Student Motivation in Computer Networking Courses
|
|
|
- Kelly Hudson
- 9 years ago
- Views:
Transcription
1 Student Motivation in Computer Networking Courses Wen-Jung Hsin Associate Professor Information and Computer Science Park University This paper introduces several hands-on projects that have been used to motivate students in learning various computer networking concepts. These projects are shown to be very useful and applicable to the learners daily tasks and activities such as ing, Web browsing, and online shopping and banking, and lead to an unexpected byproduct, self-motivation. Introduction Teaching theory with hands-on components is shown to be an effective way of conveying information to learners [1]. This is particularly true for teaching computer networking courses, since the use of communication applications such as and Web browsers has become common for most in recent years. For teaching various computer networking courses, the author has several hands-on projects utilizing advanced computer technologies and freely available software. For example, Java applets can be used for live animation, Ethereal for monitoring packets in transmission, ZoneAlarm for creating personal firewalls, and Microsoft Baseline Security Analyzer for analyzing the security settings of a computer. These technologies and software are evidence that a picture is indeed worth a thousand words. As it turns out, all of these hands-on projects are very useful and applicable to the learners daily tasks and activities, and lead to a higher form of student motivation, namely, self-motivation. In each of the following sections, the technology and student motivation associated As it turns out, all of these hands-on projects are very useful and applicable to the learners daily tasks and activities, and lead to a higher form of student motivation, namely, selfmotivation. with each assigned project are described in detail. Thus, section 1 deals with Java applets, section 2 with Ethereal, and section 3 with computer network security software. Section 1: Java applet A Java applet is a computer program written in the Java programming language, and can be executed in a client Web browser. For supplemental instruction with their computer networking textbook, Kurose and Ross [2] provide a set of publicly available Java applet animations [3]. These animations, including wireless communications, Hypertext Transfer Protocols (HTTP) and Domain Name System (DNS) protocols, and packet vs. message switching, illustrate how various computer networking applications and protocols work. These applets make networking theory more comprehensible as students are able to explore various networking scenarios by seeing the effect of changing to different parameters and settings. Java applet Projects During the past three years, the author has observed that computer networking students have benefited from using Java applet animations [3]. To contribute to the pool of available Java applet animations and give back to the computer networking community, beginning in fall 2005, the author has assigned a project in the computer networking theory course (CS365), in which students are to 32 Volume 2, Student Motivation, 2007
2 write a Java applet to illustrate a networking concept or a computer program to solve a networking problem. The emphasis of the project is on providing an interactive animation to accompany a networking concept or problem and enhance understanding of the subject matter. Student Motivation with Java applet The main force driving student motivation in this assignment is seeing that their work can benefit other students, potentially worldwide, just as they themselves benefit from using the collection of available applets. Thus far, several such animations have been produced by CS365 students. In fall 2005, student Joshua McKinzie wrote an animation to illustrate Selective Repeat protocol in the network transport layer [4]. His animation has since been published in Kurose and Ross s free Java applet collection [3], in which the authors describe McKinzie s Java applet as a very cool applet animating the Selective Repeat Protocol [3]. I believe students from all over the world will find [McKinzie s] Selective-Repeat Applet insightful, said Ross [3]. In the same semester, student Nick Kreeger wrote an animation called "Traverse Ping" [5] that reduced excessive error messages for a Nagios [6], a network tool for monitoring host information. In fall 2006, students had an opportunity to use McKinzie s animation published in Kurose and Ross [3], in what has become an effective method of motivating students to write animations that benefit the computer networking community. Of special note is student Aris Czamanske, who in December 2006 completed an IPv4 calculator that can identify various parts of an IPv4 address [7]. His applet has been used by students majoring in computer networking at Park University, and will be published on the Information and Computer Science Department s website at Park University. Summary of the Project using Java applet What truly motivates the students in this project is the knowledge that, just as they themselves benefit from using the Java applet animations, their own work can benefit other students, potentially worldwide. Section 2: Ethereal What truly motivates the students in this project is the knowledge that, just as they themselves benefit from using the Java applet animations, their own work can benefit other students, potentially worldwide. Ethereal is software that can capture and analyze network traffic. The author has used Ethereal in teaching both the theoretical and the hands-on computer networking courses in the past six years at the University of Missouri- Kansas City and Park University. The author firmly believes that Ethereal has helped students understand various networking concepts, including the protocols and protocol layers, and how systems communicate with each other. Ethereal Live Demonstration Ethereal is a highly effective tool for live demonstrations. The author has used it in class to capture live traffic between a Web browser and Web servers at various popular Web sites such Park University, Yahoo.com, and CNN.com. The captured traffic shows how a request is satisfied between a Web browser and a Web server, and how various protocols, such as DNS, Address Resolution Protocol (ARP), Internet Protocol (IP), Transmission Control Protocol (TCP), and HTTP, work together to retrieve a simple Web page. This frequently opens students eyes to the complexity of satisfying a simple Web request. InSight: A Collection of Faculty Scholarship 33
3 Ethereal Projects In various networking courses (CS365 Computer Networking, CS367 Network and Security Administration, and CS373 Computer Network Security), the author has students perform different projects using Ethereal that include: (1) discovering how various protocols work; (2) examining the differences in the uses of various networking devices such as hub, switch, and router; (3) debugging problems in the communication network; (4) finding out how traffic is re-routed because of a problem in the network; and (5) identifying communication and security loopholes. Student Motivation in Using Ethereal The primary motivation for students in the projects using Ethereal is in the applicability and relevance of the experiment to the students daily tasks and activities, (i.e., Web browsing, ing, online shopping or banking, etc.). Students, as clients, see in detail how their communication requests are composed and transmitted to servers, and how the servers in turn fulfill these requests. One particular project that increases student knowledge and understanding is the capture and observation of their own The primary motivation for students in the projects using Ethereal is in the applicability and relevance of the experiment to the students daily tasks and activities. passwords in clear text using File Transfer Protocol (FTP) and TELetype Network protocol (Telnet) [8]. This project proves the importance of using secure protocols such as secure FTP (SFTP) and Secure Shell (SSH) protocols where encryption is used. In the spring 2007 Computer Network Security (CS373) class, student John Nickell was curious as to how well his ISP, a cable service provider, handled the traffic between itself and his home computer. He used Ethereal, the tool that we taught in class, and found that his ISP uses Post Office Protocol 3 (POP3) for retrieval and that his password is sent in clear text between his home computer and the ISP. This is especially detrimental in the cable environment, where the flow of information in the cable is shared among its users. Nickell has contacted his ISP, showing what he found, and it is hoped that the ISP can provide a more secure communication channel for its clients. Additionally, Nickell presented his finding as a guest speaker at the Enhancing Teaching and Learning Conference 2007 [9], in which the attendees are mostly educators within Kansas City area. His presentation was well received and added to the knowledge and understanding on the part of many educators at the conference. Summary of the Project using Ethereal Ethereal is a useful software tool that helps uncover the mysteries of networking, by allowing students to see the actual networking in action. A student in my CS373 class motivated himself in using Ethereal to uncover a security problem in the environment provided by his ISP, and presented his finding at an educational conference. Section 3: Computer Network Security Related Projects In spring 2007, Park University offered for the first time Computer Network Security (CS373), a course that introduces students to various security concepts, attacks, vulnerabilities, and countermeasures in computer, network, and information security. Using [10] as a textbook, the course also introduces students to theoretical concepts with many of these put into practice through hands-on projects. 34 Volume 2, Student Motivation, 2007
4 Computer Network Security Projects Each week, in addition to other assignments, four to five hands-on projects are available for the author to give to students, all of whom have a computer of their own, to perform at home. Depending on the content for a particular week, the projects have varying levels of complexity. Some projects involve substantial setup effort; these include Pretty Good Privacy (PGP) to encrypt s and authenticate the communicating parties, ZoneAlarm to create a personal firewall, Microsoft Baseline Security Analyzer to analyze computer system security, and ShieldsUP by Giberson Research Corporation to examine open ports in the system; whereas other projects are less time-consuming, including those that involve changing the security setting of a Web browser, and changing the setting of a wireless access point to restrict access to the intended users. Student Motivation in the Security Projects The main source of student motivation in the computer network security projects is to be found in the fact that most of the experiments are close to students hearts. Given the immense number of current computer and network security attacks, students see a need to strengthen the security of computers, their own in particular. The astonishing fact is that a majority of the students in this class would perform almost every available project every week if their equipment allowed, even though only one per week is required. It is wonderfully rewarding to listen to their bi-weekly presentations on their project experiences. This has been by far one of the most motivated classes in the author s experience at Park University. Summary of the Projects in Computer Network Security course The hands-on projects in the computer network security course are very useful to the students, as they see the applicability to their own computers. Additionally, the need to strengthen computer networks has never been greater, amid the attention to security at the national and international levels in recent years. Students in the class motivated themselves to want to learn more, thereby performing more projects than were required of them. Summary and Conclusion This paper discussed several hands-on computer networking projects using various technologies to help students understand and grasp computer networking concepts. Because these projects are useful Because these projects are useful and applicable to the learners in their daily lives and activities, they not only motivate and encourage students in learning the computer networking concepts, but also promote self-motivation in the learners. and applicable to the learners in their daily lives and activities, they not only motivate and encourage students in learning the computer networking concepts, but also promote self-motivation in the learners. InSight: A Collection of Faculty Scholarship 35
5 References [1] F. Gutierrez, Stingray: A handson approach to learning information security, in Proceedings of the Seventh Conference on Information Technology Education. ACM special interest group in Information Technology Education [2] J.F. Kurose and K.W. Ross, Computer Networking: A Top-Down Approach Featuring the Internet, 3 rd edition, Addison-Wesley, [3] J.F. Kurose and K.W. Ross, Student Resource Java applet web site, ork_3 [4] J. McKinzie, Selective Repeat, Student project and poster presentation at the Consortium of Computing in Small Colleges, Northwest Missouri State University in Maryville, Missouri, on April 8, Also a podium presentation in the First Annual Research and University, Parkville, Missouri, on April, 23, Published in site (student => Applet) for Computer and Networking textbook by J.F. Kurose and K.W. Ross in May, Both McKinzie and Hsin are acknowledged in Computer Networking, 4 th edition, by J.F. Kurose and K.W. Ross. [5] N. Kreeger, Traverse Ping, Student project and poster presentation at the Consortium of Computing in Small Colleges, Northwest Missouri State University in Maryville, Missouri, on April 8, Also a podium presentation in the First Annual Research and University, Parkville, Missouri on April 23, [6] Nagios, An open source network monitoring tool. [7] A. Czamanske, A Java applet in IPv4 address Calculation, Student project and poster presentation at Consortium of Computing in Small Colleges, Drury University, Springfield, Missouri, April 14, Also a poster presentation in the Second Annual Research and University, Parkville, Missouri on April 18, [8] J. Cigas, Network Administration Faculty Workshop, NSF funded project. [9] W.-J. Hsin, Enhancing the Understanding of Network Concepts by using Ethereal. Enhancing Teaching and Learning Conference at Park University, Parkville, Missouri, February 24, [10] M. Ciampa, Security+ Guide to Network Security Fundamentals, 2 nd edition. Thomson Course Technology, Hsin received her Ph.D. in the interdisciplinary Telecommunications and Computer Science at University of Missouri - Kansas City. She is currently an associate professor in the Department of Information and Computer Science at Park University. Her research interest is in the areas of computer science education, computer networking, and network security. She has published over 25 journal and conference papers. 36 Volume 2, Student Motivation, 2007
This Lecture. The Internet and Sockets. The Start 1969. If everyone just sends a small packet of data, they can all use the line at the same.
This Lecture The Internet and Sockets Computer Security Tom Chothia How the Internet works. Some History TCP/IP Some useful network tools: Nmap, WireShark Some common attacks: The attacker controls the
Advanced Higher Computing. Computer Networks. Homework Sheets
Advanced Higher Computing Computer Networks Homework Sheets Topic : Network Protocols and Standards. Name the organisation responsible for setting international standards and explain why network standards
1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet
Review questions 1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet C Media access method D Packages 2 To which TCP/IP architecture layer
DATA COMMUNICATOIN NETWORKING
DATA COMMUNICATOIN NETWORKING Instructor: Ouldooz Baghban Karimi Course Book: Computer Networking, A Top-Down Approach By: Kurose, Ross Introduction Course Overview Basics of Computer Networks Internet
VPN. Date: 4/15/2004 By: Heena Patel Email:[email protected]
VPN Date: 4/15/2004 By: Heena Patel Email:[email protected] What is VPN? A VPN (virtual private network) is a private data network that uses public telecommunicating infrastructure (Internet), maintaining
File Transfer Protocol (FTP) & SSH
http://xkcd.com/949/ File Transfer Protocol (FTP) & SSH Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Some materials copyright 1996-2012 Addison-Wesley J.F Kurose and K.W.
Firewall VPN Router. Quick Installation Guide M73-APO09-380
Firewall VPN Router Quick Installation Guide M73-APO09-380 Firewall VPN Router Overview The Firewall VPN Router provides three 10/100Mbit Ethernet network interface ports which are the Internal/LAN, External/WAN,
Multi-Homing Dual WAN Firewall Router
Multi-Homing Dual WAN Firewall Router Quick Installation Guide M73-APO09-400 Multi-Homing Dual WAN Firewall Router Overview The Multi-Homing Dual WAN Firewall Router provides three 10/100Mbit Ethernet
finger, ftp, host, hostname, mesg, rcp, rlogin, rsh, scp, sftp, slogin, ssh, talk, telnet, users, w, walla, who, write,...
Read Chapter 9 Linux network utilities finger, ftp, host, hostname, mesg, rcp, rlogin, rsh, scp, sftp, slogin, ssh, talk, telnet, users, w, walla, who, write,... 1 Important to know common network terminology
Linux Network Security
Linux Network Security Course ID SEC220 Course Description This extremely popular class focuses on network security, and makes an excellent companion class to the GL550: Host Security course. Protocols
Connecting to and Setting Up a Network
Chapter 9 Connecting to and Setting Up a Network Reviewing the Basics 1. How many bits are in a MAC address? 48 bits 2. How many bits are in an IPv4 IP address? In an IPv6 IP address? 32 bits, 128 bits
BASIC ANALYSIS OF TCP/IP NETWORKS
BASIC ANALYSIS OF TCP/IP NETWORKS INTRODUCTION Communication analysis provides powerful tool for maintenance, performance monitoring, attack detection, and problems fixing in computer networks. Today networks
Key Term Quiz Answers
Key Term Quiz Answers The Internet Use the Key Terms list to complete the sentences that follow. Not all terms will be used. 1. The time it takes for a packet to travel to its destination and back is called
Study Guide CompTIA A+ Certification, Domain 2 Networking
Study Guide CompTIA A+ Certification, Domain 2 Networking Brought to you by RMRoberts.com Introduction to CSR Domain - 2 (220-801) The CompTIA A+ 220-801 Domain 2 Networking has expanded a lot since the
CTS2134 Introduction to Networking. Module 8.4 8.7 Network Security
CTS2134 Introduction to Networking Module 8.4 8.7 Network Security Switch Security: VLANs A virtual LAN (VLAN) is a logical grouping of computers based on a switch port. VLAN membership is configured by
Chapter 4: Networking and the Internet
Chapter 4: Networking and the Internet Computer Science: An Overview Eleventh Edition by J. Glenn Brookshear Copyright 2012 Pearson Education, Inc. Chapter 4: Networking and the Internet 4.1 Network Fundamentals
SSL VPN Technology White Paper
SSL VPN Technology White Paper Keywords: SSL VPN, HTTPS, Web access, TCP access, IP access Abstract: SSL VPN is an emerging VPN technology based on HTTPS. This document describes its implementation and
Lesson 1 Quiz. 2012 Certification Partners, LLC. All Rights Reserved. Version 2.0
Quiz Answers-1 Lesson 1 Quiz 1. A server is: a. a computer connected to a mainframe. b. a computer that acts as a mainframe. c. a computer that shares resources with other computers on a network. d. a
Connecting with Computer Science, 2e. Chapter 5 The Internet
Connecting with Computer Science, 2e Chapter 5 The Internet Objectives In this chapter you will: Learn what the Internet really is Become familiar with the architecture of the Internet Become familiar
The following multiple-choice post-course assessment will evaluate your knowledge of the skills and concepts taught in Internet Business Associate.
Course Assessment Answers-1 Course Assessment The following multiple-choice post-course assessment will evaluate your knowledge of the skills and concepts taught in Internet Business Associate. 1. A person
Introduction on Low level Network tools
Georges Da Costa [email protected] http: //www.irit.fr/~georges.da-costa/cours/addis/ 1 Introduction 2 Aircrack-ng 3 Wireshark Low level tools Hacking tools Aircrack-ng (ex Aircrack, ex Airsnort) WEP/WPA
SWE 444 Internet and Web Application Development. Introduction to Web Technology. Dr. Ahmed Youssef. Internet
SWE 444 Internet and Web Application Development Introduction to Web Technology Dr. Ahmed Youssef Internet It is a network of networks connected and communicating using TCP/IP communication protocol 2
E-Commerce Security. The Client-Side Vulnerabilities. Securing the Data Transaction LECTURE 7 (SECURITY)
E-Commerce Security An e-commerce security system has four fronts: LECTURE 7 (SECURITY) Web Client Security Data Transport Security Web Server Security Operating System Security A safe e-commerce system
Networking Basics and Network Security
Why do we need networks? Networking Basics and Network Security Shared Data and Functions Availability Performance, Load Balancing What is needed for a network? ISO 7-Layer Model Physical Connection Wired:
CompTIA Network+ (Exam N10-005)
CompTIA Network+ (Exam N10-005) Length: Location: Language(s): Audience(s): Level: Vendor: Type: Delivery Method: 5 Days 182, Broadway, Newmarket, Auckland English, Entry Level IT Professionals Intermediate
Linux MPS Firewall Supplement
Linux MPS Firewall Supplement First Edition April 2007 Table of Contents Introduction...1 Two Options for Building a Firewall...2 Overview of the iptables Command-Line Utility...2 Overview of the set_fwlevel
1 Introduction: Network Applications
1 Introduction: Network Applications Some Network Apps E-mail Web Instant messaging Remote login P2P file sharing Multi-user network games Streaming stored video clips Internet telephone Real-time video
Computer Networks CCNA Module 1
Chapter 1: Quiz 1 Q1: Which statement describes a network that supports QoS? The fewest possible devices are affected by a failure. The network should be able to expand to keep up with user demand. The
The Internet, Intranets, and Extranets. What is the Internet. What is the Internet cont d.
C H A P T E R 7 The Internet, Intranets, and Extranets What is the Internet Millions of computers, all linked together on a computer network. A home computer usually links to the Internet using a phone
Exam Questions SY0-401
Exam Questions SY0-401 CompTIA Security+ Certification http://www.2passeasy.com/dumps/sy0-401/ 1. A company has implemented PPTP as a VPN solution. Which of the following ports would need to be opened
CDA 4504 -- Introduction to Computer Networks
CDA 4504 -- Introduction to Computer Networks [Description] [Prereqs] [Textbooks] [Contents] [Slides] [Assignments] [Grading] [Admin Info] [Submission] [Academic Integrity] Course Description and Goals
INTERNET SECURITY: THE ROLE OF FIREWALL SYSTEM
INTERNET SECURITY: THE ROLE OF FIREWALL SYSTEM Okumoku-Evroro Oniovosa Lecturer, Department of Computer Science Delta State University, Abraka, Nigeria Email: [email protected] ABSTRACT Internet security
Wireshark Lab: HTTP SOLUTION
Wireshark Lab: HTTP SOLUTION Supplement to Computer Networking: A Top-Down Approach, 6 th ed., J.F. Kurose and K.W. Ross 2005-21012, J.F Kurose and K.W. Ross, All Rights Reserved The following screen shots
Computer Networks. Secure Systems
Computer Networks Secure Systems Summary Common Secure Protocols SSH HTTPS (SSL/TSL) IPSec Wireless Security WPA2 PSK vs EAP Firewalls Discussion Secure Shell (SSH) A protocol to allow secure login to
Network: several computers who can communicate. bus. Main example: Ethernet (1980 today: coaxial cable, twisted pair, 10Mb 1000Gb).
1 / 17 Network: several computers who can communicate. Bus topology: bus Main example: Ethernet (1980 today: coaxial cable, twisted pair, 10Mb 1000Gb). Hardware has globally unique MAC addresses (IDs).
APWG. (n.d.). Unifying the global response to cybecrime. Retrieved from http://www.antiphishing.org/
DB1 Phishing attacks, usually implemented through HTML enabled e-mails, are becoming more common and more sophisticated. As a network manager, how would you go about protecting your users from a phishing
Lab - Observing DNS Resolution
Objectives Part 1: Observe the DNS Conversion of a URL to an IP Address Part 2: Observe DNS Lookup Using the nslookup Command on a Web Site Part 3: Observe DNS Lookup Using the nslookup Command on Mail
Ethernet. Ethernet. Network Devices
Ethernet Babak Kia Adjunct Professor Boston University College of Engineering ENG SC757 - Advanced Microprocessor Design Ethernet Ethernet is a term used to refer to a diverse set of frame based networking
Lab 8.4.2 Configuring Access Policies and DMZ Settings
Lab 8.4.2 Configuring Access Policies and DMZ Settings Objectives Log in to a multi-function device and view security settings. Set up Internet access policies based on IP address and application. Set
Lecture 28: Internet Protocols
Lecture 28: Internet Protocols 15-110 Principles of Computing, Spring 2016 Dilsun Kaynar, Margaret Reid-Miller, Stephanie Balzer Reminder: Exam 2 Exam 2 will take place next Monday, on April 4. Further
Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs
Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs Why Network Security? Keep the bad guys out. (1) Closed networks
Network Configuration Settings
Network Configuration Settings Many small businesses already have an existing firewall device for their local network when they purchase Microsoft Windows Small Business Server 2003. Often, these devices
Step-by-Step Configuration
Step-by-Step Configuration Kerio Technologies C 2001-2003 Kerio Technologies. All Rights Reserved. Printing Date: December 17, 2003 This guide provides detailed description on configuration of the local
Computer Networks. A Top-Down Approach. Behrouz A. Forouzan. and. Firouz Mosharraf. \Connect Mc \ Learn. Hill
Computer Networks A Top-Down Approach Behrouz A. Forouzan and Firouz Mosharraf \Connect Mc \ Learn Graw I Succeed* Hill Preface xvii Trademarks xxiii Chapter 1 Introduction 1 1.1 OVERVIEW OF THE INTERNET
Security. TestOut Modules 12.6 12.10
Security TestOut Modules 12.6 12.10 Authentication Authentication is the process of submitting and checking credentials to validate or prove user identity. 1. Username 2. Credentials Password Smart card
Chakchai So-In, Ph.D.
Application Layer Functionality and Protocols Chakchai So-In, Ph.D. Khon Kaen University Department of Computer Science Faculty of Science, Khon Kaen University 123 Mitaparb Rd., Naimaung, Maung, Khon
OCR LEVEL 3 CAMBRIDGE TECHNICAL
Cambridge TECHNICALS OCR LEVEL 3 CAMBRIDGE TECHNICAL CERTIFICATE/DIPLOMA IN IT COMPUTER NETWORKS R/601/7320 LEVEL 3 UNIT 7 GUIDED LEARNING HOURS: 60 UNIT CREDIT VALUE: 10 COMPUTER NETWORKS R/601/7320 LEVEL
Configuring IPSec VPN Tunnel between NetScreen Remote Client and RN300
Configuring IPSec VPN Tunnel between NetScreen Remote Client and RN300 This example explains how to configure pre-shared key based simple IPSec tunnel between NetScreen Remote Client and RN300 VPN Gateway.
Ethereal Lab: DNS. 1. nslookup
Ethereal Lab: DNS Version: July 2005 2005 J.F. Kurose, K.W. Ross. All Rights Reserved Computer Networking: A Topdown Approach Featuring the Internet, 3 rd edition. As described in Section 2.5 of the textbook,
COMPUTER NETWORK TECHNOLOGY (300)
Page 1 of 10 Contestant Number: Time: Rank: COMPUTER NETWORK TECHNOLOGY (300) REGIONAL 2014 TOTAL POINTS (500) Failure to adhere to any of the following rules will result in disqualification: 1. Contestant
Wireless Encryption Protection
Wireless Encryption Protection We re going to jump around a little here and go to something that I really find interesting, how do you secure yourself when you connect to a router. Now first and foremost
Network Address Translation (NAT)
CHAPTER 6 Network Address Translation (NAT) 6.1 Introduction NAT (Network Address Translation) is a method of mapping one or more IP addresses and/or service ports into different specified services. It
Reverse Shells Enable Attackers To Operate From Your Network. Richard Hammer August 2006
Reverse Shells Enable Attackers To Operate From Your Network Richard Hammer August 2006 Reverse Shells? Why should you care about reverse shells? How do reverse shells work? How do reverse shells get installed
Virtual Server and DDNS. Virtual Server and DDNS. For BIPAC 741/743GE
Virtual Server and DDNS For BIPAC 741/743GE August, 2003 1 Port Number In TCP/IP and UDP networks, a port is a 16-bit number, used by the host-to-host protocol to identify to which application program
User's Guide. Tiny Personal Firewall V.2
User's Guide Tiny Personal Firewall V.2 Contents Contents Getting Started Chapter 1 System Requirements... 4 Installation... 5 Personal Firewall Architecture... 6 Administration Chapter 2 Overview...
Lab 1: Packet Sniffing and Wireshark
Introduction CSC 5991 Cyber Security Practice Lab 1: Packet Sniffing and Wireshark The first part of the lab introduces packet sniffer, Wireshark. Wireshark is a free opensource network protocol analyzer.
Lab 8.4.2 Configuring Access Policies and DMZ Settings
Lab 8.4.2 Configuring Access Policies and DMZ Settings Objectives Log in to a multi-function device and view security settings. Set up Internet access policies based on IP address and application. Set
How To Pass A Credit Course At Florida State College At Jacksonville
Form 2A, Page 1 FLORIDA STATE COLLEGE AT JACKSONVILLE COLLEGE CREDIT COURSE OUTLINE COURSE NUMBER: CTS 2658 COURSE TITLE: PREREQUISITE(S): COREQUISITE(S): Managing Network Security CNT 2210 with grade
CSCD 330 Network Programming Winter 2015. Lecture 1 - Course Details
CSCD 330 Network Programming Winter 2015 Lecture 1 - Course Details Contact Information Instructor: Carol Taylor 319A CEB Phone: 509-359-6065 E-mail: [email protected] Course: CSCD330, CEB 204 Lecture,
Remote Logging. Tanveer Brohi(14cs28)
Remote Logging Tanveer Brohi(14cs28) 1 Contents Introduction TELNET SSH Advantages and Disadvantages Conclusion References 2 Introduction What is remote logging? Remote logging is the capability to access
VPN Lesson 2: VPN Implementation. Summary
VPN Lesson 2: VPN Implementation Summary 1 Notations VPN client (ok) Firewall Router VPN firewall VPN router VPN server VPN concentrator 2 Basic Questions 1. VPN implementation options for remote users
Computer Security CS 426 Lecture 36. CS426 Fall 2010/Lecture 36 1
Computer Security CS 426 Lecture 36 Perimeter Defense and Firewalls CS426 Fall 2010/Lecture 36 1 Announcements There will be a quiz on Wed There will be a guest lecture on Friday, by Prof. Chris Clifton
Lab VI Capturing and monitoring the network traffic
Lab VI Capturing and monitoring the network traffic 1. Goals To gain general knowledge about the network analyzers and to understand their utility To learn how to use network traffic analyzer tools (Wireshark)
Technology/Internet Usage Workshop
Technology/Internet Usage Workshop 1) Workshop Goals (1 st Slide) 2) Computers Desk Top (Show examples) Lap-Top Hand-held Wireless Device Introduce Tammy Welsh from Gateway 3) What is the Internet? The
Experiences from Educating Practitioners in Vulnerability Analysis
Experiences from Educating Practitioners in Vulnerability Analysis Abstract. This paper presents experiences from a vulnerability analysis course especially developed for practitioners. The described course
Network Security Policy
Network Security Policy I. PURPOSE Attacks and security incidents constitute a risk to the University's academic mission. The loss or corruption of data or unauthorized disclosure of information on campus
Application Note. Onsight TeamLink And Firewall Detect v6.3
Application Note Onsight And Firewall Detect v6.3 1 ONSIGHT TEAMLINK HTTPS TUNNELING SERVER... 3 1.1 Encapsulation... 3 1.2 Firewall Detect... 3 1.2.1 Firewall Detect Test Server Options:... 5 1.2.2 Firewall
Address Resolution Protocol (ARP)
Address Resolution Protocol (ARP) Question: how do packets actually get to their destination? IP routing tables: based on network addresses Ethernet physical interfaces only understand ethernet addresses
Detailed Table of Contents
Detailed Table of Contents Foreword Preface 1. Networking Protocols and OSI Model 1 1.1 Protocols in Computer Communications 3 1.2 The OSI Model 7 1.3 OSI Layer Functions 11 Summary 19 Key Terms and Concepts
Directory and File Transfer Services. Chapter 7
Directory and File Transfer Services Chapter 7 Learning Objectives Explain benefits offered by centralized enterprise directory services such as LDAP over traditional authentication systems Identify major
Lab 5.5.3 Developing ACLs to Implement Firewall Rule Sets
Lab 5.5.3 Developing ACLs to Implement Firewall Rule Sets All contents are Copyright 1992 2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 1 of 8 Device Interface
INTERNET SECURITY: FIREWALLS AND BEYOND. Mehernosh H. Amroli 4-25-2002
INTERNET SECURITY: FIREWALLS AND BEYOND Mehernosh H. Amroli 4-25-2002 Preview History of Internet Firewall Technology Internet Layer Security Transport Layer Security Application Layer Security Before
Policy Based Forwarding
Policy Based Forwarding Tech Note PAN-OS 4.1 Revision A 2012, Palo Alto Networks, Inc. www.paloaltonetworks.com Contents Overview... 3 Security... 3 Performance... 3 Symmetric Routing... 3 Service Versus
Technical Support Information Belkin internal use only
The fundamentals of TCP/IP networking TCP/IP (Transmission Control Protocol / Internet Protocols) is a set of networking protocols that is used for communication on the Internet and on many other networks.
Topics in Network Security
Topics in Network Security Jem Berkes MASc. ECE, University of Waterloo B.Sc. ECE, University of Manitoba www.berkes.ca February, 2009 Ver. 2 In this presentation Wi-Fi security (802.11) Protecting insecure
Networking Test 4 Study Guide
Networking Test 4 Study Guide True/False Indicate whether the statement is true or false. 1. IPX/SPX is considered the protocol suite of the Internet, and it is the most widely used protocol suite in LANs.
Linux MDS Firewall Supplement
Linux MDS Firewall Supplement Table of Contents Introduction... 1 Two Options for Building a Firewall... 2 Overview of the iptables Command-Line Utility... 2 Overview of the set_fwlevel Command... 2 File
Network Security. Tampere Seminar 23rd October 2008. Overview Switch Security Firewalls Conclusion
Network Security Tampere Seminar 23rd October 2008 1 Copyright 2008 Hirschmann 2008 Hirschmann Automation and and Control GmbH. Contents Overview Switch Security Firewalls Conclusion 2 Copyright 2008 Hirschmann
Apple Airport Extreme Base Station V4.0.8 Firmware: Version 5.4
1. APPLE AIRPORT EXTREME 1.1 Product Description The following are device specific configuration settings for the Apple Airport Extreme. Navigation through the management screens will be similar but may
Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network.
Course Name: TCP/IP Networking Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network. TCP/IP is the globally accepted group of protocols
Oct 15, 2004 www.dcs.bbk.ac.uk/~gmagoulas/teaching.html 3. Internet : the vast collection of interconnected networks that all use the TCP/IP protocols
E-Commerce Infrastructure II: the World Wide Web The Internet and the World Wide Web are two separate but related things Oct 15, 2004 www.dcs.bbk.ac.uk/~gmagoulas/teaching.html 1 Outline The Internet and
Internet Privacy Options
2 Privacy Internet Privacy Sirindhorn International Institute of Technology Thammasat University Prepared by Steven Gordon on 19 June 2014 Common/Reports/internet-privacy-options.tex, r892 1 Privacy Acronyms
CSET 4750 Computer Networks and Data Communications (4 semester credit hours) CSET Required IT Required
CSET 4750 Computer Networks and Data Communications (4 semester credit hours) CSET Required IT Required Current Catalog Description: Computer network architectures and their application to industry needs.
How To Understand And Understand The Security Of A Key Infrastructure
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 12 Applying Cryptography Objectives Define digital certificates List the various types of digital certificates and how they are used
A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.
A firewall is a software- or hardware-based network security system that allows or denies network traffic according to a set of rules. Firewalls can be categorized by their location on the network: A network-based
CS 665: Computer System Security. Network Security. Usage environment. Sources of vulnerabilities. Information Assurance Module
CS 665: Computer System Security Network Security Bojan Cukic Lane Department of Computer Science and Electrical Engineering West Virginia University 1 Usage environment Anonymity Automation, minimal human
Chapter 6 Configuring the SSL VPN Tunnel Client and Port Forwarding
Chapter 6 Configuring the SSL VPN Tunnel Client and Port Forwarding This chapter describes the configuration for the SSL VPN Tunnel Client and for Port Forwarding. When a remote user accesses the SSL VPN
CH ENSA EC-Council Network Security Administrator Detailed Course Outline
CH ENSA EC-Council Network Security Administrator Detailed Course Outline Summary Duration Vendor Audience 5 Days hands-on training EC-Council Security Professionals Level Technology Category Advance Ethical
Chapter 8 Security Pt 2
Chapter 8 Security Pt 2 IC322 Fall 2014 Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 All material copyright 1996-2012 J.F Kurose and K.W. Ross,
Transport Layer Security Protocols
SSL/TLS 1 Transport Layer Security Protocols Secure Socket Layer (SSL) Originally designed to by Netscape to secure HTTP Version 2 is being replaced by version 3 Subsequently became Internet Standard known
Information Technology Security Guideline. Network Security Zoning
Information Technology Security Guideline Network Security Zoning Design Considerations for Placement of s within Zones ITSG-38 This page intentionally left blank. Foreword The Network Security Zoning
ABB solar inverters. User s manual ABB Remote monitoring portal
ABB solar inverters User s manual ABB Remote monitoring portal List of related manuals Title ABB Remote monitoring portal User s manual NETA-01 Ethernet adapter module User s manual Code (English) 3AUA0000098904
Information Security Services
Information Security Services Information Security In 2013, Symantec reported a 62% increase in data breaches over 2012. These data breaches had tremendous impacts on many companies, resulting in intellectual
CCT vs. CCENT Skill Set Comparison
Operation of IP Data Networks Recognize the purpose and functions of various network devices such as Routers, Switches, Bridges and Hubs Select the components required to meet a given network specification
Lab 9.1.1 Organizing CCENT Objectives by OSI Layer
Lab 9.1.1 Organizing CCENT Objectives by OSI Layer Objectives Organize the CCENT objectives by which layer or layers they address. Background / Preparation In this lab, you associate the objectives of
EC-Council Network Security Administrator (ENSA) Duration: 5 Days Method: Instructor-Led
EC-Council Network Security Administrator (ENSA) Duration: 5 Days Method: Instructor-Led Certification: ENSA Exam 312-38 Course Description This course looks at the network security in defensive view.
TELE 301 Network Management. Lecture 16: Remote Terminal Services
TELE 301 Network Management Lecture 16: Remote Terminal Services Haibo Zhang Computer Science, University of Otago TELE301 Lecture 16: Remote Terminal Services 1 Today s Focus Remote Terminal Services
