CYB6000 Wilmington University Network Security Laboratory Activity Laboratory #1: Understanding the Environment and Appreciating the Field of Network Secur

CYB6000 Wilmington University Network Security Laboratory Activity Laboratory #1: Understanding the Environment and Appreciating the Field of Network Security

Goal: To make students understand the environment and appreciate the field of network security.

Don't use plagiarized sources. Get Your Custom Essay on
CYB6000 Wilmington University Network Security Laboratory Activity Laboratory #1: Understanding the Environment and Appreciating the Field of Network Secur
Just from $13/Page
Order Essay

Duration: 1 Week

Deliverables: 5 double spaced page

Nature: Exploratory

Study the computer and network vulnerabilities and exploits (See Kizza Chapters 3 and 4). Write a comparative discussion paper of 10 such exploits and/or vulnerabilities.

Pay attention to the following:

Routing algorithm vulnerabilities: route and sequence number spoofing, instability and resonance effects
TCP/UDP vulnerabilities
ICMP redirect hazard: denial of service
ARP hazard: phantom sources, ARP explosions and slow links
Fragmentation vulnerabilities and remedies: (ICMP Echo overrun) Computer Communications and Networks
Joseph Migga Kizza
Guide to
Computer
Network
Security
Third Edition
Computer Communications and Networks
The Computer Communications and Networks series is a range of textbooks,
monographs and handbooks. It sets out to provide students, researchers, and nonspecialists alike with a sure grounding in current knowledge, together with
comprehensible access to the latest developments in computer communications and
networking.
Emphasis is placed on clear and explanatory styles that support a tutorial approach,
so that even the most complex of topics is presented in a lucid and intelligible
manner.
More information about this series at http://www.springer.com/series/4198
Joseph Migga Kizza
Guide to Computer
Network Security
Third Edition
Joseph Migga Kizza
Department of Computer Science
University of Tennessee
Chattanooga, TN, USA
Series Editor
A.J. Sammes
Centre for Forensic Computing
Cranfield University, Shrivenham campus
Swindon, UK
ISSN 1617-7975
Computer Communications and Networks
ISBN 978-1-4471-6653-5
ISBN 978-1-4471-6654-2
DOI 10.1007/978-1-4471-6654-2
(eBook)
Library of Congress Control Number: 2014959827
Springer London Heidelberg New York Dordrecht
© Springer-Verlag London 2009, 2013, 2015
This work is subject to copyright. All rights are reserved by the Publisher, whether the whole or part of
the material is concerned, specifically the rights of translation, reprinting, reuse of illustrations, recitation,
broadcasting, reproduction on microfilms or in any other physical way, and transmission or information
storage and retrieval, electronic adaptation, computer software, or by similar or dissimilar methodology
now known or hereafter developed.
The use of general descriptive names, registered names, trademarks, service marks, etc. in this publication
does not imply, even in the absence of a specific statement, that such names are exempt from the relevant
protective laws and regulations and therefore free for general use.
The publisher, the authors and the editors are safe to assume that the advice and information in this book
are believed to be true and accurate at the date of publication. Neither the publisher nor the authors or the
editors give a warranty, express or implied, with respect to the material contained herein or for any errors
or omissions that may have been made.
Printed on acid-free paper
Springer-Verlag London Ltd. is part of Springer Science+Business Media (www.springer.com)
Preface to Third Edition
The second edition of this book came out barely 2 years ago and we are again in
need of a new and improved third edition. This rapid turnaround of editions of a
successful book like this is indicative of the rapidly changing technology landscape.
To keep a promise we made to our readers in the first edition of keeping the book
materials as up to date as possible, we have now embarked on this third edition.
First, recall that in the second edition, we introduced to the reader the concept of a
changing traditional Computer Network as we knew it when the first edition of this
book came out. That network with a nicely “demarcated” and heavily defended
perimeter wall and well guarded access points has been going into a transformation
as a result of new technologies. Changes have occurred, as we pointed out in the
second edition, within and outside the network we call the “traditional computer
network”, at the server and most importantly at the boundaries. A virtualized and
elastic network with rapid extensions at will is taking its place to meet the growing
needs of users. The new technologies driving this change, for now, are system
resource virtualization, the evolving cloud computing models and a growing and
unpredictable mobile computing technology creating platforms that demand new
extensions, on the fly and at will, to the traditional computer network. Secondly, the
rapidly merging computing and telecommunication technologies, we started discussing in the first and through the second editions, are rapidly destroying the traditional computer network as mobile and home devices are slowly becoming part of
the enterprise and at the same time remaining in their traditional public commons,
thus creating unpredictable and un-defendable enterprise and home networks. When
you think of a small mobile device now able to connect to a private enterprise network under the BYOD policies and the same device is able to be used as a home
network device and at the same time remains connected to networks in public commons, you start to get an image of the “anywhere and everywhere” computing network, a global sprawl of networks within networks and indeed networks on demand.
The ubiquitous nature of these new computing networks is creating new and
uncharted territories with security nightmares. What is more worrying is that along
with the sprawl, we are getting all types of characters joining amass in the new but
rapidly changing technological “ecosystem”, for lack of a better word.
For these reasons, we need to remain vigilant with better, if not advanced, computer and information security protocols and best practices because the frequency of
v
vi
Preface to Third Edition
computing and mobile systems attacks and the vulnerability of these systems will
likely not decline, rather they are likely to increase. More efforts in developing adaptive
and scalable security protocols and best practices and massive awareness, therefore,
are needed to meet this growing challenge and bring the public to a level where they
can be active and safe participants in the brave new worlds of computing.
This guide is a comprehensive volume touching not only on every major topic in
computing and information security and assurance, but also has gone beyond the
security of computer networks as we used to know them, to embrace new and more
agile mobile systems and new online social networks that are interweaving into our
everyday fabric, if not already. We bring into our ongoing discussion on computer
Network security, a broader view of the new wireless and mobile systems and online
social networks. As with previous editions, it is intended to bring massive security
awareness and education to the security realities of our time, a time when billions of
people from the remotest place on earth to the most cosmopolitan world cities are
using the smartest, smallest, and more powerful mobile devices loaded with the
most fascinating and worrisome functionalities ever known to interconnect via a
mesh of elastic computing networks. We highlight security issues and concerns in
these public commons and private bedrooms the globe over.
The volume is venturing into and exposing all sorts of known security problems,
vulnerabilities and the dangers likely to be encountered by the users of these devices.
In its own way, it is a pathfinder as it initiates a conversation towards developing
better algorithms, protocols, and best practices that will enhance security of systems
in the public commons, private and enterprise offices and living rooms and bedrooms where these devices are used. It does this comprehensively in five parts and
25 chapters. Part I gives the reader an understanding of the working and security
situation of the traditional computer networks. Part II builds on this knowledge and
exposes the reader to the prevailing security situation based on a constant security
threat. It surveys several security threats. Part III, the largest, forms the core of the
guide and presents to the reader most of the best practices and solutions that are
currently in use. Part IV goes beyond the traditional computer network as we used
to know it to cover new systems and technologies that have seamlessly and stealthlessy extended the boundaries of the traditional computer network. Systems and
technologies like virtualization, cloud computing and mobile systems are introduced and discussed. A new Part V ventures into the last mile as we look at the new
security quagmire of the home computing environment and the growing home
hotspots. Part VI, the last part, consists of projects.
As usual, in summary, the guide attempts to achieve the following objectives:
• Educate the public about computer security in the traditional computer
network.
• Educate the public about the evolving computing ecosystem created by the eroding boundaries between the enterprise network, the home network and the rapidly growing public-commons-based social networks all extending the
functionalities of the traditional computer network.
Preface to Third Edition
vii
• Alert the public to the magnitude of the vulnerabilities, weaknesses and loopholes inherent in the traditional computer network and now resident in the new
computing ecosystem.
• Bring to the public attention effective security solutions and best practice, expert
opinions on those solutions, and the possibility of ad hoc solutions
• Look at the roles legislation, regulation, and enforcement play in securing the
new computing ecosystem.
• Finally, initiate a debate on developing effective and comprehensive security
algorithms, protocols, and best practices for new computing ecosystem.
Since the guide covers a wide variety of security topics, algorithms, solutions,
and best practices, it is intended to be both a teaching and a reference tool for those
interested in learning about the security of evolving computing ecosystem. Learn
about available techniques to prevent attacks on these systems. The depth and thorough discussion and analysis of most of the security issues of the traditional computer network and the extending technologies and systems, together with the
discussion of security algorithms, and solutions given, make the guide a unique
reference source of ideas for computer network and data security personnel, network security policy makers, and those reading for leisure. In addition, the guide
provokes the reader by raising valid legislative, legal, social, technical and ethical
security issues, including the increasingly diminishing line between individual privacy and the need for collective and individual security in the new computing
ecosystem.
The guide targets college students in computer science, information science,
technology studies, library sciences, engineering, and to a lesser extent students in
the arts and sciences who are interested in information technology. In addition, students in information management sciences will find the guide particularly helpful.
Practitioners, especially those working in data and information-intensive areas, will
likewise find the guide a good reference source. It will also be valuable to those
interested in any aspect of information security and assurance and those simply
wanting to become cyberspace literates.
Book Resources
There are two types of exercises at the end of chapter: easy and quickly workable
exercises whose responses can be easily spotted from the proceeding text; and more
thought provoking advanced exercises whose responses may require research outside the content of this book. Also Chap. 25 is devoted to lab exercises. There are
three types of lab exercises: weekly or bi-weekly assignments that can be done easily with either reading or using readily available software and hardware tools;
slightly harder semester-long projects that may require extensive time, collaboration, and some research to finish them successfully; and hard open-research projects
that require a lot of thinking, take a lot of time, and require extensive research. Links
are provided below for Cryptographic and Mobile security hands-on projects from
viii
Preface to Third Edition
two successful National Science Foundation (NSF) funded workshops at the
author’s university.
• Teaching Cryptography Using Hands-on Labs and Case Studies – http://web2.
utc.edu/~djy471/cryptography/crypto.htm
• Capacity Building Through Curriculum and Faculty Development on Mobile
Security – http://www.utc.edu/faculty/li-yang/mobilesecurity.php
We have tried as much as possible, throughout the guide, to use open source
software tools. This has two consequences to it: one, it makes the guide affordable
keeping in mind the escalating proprietary software prices; and two, it makes the
content and related software tools last longer because the content and corresponding
exercises and labs are not based on one particular proprietary software tool that can
go out anytime.
Instructor Support Materials
As you consider using this book, you may need to know that we have developed
materials to help you with your course. The help materials for both instructors and
students cover the following areas:
• Syllabus. There is a suggested syllabus for the instructor.
• Instructor PowerPoint slides. These are detailed enough to help the instructor,
especially those teaching the course for the first time.
• Answers to selected exercises at the end of each chapter.
• Laboratory. Since network security is a hands-on course, students need to spend
a considerable amount of time on scheduled laboratory exercises. The last chapter of the book contains several laboratory exercises and projects. The book
resource center contains several more and updates. Also as we stated above, links
are also included at the author’s website for Cryptographic hands-on project
from two successful National Science Foundation (NSF) funded workshops at
the author’s university.
These materials can be found at the publisher’s website at http://www.springer.
com/978-1-4471-6653-5 and at the author’s website at http://www.utc.edu/Faculty/
Joseph-Kizza/
Chattanooga, TN, USA
June, 2014
Joseph Migga Kizza
Contents
Part I
1
Introduction to Computer Network Security
Computer Network Fundamentals ………………………………………………..
1.1
Introduction ……………………………………………………………………….
1.2
Computer Network Models ………………………………………………….
1.3
Computer Network Types ……………………………………………………
1.3.1
Local Area Networks (LANs) ………………………………..
1.3.2
Wide Area Networks (WANs) ………………………………..
1.3.3
Metropolitan Area Networks (MANs) …………………….
1.4
Data Communication Media Technology ………………………………
1.4.1
Transmission Technology ………………………………………
1.4.2
Transmission Media ……………………………………………..
1.5
Network Topology………………………………………………………………
1.5.1
Mesh …………………………………………………………………..
1.5.2
Tree …………………………………………………………………….
1.5.3
Bus ……………………………………………………………………..
1.5.4
Star ……………………………………………………………………..
1.5.5
Ring ……………………………………………………………………
1.6
Network Connectivity and Protocols …………………………………….
1.6.1
Open System Interconnection (OSI)
Protocol Suite ………………………………………………………
1.6.2
Transport Control Protocol/Internet Protocol
(TCP/IP) Model ……………………………………………………
1.7
Network Services ……………………………………………………………….
1.7.1
Connection Services ……………………………………………..
1.7.2
Network Switching Services ………………………………….
1.8
Network Connecting Devices……………………………………………….
1.8.1
LAN Connecting Devices ……………………………………..
1.8.2
Internetworking Devices ……………………………………….
3
3
4
5
6
6
6
7
7
10
13
13
14
14
15
15
17
18
19
22
23
24
26
26
30
ix
x
2
Contents
1.9
Network Technologies…………………………………………………………
1.9.1
LAN Technologies ……………………………………………….
1.9.2
WAN Technologies……………………………………………….
1.9.3
Wireless LANs …………………………………………………….
1.10 Conclusion…………………………………………………………………………
References …………………………………………………………………………………….
34
34
36
38
39
40
Computer Network Security Fundamentals ………………………………….
2.1
Introduction ……………………………………………………………………….
2.1.1
Computer Security………………………………………………..
2.1.2
Network Security………………………………………………….
2.1.3
Information Security …………………………………………….
2.2
Securing the Computer Network …………………………………………..
2.2.1
Hardware …………………………………………………………….
2.2.2
Software ……………………………………………………………..
2.3
Forms of Protection …………………………………………………………….
2.3.1
Access Control …………………………………………………….
2.3.2
Authentication ……………………………………………………..
2.3.3
Confidentiality ……………………………………………………..
2.3.4
Integrity ………………………………………………………………
2.3.5
Nonrepudiation …………………………………………………….
2.4
Security Standards………………………………………………………………
2.4.1
Security Standards Based on Type
of Service/Industry ……………………………………………….
2.4.2
Security Standards Based on Size/Implementation……
2.4.3
Security Standards Based on Interests …………………….
2.4.4
Security Best Practices ………………………………………….
References …………………………………………………………………………………….
41
41
43
43
43
44
44
44
44
45
46
46
47
47
48
Part II
3
49
52
52
53
57
Security Issues and Challenges in the Traditional
Computer Network
Security Motives and Threats to Computer Networks ……………………
3.1
Introduction ……………………………………………………………………….
3.2
Sources of Security Threats …………………………………………………
3.2.1
Design Philosophy………………………………………………..
3.2.2
Weaknesses in Network Infrastructure
and Communication Protocols ……………………………….
3.2.3
Rapid Growth of Cyberspace …………………………………
3.2.4
The Growth of the Hacker Community ……………………
3.2.5
Vulnerability in Operating System Protocol …………….
3.2.6
The Invisible Security Threat: The Insider Effect ……..
3.2.7
Social Engineering ……………………………………………….
3.2.8
Physical Theft ………………………………………………………
61
61
62
62
63
66
67
77
77
78
78
Contents
xi
3.3
Security Threat Motives ………………………………………………………
3.3.1
Terrorism …………………………………………………………….
3.3.2
Military Espionage ……………………………………………….
3.3.3
Economic Espionage …………………………………………….
3.3.4
Targeting the National Information Infrastructure …….
3.3.5
Vendetta/Revenge …………………………………………………
3.3.6
Hate (National Origin, Gender, and Race) ……………….
3.3.7
Notoriety………………….
Purchase answer to see full
attachment

Place your order
(550 words)

Approximate price: $22

Calculate the price of your order

550 words
We'll send you the first draft for approval by September 11, 2018 at 10:52 AM
Total price:
$26
The price is based on these factors:
Academic level
Number of pages
Urgency
Basic features
  • Free title page and bibliography
  • Unlimited revisions
  • Plagiarism-free guarantee
  • Money-back guarantee
  • 24/7 support
On-demand options
  • Writer’s samples
  • Part-by-part delivery
  • Overnight delivery
  • Copies of used sources
  • Expert Proofreading
Paper format
  • 275 words per page
  • 12 pt Arial/Times New Roman
  • Double line spacing
  • Any citation style (APA, MLA, Chicago/Turabian, Harvard)

Our guarantees

Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.

Money-back guarantee

You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.

Zero-plagiarism guarantee

Each paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.

Free-revision policy

Thanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.

Privacy policy

Your email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.

Fair-cooperation guarantee

By sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.