NT2580
Introduction to Information Security
Unit 8 (August 4, 2016)
Networks and Communications and their Inherent Weaknesses
Learning Objective
- Analyze the importance of network principles and architecture to security operations.
Key Concepts
- OSI network model and its security lapses
- Physical and logical network topologies
- Characteristics of a secure network
- 802.11 WLAN technology weaknesses, vulnerabilities, and mitigation strategies
- Internet Protocol version 4 (IPv4) and Internet Protocol version 6 (IPv6) and their use in IT infrastructures for secure communications
Reading
- Kim and Solomon, Chapter 10: Networks & Communications.
Keywords
- DoS
- Encapsulation
- Flooding
- Hijacking
- Sniffing
- Spoofing
- Service Set Identifier (SSID)
- OSI Reference Model
- WLAN
Assignments and Study Materials
- Unit 8 Lecture Slides
- Lab 8.1: Performing a Web site and Database Attack by Exploiting Identified Vulnerabilities
- Assignment 8.2: Network Hardening
- Assignment 8.3: Network Security Applications and Countermeasures
- In-Class Exercise: Kali Linux and WEP Hacking
Questions and Feedback
Use the form below to ask questions or provide feedback about the concepts covered during Unit 8's session of class: