answer the following questions on the world documentation feel free to ask when it is not clear.
- ‘Network security’ often used interchangeably with ‘cybersecurity’? Why? Do you agree? Why or why not – write 500 words.
- List and describe each of the layers of the TCP/IP Model. Also list each layer in the table below.
- List and describe each of the layers of the OSI Model.
- What is the difference between TCP/IP and OSI models?
For each of the terms below – describe it and write it at the correct place on the table (see examples below). User your book and/or web for resources.
- Ethernet Cable – The physical cable used in to connect to devices in wired networks. Layer 1.
- Optical fiber
- WIFI
- Radio waves
- Packet
- MAC
- ARP
- IP address
- IP spoofing
- ARP Cache poisoning
- Router
- UDP
- SYN flood
- Port scanning
- Port
- NMAP
- Ping
- Ping of Death
- Firewall – An application used to filter traffic in a network. Can span layers (layers 3, 4, 5).
- Session hijacking
- SSL
- TLS
- SSH
- HTTP
- HTTPS
- Digital key
- FTP
- IDS
- IPS
- Trojan horse
- Physical security
- Eavesdropping
- Switch
- Flooding attacks
- ARP spoofing
- WPA2
- VLAN
- Encryption
- IPv4
- IPv6
- IPSec
- VPN
- Access control list
- Segments
- DNS
- DNS Spoofing
- DoS
- ICMP
- Malware
- DDoS
- Zombie
- Botnet
- Onion routing
- Wireless networks function on many of the same principles discussed in class. Study https://www.consumer.ftc.gov/articles/0013-securing-your-wireless-network and go through the steps to ensure that your home or a friends wireless network is secure. Provide here a log of the steps you took and explain why you took them.
- Create a brief ‘tip sheet’ to give to your friends and family on being secure on public WiFi networks (like on an airport). Along with tips, give a small explanation on the consequences of not taking security precautions on public networks.
TCP/IP Model | Components/protocols | Vulnerabilities | Attacks |
Physical | Ethernet cable |