9781111640125_IM_ch07

Security+ Guide to Network Security Fundamentals

Info iconThis preview shows pages 1–4. Sign up to view the full content.

View Full Document Right Arrow Icon
Security+ Guide to Network Security Fundamentals, Fourth Edition 7-1 Chapter 7 Administering a Secure Network At a Glance Instructor’s Manual Table of Contents Overview Objectives Teaching Tips Quick Quizzes Class Discussion Topics Additional Projects Additional Resources Key Terms
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Security+ Guide to Network Security Fundamentals, Fourth Edition 7-2 Lecture Notes Overview The Internet works on client-server architectures in general and this chapter covers the most common protocols and the tools and techniques used to secure them. Beyond the framework of Internet protocols are the frameworks and essential concepts needed to secure networks. Chapter Objectives List and describe the functions of common network protocols Explain how network administration principles can be applied Define the new types of network applications and how they can be secured Teaching Tips Common Network Protocols 1. Explain that computer networks also have protocols, or rules for communication. 2. Emphasize that these protocols are essential for proper communication to take place between network devices. 3. Mention that TCP/IP uses its own four-layer architecture that includes Network Interface, Internet, Transport, and Application. 4. Use Figure 7-1 to compare the OSI model and the TCP/IP model. Internet Control Message Protocol (ICMP) 1. Explain that ICMP is used by devices to communicate updates or error information to other devices. 2. Discuss the three fields contained in each ICMP message: Type (8-bit), Code (8-bit) and Checksum (16-bit). 3. Discuss attacks that use ICMP, including: a. Network discovery b. Smurf DoS attack c. ICMP redirect attack d. Ping of Death
Background image of page 2
Security+ Guide to Network Security Fundamentals, Fourth Edition 7-3 Simple Network Management Protocol (SNMP) 1. Explain that SNMP allows network administrators to remotely monitor, manage, and configure devices on the network. 2. Note that SNMP functions by exchanging management information between networked devices. 3. Emphasize that each SNMP-managed device must have an agent or a service that listens for commands and then executes them. 4. Discuss the security vulnerabilities in the different versions of SNMP. Domain Name System (DNS) 1. Describe the Domain Name System (DNS), which is a TCP/IP protocol that resolves (maps) an IP address (such as 69.32.148.124) with its equivalent symbolic name (www.course.com). 2. Note that the DNS is a database, organized as a hierarchy or tree, of the name of each site on the Internet and its corresponding IP number. 3. Discuss DNS poisoning and emphasize that it can be prevented by using the latest editions of the DNS software known as BIND, or Berkeley Internet Name Domain.
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Image of page 4
This is the end of the preview. Sign up to access the rest of the document.

This document was uploaded on 03/01/2012.

Page1 / 9

9781111640125_IM_ch07 - Security+ Guide to Network Security...

This preview shows document pages 1 - 4. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online