NT2580

Introduction to Information Security

Unit 8 (August 4, 2016)
Networks and Communications and their Inherent Weaknesses

Learning Objective
  • Analyze the importance of network principles and architecture to security operations.
Key Concepts
  • OSI network model and its security lapses
  • Physical and logical network topologies
  • Characteristics of a secure network
  • 802.11 WLAN technology weaknesses, vulnerabilities, and mitigation strategies
  • Internet Protocol version 4 (IPv4) and Internet Protocol version 6 (IPv6) and their use in IT infrastructures for secure communications 
Reading
  • Kim and Solomon, Chapter 10: Networks & Communications.
Keywords
  • DoS
  • Encapsulation
  • Flooding
  • Hijacking
  • Sniffing
  • Spoofing
  • Service Set Identifier (SSID)
  • OSI Reference Model
  • WLAN
Assignments and Study Materials
  • Unit 8 Lecture Slides
  • Lab 8.1: Performing a Web site and Database Attack by Exploiting Identified Vulnerabilities
  • Assignment 8.2: Network Hardening
  • Assignment 8.3: Network Security Applications and Countermeasures
  • In-Class Exercise: Kali Linux and WEP Hacking
Questions and Feedback
Use the form below to ask questions or provide feedback about the concepts covered during Unit 8's session of class:

Your browser is out-of-date!

You need to update your browser to view Foliotek correctly. Update my browser now

×