SlideShare a Scribd company logo
CompTIA Network+
  in a Nutshell




    Chapter Eleven
Objectives
• Discuss the standard methods for securing
  TCP/IP networks
• Compare TCP/IP security standards
• Implement secure TCP/IP applications
TCP/IP and Security


The “inventors” of TCP/IP did not include
  any real security
• User names and passwords on FTP, Telnet,
  etc. do not begin to protect TCP/IP
  applications
• Today every device with a public IP address on
  the Internet is targeted
• Data moving between two hosts is
  intercepted and read
• TCP/IP in its original form does not stop the
  bad guys
• Making TCP/IP Secure
• The four areas of securing TCP/IP
A. Encryption -To scramble, mix up, change data
  It can be unscrambled by the person receiving
  it
B. Non-repudiation - Process that guarantees
  that the data is as originally sent and came
  from the source you think it came from
C. Authentication -Verifying that whoever
  accesses the data is the person you want
  accessing the data/ Classic form: user name
  and password combination
D. Authorization- Defines what a person
  accessing the data can do with it
Example: Windows permissions assigned to a
  user account
• Encryption
 A. Plaintext and Cleartext
   -Two names for same thing
    Data in easily read or viewed industry-wide
    standard format
   -Does not mean that it is just “text”
B. Cipher
-series of complex and hard-to-reverse
 mathematics (an algorithm)
-You run the cipher on a string of ones and
 zeroes to make a new set of ones and zeroes
• Asymmetric-Key Algorithm Standards
- Serious drawback to symmetric-key
  algorithms
- Anyone who has the key can encrypt or
  decrypt data
- Forces us to somehow send the key to the
  other person
• Asymmetric-key algorithms developed as a
  method for the encryptor to safely send a key
  to the decryptor
• Secure TCP/IP Applications
A. The applications that use the above standards
   and tools
B. HTTPS [Introduced in Chapter 9]
- HTTPS documents page addresses begin with
   https://
-Most browsers also show a lock icon
   somewhere
- HTTPS uses SSL/TLS for

More Related Content

PPT
Networking Chapter 4
PPT
Networking Chapter 8
PPT
Chapter 2 Networking
PPT
Networking Chapter 6
PPT
Networking Chapter 16
PPT
Networking Chapter 14
PPT
Networking Chapter 12
PPT
Chapter 3 Networking
Networking Chapter 4
Networking Chapter 8
Chapter 2 Networking
Networking Chapter 6
Networking Chapter 16
Networking Chapter 14
Networking Chapter 12
Chapter 3 Networking

What's hot (20)

PPT
Networking Chapter 7
PPT
Networking Chapter 5
PPT
Networking Chapter 13
PPTX
Network Fundamentals: Ch6 - Addressing the Network IP v4
PPT
Networking Chapter 15
PDF
Uccn1003 -may10_-_lect03a_-_lan_design_issues
PPT
CCNA TCP/IP
PPTX
A presentation on networking and ccna
PPT
Basic network training2
PPTX
CCNA ppt Day 1
PPTX
ccna networking ppt
PPT
Networking Chapter 9
PPT
Basic network training1
PPT
Basic network training3
PPTX
BASIC OF ROUTERS,ROUTER IOS AND ROUTING PROTOCOLS
PPTX
LAN Switching and Wireless: Ch2 - Basic Switch Concepts and Configuration
PPTX
Ccna PPT
PPTX
Chapter 6 - Networking
Networking Chapter 7
Networking Chapter 5
Networking Chapter 13
Network Fundamentals: Ch6 - Addressing the Network IP v4
Networking Chapter 15
Uccn1003 -may10_-_lect03a_-_lan_design_issues
CCNA TCP/IP
A presentation on networking and ccna
Basic network training2
CCNA ppt Day 1
ccna networking ppt
Networking Chapter 9
Basic network training1
Basic network training3
BASIC OF ROUTERS,ROUTER IOS AND ROUTING PROTOCOLS
LAN Switching and Wireless: Ch2 - Basic Switch Concepts and Configuration
Ccna PPT
Chapter 6 - Networking
Ad

Viewers also liked (20)

PPTX
CompTIA Network+ Lesson
PPTX
PACE-IT: Introduction to IPv4 (part 1) - N10 006
PDF
Aξιολόγηση του εκπαιδευτικού έργου
PPTX
CompTIA International Trends in Cybersecurity
PDF
CompTIA network plus
PDF
PPS
Comp tia n+_session_09
PPTX
PACE-IT: Network Cabling (part 3) - N10 006
PPTX
IBM BladeCenter Fundamentals Introduction
PDF
CompTIA Network+ Objectives
PPTX
SYMANTEC ENDPOINT PROTECTION Administration Introduction
PDF
Introduction to oracle primavera
PPT
CCNA PPP and Frame Relay
PPT
CCNA Access Lists
PPT
CCNA Network Services
PPT
CCNA Advanced Switching
PPT
CCNA Router Startup and Configuration
PPT
CCNA Router and IOS Basics
PPTX
SYMANTEC ENDPOINT PROTECTION Interfacing the SEPM with Protection Center
PPT
CCNA Advanced Routing Protocols
CompTIA Network+ Lesson
PACE-IT: Introduction to IPv4 (part 1) - N10 006
Aξιολόγηση του εκπαιδευτικού έργου
CompTIA International Trends in Cybersecurity
CompTIA network plus
Comp tia n+_session_09
PACE-IT: Network Cabling (part 3) - N10 006
IBM BladeCenter Fundamentals Introduction
CompTIA Network+ Objectives
SYMANTEC ENDPOINT PROTECTION Administration Introduction
Introduction to oracle primavera
CCNA PPP and Frame Relay
CCNA Access Lists
CCNA Network Services
CCNA Advanced Switching
CCNA Router Startup and Configuration
CCNA Router and IOS Basics
SYMANTEC ENDPOINT PROTECTION Interfacing the SEPM with Protection Center
CCNA Advanced Routing Protocols
Ad

Similar to Networking Chapter 11 (20)

PPT
Chapter14 -- networking security
PDF
Ericas-Security-Plus-Study-Guide
PPTX
Network security
PPT
12 tcp-dns
PDF
Chapter 1- Fundamentals of Cryptography.pdf
PPT
Network security and protocols
PPTX
Lesson 1. General Introduction to IT and Cyber Security.pptx
PPT
Vulnerabilities in IP Protocols
PPT
Network Security 2016
DOCX
Networkin new
PPTX
lecture 7.pptx
PDF
vulnerabilities in IP.pdf
PPTX
Data Communication & Networking Basics
PPT
network-security_for cybersecurity_experts
PPT
Computer Systems Security
PPT
Computersystemssecurity 090529105555-phpapp01
PPTX
ebusiness digital,E business signature .
PDF
Telecommunications and Network Security Presentation
PDF
Ten new topics on security+ 2011 (sy0 301) (domain 1.0 network security)
PDF
Network programming blown up syllabus
Chapter14 -- networking security
Ericas-Security-Plus-Study-Guide
Network security
12 tcp-dns
Chapter 1- Fundamentals of Cryptography.pdf
Network security and protocols
Lesson 1. General Introduction to IT and Cyber Security.pptx
Vulnerabilities in IP Protocols
Network Security 2016
Networkin new
lecture 7.pptx
vulnerabilities in IP.pdf
Data Communication & Networking Basics
network-security_for cybersecurity_experts
Computer Systems Security
Computersystemssecurity 090529105555-phpapp01
ebusiness digital,E business signature .
Telecommunications and Network Security Presentation
Ten new topics on security+ 2011 (sy0 301) (domain 1.0 network security)
Network programming blown up syllabus

More from mlrbrown (17)

PPT
Cso gaddis java_chapter15
PPT
Cso gaddis java_chapter14
PPT
Cso gaddis java_chapter13
PPT
Cso gaddis java_chapter12
PPT
Cso gaddis java_chapter11
PPT
Cso gaddis java_chapter10
PPT
Cso gaddis java_chapter9ppt
PPT
Cso gaddis java_chapter8
PPT
Cso gaddis java_chapter7
PPT
Cso gaddis java_chapter6
PPT
Cso gaddis java_chapter5
PPT
Cso gaddis java_chapter4
PPT
Cso gaddis java_chapter3
PPT
Cso gaddis java_chapter2
PPT
Cso gaddis java_chapter1
PPT
Networking Chapter 10
PPTX
Student Orientation
Cso gaddis java_chapter15
Cso gaddis java_chapter14
Cso gaddis java_chapter13
Cso gaddis java_chapter12
Cso gaddis java_chapter11
Cso gaddis java_chapter10
Cso gaddis java_chapter9ppt
Cso gaddis java_chapter8
Cso gaddis java_chapter7
Cso gaddis java_chapter6
Cso gaddis java_chapter5
Cso gaddis java_chapter4
Cso gaddis java_chapter3
Cso gaddis java_chapter2
Cso gaddis java_chapter1
Networking Chapter 10
Student Orientation

Recently uploaded (20)

PDF
Insiders guide to clinical Medicine.pdf
PDF
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
PPTX
PPH.pptx obstetrics and gynecology in nursing
PDF
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
PPTX
Pharmacology of Heart Failure /Pharmacotherapy of CHF
PPTX
Introduction to Child Health Nursing – Unit I | Child Health Nursing I | B.Sc...
PPTX
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
PDF
Origin of periodic table-Mendeleev’s Periodic-Modern Periodic table
PPTX
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
PDF
Pre independence Education in Inndia.pdf
PPTX
Microbial diseases, their pathogenesis and prophylaxis
PPTX
Cell Structure & Organelles in detailed.
PPTX
BOWEL ELIMINATION FACTORS AFFECTING AND TYPES
PPTX
Pharma ospi slides which help in ospi learning
PDF
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
PDF
O5-L3 Freight Transport Ops (International) V1.pdf
PDF
Classroom Observation Tools for Teachers
PDF
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
PDF
01-Introduction-to-Information-Management.pdf
PDF
TR - Agricultural Crops Production NC III.pdf
Insiders guide to clinical Medicine.pdf
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
PPH.pptx obstetrics and gynecology in nursing
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
Pharmacology of Heart Failure /Pharmacotherapy of CHF
Introduction to Child Health Nursing – Unit I | Child Health Nursing I | B.Sc...
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
Origin of periodic table-Mendeleev’s Periodic-Modern Periodic table
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
Pre independence Education in Inndia.pdf
Microbial diseases, their pathogenesis and prophylaxis
Cell Structure & Organelles in detailed.
BOWEL ELIMINATION FACTORS AFFECTING AND TYPES
Pharma ospi slides which help in ospi learning
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
O5-L3 Freight Transport Ops (International) V1.pdf
Classroom Observation Tools for Teachers
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
01-Introduction-to-Information-Management.pdf
TR - Agricultural Crops Production NC III.pdf

Networking Chapter 11

  • 1. CompTIA Network+ in a Nutshell Chapter Eleven
  • 2. Objectives • Discuss the standard methods for securing TCP/IP networks • Compare TCP/IP security standards • Implement secure TCP/IP applications
  • 3. TCP/IP and Security The “inventors” of TCP/IP did not include any real security
  • 4. • User names and passwords on FTP, Telnet, etc. do not begin to protect TCP/IP applications • Today every device with a public IP address on the Internet is targeted • Data moving between two hosts is intercepted and read • TCP/IP in its original form does not stop the bad guys
  • 5. • Making TCP/IP Secure • The four areas of securing TCP/IP A. Encryption -To scramble, mix up, change data It can be unscrambled by the person receiving it B. Non-repudiation - Process that guarantees that the data is as originally sent and came from the source you think it came from
  • 6. C. Authentication -Verifying that whoever accesses the data is the person you want accessing the data/ Classic form: user name and password combination D. Authorization- Defines what a person accessing the data can do with it Example: Windows permissions assigned to a user account
  • 7. • Encryption A. Plaintext and Cleartext -Two names for same thing Data in easily read or viewed industry-wide standard format -Does not mean that it is just “text”
  • 8. B. Cipher -series of complex and hard-to-reverse mathematics (an algorithm) -You run the cipher on a string of ones and zeroes to make a new set of ones and zeroes
  • 9. • Asymmetric-Key Algorithm Standards - Serious drawback to symmetric-key algorithms - Anyone who has the key can encrypt or decrypt data - Forces us to somehow send the key to the other person • Asymmetric-key algorithms developed as a method for the encryptor to safely send a key to the decryptor
  • 10. • Secure TCP/IP Applications A. The applications that use the above standards and tools B. HTTPS [Introduced in Chapter 9] - HTTPS documents page addresses begin with https:// -Most browsers also show a lock icon somewhere - HTTPS uses SSL/TLS for