imposed on users’ access to network resources in order to secure an enterprise network?
- What is encryption?
- What roles can encryption play in network security?
- What should be ensured by encryption?
- What is a key in the context of encryption?
- What is cipher text?
- What is private key encryption or symmetric encryption?
- What is public key encryption or asymmetric encryption?
- What is a digital certificate?
- What roles do digital certificates play in network security?
- What is the essence of the Kerberos authentication protocol?
- What is the essence of the PGP system? For what purpose might you choose to use PGP?
- What is secure socket layer (SSL)?
- How does SSL work to secure a network?
- What is TLS? How is it used for network security?
- What is the essence of the IPSec protocol?
- What is key management and key exchange?
- What are VPNs?
- How methods may be taken to secure VPNs?
- What is the essence of the Point-to-Point Tunneling Protocol (PPTP)?
- What is tunneling?
- What is the essence of Layer 2 forwarding (L2F) and Layer 2 tunneling protocol (L2TP), respectively?