Fast Track Computer Network
Fast Track Computer Network
• Computer Networks
• Cyber Security
• in order to help students how to deal with the computer networks and protect their
• Evaluation Criteria:
• Participation and exercise completion (40%)
• Exam after finishing all the main conceptual courses (60%)
Course Topics
o CompTIA Network
o https://maharatech.gov.eg/enrol/index.php?id=22
o https://maharatech.gov.eg/enrol/index.php?id=37
Session 1 (Network Essentials)
• Session Outlines
• Computer Networks
• Definition and Basic Terminologies
• Transport layer
• Internet layer
• Resources can be :
• File Sharing
• Devices Sharing
• Medium
• Wired -Wireless –Satellites
• Software
• Messages
• Protocols
• Repeater
• Regenerate the signal over the same network before the signal becomes too weak or
corrupted
• Switch
• Allow different nodes to communicate with each other at the same network and time
without slowing each other
• Router
• Allow different networks to communicate with each other
Networks Classifications
According to network topology
How the computer are connected
A 10.0.0.0 to 10.255.255.255
B 172.16.0.0 to 172.31.255.255
2001:0db8:0000:0000:0000:8a2e:0370:7334
=
2001:db8::8a2e:370:7334
Session 1 (TCP/IP Protocol
Architecture)
• Internet Of Things (IOT)
• Aims connect all devices to the existing Internet
infrastructure.
• "things" that sense and collect data and send it to
the internet.
• (Eg:- coffee maker, A.C, Washing Machine, Ceiling
Fan, lights , any thing ) having sensors can be
connected with internet.
• PRACTICAL APPLICATIONS:-
• Smart Homes -Smart Cities-Energy - Environment
monitoring- healthcare- Management
Session 1 (TCP/IP Protocol
Architecture)
• Network Access Layer
• Datalink Layer
- Logical interface between end system and network
- Error notification.
(FRAMES, MEDIA ACCESS CONTROL)
- Hop to Hop addressing
- Error detection Mechanism (detects damaged or lost frames)
• Physical Layer
- defines the electrical, mechanical, Transmission medium
- movements of individual Bits from one node to next
Session 1 (TCP/IP Protocol
Architecture)
• Physical Addresses (Mac)
• Physical Address burned on the card
• Unique address over the world
• 48-bit (6-byte) written as 12 hexadecimal digits;
• every byte (2 hexadecimal digits) is separated by a colon
• Threats is A person, thing, event or idea which poses danger to an asset in terms of that asset’s
confidentiality, integrity, availability or legitimate use
• It's impossible to totally eliminate risk & There is NO simple solution to securing information
• Passive Attack
• Difficult to detect, because the attacker isn’t actively sending traffic (malicious or
otherwise)
• Example: An attacker capturing packets from the network and attempting to decrypt
them
• Active Attack
• Easier to detect, because the attacker is actively sending traffic that can be detected.
• An attacker might launch an active attack in an attempt to access information or to
modify data on a system.
Session 2 (Attackers Methodology & Methods)
• What does a Malicious Hacker Do?
• Reconnaissance
• where an attacker seeks to gather as much information as possible about a target to
launching an attack.
• Scanning
• the hacker scans the network with specific information gathered during
reconnaissance. Scanning for open ports, operating systems, applications,
• Gaining Access
• the true attack phase. The hacker exploits the system.
• Maintaining Access
• the hacker tries to retain his ‘ownership’ of the system.
• Sometimes, hackers harden the system from other hackers.
• Covering Tracks
• activities undertaken by the hacker to extend his misuse of the system without being
detected. Hackers can remain undetected for long periods.
Session 2 (Attackers Methods)
• Social engineering
• the ability of something or someone to influence the behavior of a group of people.
Like tricking someone to disclose information or taking action.
• PHISHING ATTACK:
• A fake web page which looks exactly like a popular website such ( facebook, twitter, Gmail ,
paypal , bank page ) to persuade you to enter information identity such as username ,
passwords and credit cards details
• the hacker records the username and password and then tries that information on the real site.
• HIJACK ATTACK
• a hacker takes over a session between you and another individual and disconnects the other
individual from the communication. You still believe that you are talking to the original party
and may send private information to the hacker by accident.
• Insider Attack
• involves someone from the inside, such as a dissatisfied employee, attacking the network.
Session 2 (Attackers Methods)
• SPOOF ATTACK
• the hacker modifies the source address of the packets he or she is sending so that
they appear to be coming from someone else. This may be an attempt to bypass your
firewall rules.
• BUFFER OVERFLOW ATTACK
• A buffer overflow attack is when the attacker sends more data to an application than is
expected. usually results in the attacker gaining administrative access to the system in a
command prompt or shell
• PASSWORD ATTACK
• An attacker tries to crack the passwords stored in a network account database or a password-
protected file.
• Dictionary attack
• Brute-force attack
• Hybrid attack.
Session 2 (Malicious Software (Malware )types)
• Backdoor or Trapdoor
• Secret entry point into a program ,Have been commonly used by developers
• Can’t be removed or scanned and the only way is to uninstall sw or format the system
• Trojan Horse
• program with hidden side-effects which is usually superficially attractive eg game,
software upgrade etc .
• allows attacker to indirectly gain access they do not have directly
• used to propagate a virus/worm or install a backdoor
• Open some ports or pass some malicious files
• Viruses
• A virus is malicious software that is attached to another program to execute a
particular unwanted function on a user's workstation.
• Both propagates itself & Carries code to make copies of itself
Session 2 (Malicious Software (Malware )types)
• Worms
• Replicating but not infecting program Typically spreads over a network Using
users distributed privileges or by exploiting system vulnerabilities Widely used
by hackers to create zombie pc's, subsequently used for further attacks,
especially DOS
• Major issue is lack of security of permanently connected systems
• Zombie
• Program which secretly takes over another networked computer then uses it to
indirectly launch attacks
• Often used to launch distributed denial of service (DDoS) attacks
• Ransomware
• Malware that locks a computer or device or encrypts data (Crypto ransomware)
on an infected endpoint with an encryption key ,only the attacker knows the
key the data unusable until the victim pays a ransom (usually cryptocurrency,
such as Bitcoin).
Session 2 (Malicious Software (Malware )types)
• DoS Attack
• Denial of service is about without permission knocking off
services, for example through crashing the whole system.
• This kind of attacks are easy to launch and it is hard to
protect a system against them.
• Consume host resources
• Memory
• Processor cycles
• Consume network resources
• Bandwidth
• Dos Attack (Ping of Death)
• DDoS Attack
• A distributed denial of service attack uses multiple machines to
prevent the legitimate use of a service.
• TCP SYN flood
Session 2 (Malicious Software (Malware )types)
• Spam
• Spam is a serious network threat that can overload ISPs, email servers and
individual end-user systems. A person or organization responsible for sending
spam is called a spammer. Spammers often make use of unsecured email servers
to forward email. Spammers can use hacking techniques, such as viruses, worms
and Trojan horses to take control of home computers.
• Spyware
• Spyware is any program that gathers personal information from your
computer without your permission or knowledge. This information is sent to
advertisers or others on the Internet and can include passwords and account
numbers.
• Tracking Cookies
• Cookies are a form of spyware but are not always bad. They are used to record
information about an Internet user when they visit websites
Session 2 (Attacks Mitigation)
• Firewall
• A Firewall is one of the most effective security tools available for protecting internal
network users from external threats.
• A firewall resides between two or more networks and controls the traffic between them
as well as helps prevent unauthorized access
• Static Packet Filtering (stateless firewall )
• - Prevents or allows access based on IP or MAC addresses.
• Dynamic Packet Filtering (state full firewall)
• Incoming packets must be legitimate responses to requests from internal
hosts. Unsolicited packets are blocked unless permitted specifically. can
filter out specific types of attacks such as DoS.
Session 2 (Attack Mitigation)
• Proxy Server
• A computer system (or an application program) that intercepts internal user
requests and then processes that request on behalf of the user
• Goal is to hide the IP address of client systems inside the secure network
• VPN
• It Tunnel the traffic between the Two Sides of Network
• Kinds:
• Remote Access VPN
• Site to Site VPN
Session 2 (Attack Mitigation
)
• Intrusion Detection and Prevention Systems
• NIDS:
• Watch the Network Traffic and if there is Intrusion it
Detects that there is Bad traffic Flow.
• it send alarms and logs
• NIPS:
• Stops the traffic if it detects that there is intrusion
• Signature-based: look for the perfect match
• Anomaly-based: Built a based line of what is normal
• Behavior-based: observe and report
• Next generation Firewall (NGFW)
• is,a “deep-packet inspection firewall that moves beyond port/protocol
inspection and blocking to add application-level inspection, intrusion
prevention, and bringing intelligence from outside the firewall.”
Session 2 (Encryption)
• Encryption
• converts the original representation of the information,
known as plaintext, into an alternative form known as
ciphertext.
• Digital Signatures
• A digital signature is done by hashing a document and then encrypting the hash with a private
key.
• Any entity (like a bank) that has the public key can verify that the document is signed by the
owner of the private key.
• digital signatures do not provide confidentiality but only provide nonrepudiation and integrity.
• How to use your local firewall to block a port and stop DOS attack
from a zombie device
Session 3 (Distributed System)
• Distributed Systems
• Is a group of computers working together as to
appear as a single computer to the end-user.
• Protocols ,The way the messages are communicated reliably whether it’s
sent, received, acknowledged or how a node retries on failure is an
important feature of a distributed system.
• Scalability, Distributed systems were created out of necessity as services
and applications needed to scale and new machines needed to be added
and managed.
Session 3 (Types of Distributed System)
• Four architecture types :
1. Client-server:
• a server as a shared resource like (a printer, database, or a
web server)
• Multiple clients use the shared resource.
2. Three-tier:
- can rely on a middle tier to do the processing and decision
making.
-The middle tier could be called an agent that receives
requests from clients, and then forwards it on to the servers.
- Most of the first web applications fall under this category.
Session 3 (Types of Distributed
System)
3- Multi-tier (n-tier)
• Enterprise web services popularized the application servers
that contain the business logic
- n-tier interacts both with the data tiers and presentation tiers.
- Ex : google.com
4- Peer-to-peer :
• No centralized or special machine that does the heavy lifting
and intelligent work in this architecture.
• All the decision making and responsibilities are split up
amongst the machines involved and each could take on client
or server roles.
• Blockchain is a good example of this.
Session 3 (Distributed System
Examples)
• Domain Name System (DNS)
• Distributed lookup table of hostname to IP address
• Facebook & Google use distributed systems extensively
• Massive scale
• Fast enough
• Very reliable
• Cloud Computing
• Virtualization
Session 3 (Virtualization)
• Virtualization
• Is a technology that run multiple same or different operating systems which is
completely isolated from each other at the same time on the same machine
• Example: run both windows and Linux on the same machine
• Public.
• A cloud infrastructure that is open to use by the general public. It’s owned, managed, and operated by a third party
(or parties), and it exists on the cloud provider’s premises.
• Private.
• A cloud infrastructure that is used exclusively by a single organization. It may be owned, managed, and operated by
the organization or a third party (or a combination of both), and it may exist on premises or off premises.
• Hybrid.
• A cloud infrastructure that comprises two or more of the aforementioned deployment models, bound by
standardized or proprietary technology that enables data and application portability (for example, fail over to a secondary
data center for disaster recovery or content delivery networks across multiple clouds).
• Community.
• A cloud infrastructure that is used exclusively by a specific group of organizations
Session 3 Practices