Free Essay

Tcp/Ip Security Concerns

In:

Submitted By blackbear1277
Words 373
Pages 2
My topic of choice is on the TCP/IP security. As we have seen the transmission of data as securely as possible has become top on the list for many companies and persons. As we have begun using the Internet more and more to conduct business remotely, we need to ensure that our most sacred data is protected from harm.
To ensure that we understand the transmission of data using TCP/IP, I will explain the history of the protocol and the reason for this being the established standard used. As we have read and know it is a combination of two known protocols that were combined to become one. The Transport Control Protocol is used to ensure successful delivery of data. It carries the destination and source information such as the address for both. The IP protocol or Internet Protocol is the second. This protocol is only for sending data. It combined with TCP will ensure that the data is transmitted successfully.
When the protocols began to communicate they can use on of many ways to ensure successful communication. One being the hand shake method. There are more than one and will be explained in the paper. With that transmission come the possibility of interference and high jacking of data.
One common discussed security hole is the prediction of the send sequence. There is also the SYN and FIN scanning, which each attack. Then there is UDP security concerns, which an attacker uses empty UDP ports to send datagram’s. These are just a few ways there are security holes defined with using TCP/IP and I will explore them more in detail in the paper.
The Internet is full of information on the TCP/IP protocol. With that there are also many useful books with the information on the security and lack of security for the protocol. One source being the text we are using this semester. In addition below is a list of material I will be using to research my topic.
1. Network Architecture and Anaysis
2. Information Security for Technical Staff, Text used for OJT from Carnegie Mellon
3. http://www.linuxsecurity.com/resource_files/documentation/tcpip-security.html
4. http://www1.cs.columbia.edu/~smb/papers/ipext.pdf

Similar Documents

Premium Essay

Unix vs Windows Critique

...Hangzhou, China, Riordan’s e-business plays a vital role in continued growth. Riordan’s Internet site states, “Riordan Manufacturing, Inc. is an industry leader in the field of plastic injection molding. Purpose The purpose of this paper is to discuss the differences between UNIX/Linux versus Microsoft Windows. Our paper will discuss facts that cover security, administrative, networking, performance, programmability. Security Technical One of the key differences between the Unix approach to system security and the MS Windows approach is that significant security characteristics of Unix systems are a consequence of good architectural design. Modularity within the system is another example of architectural security in UNIX, but lacking in MS Windows. These differences in the design and relative security of Unix and Microsoft OSs illustrate a distinct difference in philosophy between them. A couple of factors considered in regards to the security features are the importance of privilege separation, user control and automatic execution. Unfortunately, the difference appears to be that where Unix has a philosophy of security built into the...

Words: 2022 - Pages: 9

Premium Essay

Set Up Access Control List for a Router

... Set Up Access Control List for a Router This configuration allows the IP packets with an IP header that has a source address in the network 182.64.0.0 and a destination address in the network 182.62.0.0 access to Network A. There is the implicit deny all clause at the end of the ACL which denies all other traffic passage through Ethernet 0 inbound on R1. Hostname R1 ! Interface Ethernet 0 IP access-group 101 in ! Access-list 101 permit IP 182.62.0.0 0.0.255.255 182.64.0.0 0.0.255.255 Hostname R1 ! Interface Ethernet 0 IP access-group 101 in ! Access-list 101 permit IP 182.62.0.0 0.0.255.255 182.64.0.0 0.0.255.255 In the command access-list 101 permit IP 182.62.0.0 0.0.255.255 182.64.0.0 0.0.255.255, the "0.0.255.255" is the inverse mask of network 182.62.0.0 with mask 255.255.0.0. ACLs use the inverse mask to know how many bits in the network address need to match. In the table, the ACL permits all hosts with source addresses in the 182.62.0.0 network and destination addresses in the 182.64.0.0 network. Deny Telnet Traffic (TCP, Port 23) Hostname R1 ! Interface ethernet0 IP access group 102 in ! Access-list 102 deny tcp any any eq 23 Access-list 102 permit IP any any Hostname R1 ! Interface ethernet0 IP access group 102 in ! Access-list 102 deny tcp any any eq 23 Access-list 102 permit IP any any In order to meet higher security concerns, you might have to disable Telnet access to your private network from the public...

Words: 527 - Pages: 3

Free Essay

Tcp/Ip

...TCP/IP This week’s paper will provide an overview into the world of the Transmission Control Protocol (TCP) and Internet Protocol (IP), and how they are used together in business and telecommunications. Frist, the current TCP/IP offerings as, as they apply to the OSI model, will be discussed. Second, the future of TCP/IP will be discussed with relevant research support as well as recommendations for new software and equipment. Finally, an overview of different methods for reducing network congestion through the use of equipment, software and multiplexing will be given. Current Offerings of TCP/IP In business, the OSI and TCP/IP have been the standard method of network classification for many years. The Open Systems Interconnect Model (OSI) can be thought of as an idea or guideline, while TCP/IP more closely relates to reality. Both models do mostly the same thing, but TCP/IP is a more efficient method, and usually matches up directly with the network. Because OSI is more of an idea, it is not utilized as much as TCP/IP. With the creation of smart switches and other advanced network equipment and functions, more layers can be combined and a more streamlined process can be gained. Because of this, TCP/IP is the most used model in modern networks, while OSI is used for describing network activity. Improving TCP/IP As TCP/IP ages and new technology comes about, there is a need to upgrade software and hardware to keep up with the demands of modern networking. Below we will...

Words: 1158 - Pages: 5

Premium Essay

Indp Part 2

...standard seven layer framework utilized by the industry. These protocols are important because they establish the communication rules. Two devices that require each other to communicate on a network must follow a set of rules to ensure they are compatible to each other. The seven layers of the OSI specify the hardware and software component requirements to ensure that the collection of these is adequate enough to exchange information on the network. The inclusion of a WLAN, WAN, and VoIP will require additional protocols that are unique from the OSI. * Required Protocols * The Transmission Control Protocol/Internet Protocol (TCP/IP) and VoIPs are required for the improvement designs to the Patton-Fuller network. There is a four-layer reference model for the TCP/IP and they all relate to one or more of the seven OSI layers. * TCP/IP Layer...

Words: 1783 - Pages: 8

Premium Essay

Nt1310 Unit 1 Rule Essay

...the same action. For example, Rule-8 in Table 1 is redundant to Rule-9. The firewall policy won’t change while removing a redundant rule. It will waste the firewall processing time and it leads to speed problem and also it require lot of memory to store the redundant rule. Without any change in the firewall policy, we can able to delete the redundant rules which are not necessary to check. 1.3.3. SWAPPING THE RULE POSITION: In Listed-Rule firewall if two rules have different action then swapping the position of that rule can cause policy changes on the firewall and both of them can be matched with the same packet. For example, swapping between Rule-7 and Rule-8 (see Table 1) will change the action on the packet (with Source IP = 172.3.3.9, Destination IP = 20.3.3.9, Destination Port = 80) from being accepted to being...

Words: 1317 - Pages: 6

Premium Essay

Indp Part 2 Final

...Systems Interconnection (OSI) protocol model is a standard seven layer framework utilized by the industry. These protocols are important because they establish the communication rules. Two devices that require each other to communicate on a network must follow a set of rules to ensure they are compatible to each other. The seven layers of the OSI specify the hardware and software component requirements to ensure that the collection of these is adequate enough to exchange information on the network. The inclusion of a WLAN, WAN, and VoIP will require additional protocols that are unique from the OSI. Required Protocols * The Transmission Control Protocol/Internet Protocol (TCP/IP) and VoIPs are required for the improvement designs to the Patton-Fuller network. There is a four-layer reference model for the TCP/IP and they all relate to one or more of the seven OSI layers. * ATM-user network interface (Goleniewski, 2007, p. 169). * Layer one defines the interface to the...

Words: 1773 - Pages: 8

Premium Essay

Sec280

...the main questions for the concerns of our network, NO. These items that have been heard about do not require immediate attention as they are considered normal. We are protected behind our firewall as well as if the employees do as asked at the end of their shift, we will have absolutely nothing to worry about. As more in likely that situation was handled when we brought the network online. Here is a brief rundown on your concerned areas: Ping Sweeps and Port Scans are the two most common network probes that serve as important clues in sensing invasions or intrusions that can harm any type of network. Network probes are not actual intrusions, although, they could be potential causes of actual intrusions. Port scans and ping sweeps can lead to an intrusion of companies’ network system, however, with today’s technological advancements, these activities can be detected and prevented. Ping Sweeps; Ping sweeps are a set of ICMP Echo packets that are sent out to network of computers, actually a range of IP addresses, to see if there are any responses. As an intruder sends out the ping sweeps, he looks for responses so he can figure out which machines he can attack. “Note that there are legitimate reasons for performing ping sweeps on a network—a network administrator may be trying to find out which machines are alive on a network for diagnostic reasons. Ping sweeps are detectable using special tools as well. IPPL is an IP protocol logger that can log TCP, UDP and ICMP packets. It...

Words: 1129 - Pages: 5

Premium Essay

Studyguide for Nt1210 Mid Term

...1230 Client server Topics • Transmission Control Protocol (TCP)/Internet Protocol (IP) for Wired and Wireless Networks • The Open Systems Interconnections (OSI) Model • IP Addressing • Firewalls TCP/IP for Wired and Wireless Networks[1] TCP/IP is an open-standard communications protocol suite that is the standard for communicating on the Internet • TCP and IP (two different protocols) contain all the fundamental mechanisms needed to support any and all types of networked communications • TCP/IP was developed as part of the ARPAnet project in the 1960’s (the early development of the current Internet) • TCP/IP became a unifying and reliable element that enabled interoperability across incompatible systems • One of TCP/IP's most basic yet critical functions is its preparation of application data for transmission across a network. • TCP/IP accepts data of virtually any size from applications (typically in the form of a file) and chops it up into smaller, more manageable chunks called segments (segmentation) • In communicating, TCP handles flow control, IP handles addressing • Being a suite of different protocols, TCP/IP includes such protocols as DNS, DHCP, http, ftp, POP3, SMTP and TELNET. Other TCP protocols may be found at http://www.protocols.com/pbook/tcpip1.htm The Open Systems Interconnections (OSI) Model The most common way to illustrate the communication...

Words: 1931 - Pages: 8

Free Essay

Information

...Information Assurance and Security Nick Rosasco Karthikreddy Nalapatla 3884252 What is a Port Number A port number is a way to identify a specific process to which an internet or other network message is to be forwarded when it arrives at a server. For the transmission control protocol and the user Datagram protocol, a port number is a 16 bit integer that is put the header appended to a message unit. This port number is passed logically between the client and the server transport layers and physically between the transport layer and the Internet Protocol layer and it will forward it on to the other layers. For an example, a request from a client to a server on the internet may request a file to transfer from the host File Transport Protocol (FTP) server. In order to pass that request which is passed by us to the FTP in the remote server, the Transmission Control Protocol (TCP) identifies the port number which is of 16 bit length, then that port will forward the request to the FTP Server. FTP and the FTP Port Number The File Transfer Protocol (FTP) is a standard network protocol used to transfer computer files from one host to the other host over a TCP – based network, for an example Internet. FTP is a Client – server architecture and uses a separate control and the data connections between the client and the server. The model of the FTP is shown below. Fig 1: File Transport Protocol Model Executing an...

Words: 1400 - Pages: 6

Free Essay

Firewalls: Guidelines and Procedures

...and Procedures Introduction Firewalls are devices or programs that control the flow of network traffic between networks or hosts that employ differing security postures. While firewalls are often discussed in the context of Internet connectivity, they may also have applicability in other network environments. For example, many enterprise networks employ firewalls to restrict connectivity to and from the internal networks used to service more sensitive functions, such as accounting or personnel. By employing firewalls to control connectivity to these areas, an organization can prevent unauthorized access to its systems and resources. Inclusion of a proper firewall provides an additional layer of security (Broida, 2011). This research paper will give a background on firewalls. The background will cover an overview of firewall technologies, as well as firewall technologies, the common requirements of firewalls, and firewall policies. This paper will also give an analysis of firewalls which will consist of what I have learned in doing this research and my opinion on the research. Overview of Firewall Technologies Several types of firewall technologies are available. One way of comparing their capabilities is to look at the Transmission Control Protocol/Internet Protocol [TCP/IP] layers that each is able to examine. TCP/IP communications are composed of four layers that work together to transfer data between hosts. When a user wants to transfer data across networks, the data...

Words: 3077 - Pages: 13

Premium Essay

Technology

...CHaPTer Firewall Fundamentals 2 T O SOME NETWORK ADMINISTRATORS, A FIREWALL is the key component of their infrastructure’s security. To others, a fi rewall is a hassle and a barrier to accomplishing essential tasks. In most cases, the negative view of fi rewalls stems from a basic misunderstanding of the nature of fi rewalls and how they work. This chapter will help dispel this confusion. This chapter clearly defi nes the fundamentals of fi rewalls. These include what a fi rewall is, what a fi rewall does, how it performs these tasks, why fi rewalls are necessary, the various fi rewall types, and fi ltering mechanisms. Once you understand these fundamentals of fi rewalls, you will able to look beyond the unschooled opinions, common mythology, and marketing hype surrounding them, and the crucial benefi ts of effective fi rewall architecture will become clear. Like any tool, fi rewalls are useful in solving a variety of particular problems and in supporting essential network security. Chapter 2 Topics This chapter will cover the following topics and concepts: • What a fi rewall is • Why you need a fi rewall • How fi rewalls work and what they do • What the basics of TCP/IP are • What the types of fi rewalls are • What ingress and egress fi ltering is • What the types of fi rewall fi ltering are • What the difference between software and hardware fi rewalls is • What dual-homed and triple-homed fi rewalls...

Words: 15354 - Pages: 62

Premium Essay

Team a Protocol Paper

...constructed and how data moves up and down this stack. However, there are other components that are just as important such as, TCP/IP, circuit and packet switching, and the major protocols that circuit and packet switching use. These processes are truly important because without them the way we communicate today would not exist. Open Systems Interconnection Protocol The Open Systems Interconnection (OSI) is a framework for how applications will communicate and work over a network. There are seven layers of related functions that a computer can provide for a user, which define the how two endpoints communicate in a telecommunication network. “The seven layers of function are provided by a combination of applications, operating systems, network card device drivers and networking hardware that enable a system to put a signal on a network cable or out over Wi-Fi or other wireless protocol” (WhatIs.com, 2015). Below is a description of these seven layers. Layer | Name | Description | 7 | Application Layer | This role identifies how the user will access the data and what services will be in play. Examples of this are directory services and remote file access (Microsoft, 2015). | 6 | Presentation Layer | At the operating system, this role carries the original message, encrypts the message, and presents it as intended (WhatIs.com, 2015). | 5 | Session Layer | TCP/UDP handles this layer over the Internet, which establishes,...

Words: 2378 - Pages: 10

Premium Essay

It 230 Computer Networking

...Network Design: XYZ School System Network Design: XYZ School System IT 230 Computer Networking Executive Summary {complete during Week Nine} Write 3-4 paragraphs describing the goals of the network design project, assumptions, pros and cons of the proposed solutions, and project constraints. Cabling Specifications 1. The following specification represents the minimum requirements for the installation of cabling and equipment data cabling in any offices or labs to be constructed or modified for the XYZ School System. 2. Minimum Cabling Requirements a. The Data Cabling and termination shall be in accordance with wiring configurations as per ANSI/TIA/EIA-568-B standards b. All cabling runs must be uninterrupted and without splices c. Where cabling is to be enclosed in a solid wall, the cables should be installed within a conduit for a additions or reconfigurations 3. General Specifications a. Data cable (CAT-6 UTP) i. Terminating method: CAT-6 socket 1. Green/White (1) 2. Green (2) 3. Orange/White (3) 4. Blue (4) 5. Blue/White (5) 6. Orange (6) 7. Brown/White (7) 8. Brown (8) ii. Each data point should have all 4pairs assigned and terminated as per ANSI/TIA/EIA-568-B standards b. Cables Labeling i. Data plates 1. On each face plate a unique number will be used to indicate the data’s location of cable termination on the patch panel 2. The data ports will be marked with orange labeling for each data connection ii. Wiring labels 1. Each cable will be sequentially numbered...

Words: 6096 - Pages: 25

Free Essay

Unix vs. Windows Server

...Southwest Michigan and Northwest Ohio, Pace Glass Company's online business plays a vital role in continued growth and as such there is heavy consideration underway as to which type of computer operating base the company upgrades will be implemented against. Pace Glass executives and partners recognize that security and reliability are key to the continued growth in their online presence which plays a substantial role in system determination. Purpose The purpose of this study is to discuss the differences between Unix, Linux and Microsoft Windows and server environments. This study will discuss facts that cover security, administrative, networking, performance, programmability as well as provide a briefing in conclusion. Security Approach A fundamental difference between the Unix approach to system security and the Windows approach is that significant security characteristics of Unix systems are a consequence of good architectural design as well as modularity. These differences in the design and relative security of Unix and Microsoft operating systems illustrate a distinct difference in philosophy between them. A couple of factors considered in regards to the security features are the importance of privilege separation, user control, and automatic execution. Unfortunately, the difference appears to be that where Unix has a...

Words: 2110 - Pages: 9

Premium Essay

It Security

...CHaPTer Firewall Fundamentals 2 T O SOME NETWORK ADMINISTRATORS, A FIREWALL is the key component of their infrastructure’s security. To others, a fi rewall is a hassle and a barrier to accomplishing essential tasks. In most cases, the negative view of fi rewalls stems from a basic misunderstanding of the nature of fi rewalls and how they work. This chapter will help dispel this confusion. This chapter clearly defi nes the fundamentals of fi rewalls. These include what a fi rewall is, what a fi rewall does, how it performs these tasks, why fi rewalls are necessary, the various fi rewall types, and fi ltering mechanisms. Once you understand these fundamentals of fi rewalls, you will able to look beyond the unschooled opinions, common mythology, and marketing hype surrounding them, and the crucial benefi ts of effective fi rewall architecture will become clear. Like any tool, fi rewalls are useful in solving a variety of particular problems and in supporting essential network security. Chapter 2 Topics This chapter will cover the following topics and concepts: • What a fi rewall is • Why you need a fi rewall • How fi rewalls work and what they do • What the basics of TCP/IP are • What the types of fi rewalls are • What ingress and egress fi ltering is • What the types of fi rewall fi ltering are • What the difference between software and hardware fi rewalls is • What dual-homed and triple-homed fi rewalls...

Words: 15354 - Pages: 62