Ethics, Privacy and Computer Forensics
Download
Report
Transcript Ethics, Privacy and Computer Forensics
Ethics, Privacy and
Computer Forensics
Chap 14 Network Basics For
Digital Investigation
Overview of Networks
Imagine a long long cord …. These are networks
Computer connected to a network is called host
NIC – network interface card is the primary interface
with a network
Use hubs, routers, etc. to connect networks of
computers
Computers connected to the global internet use a
protocol called TCP/IP
Enable communication of dissimilar networks
Common language of network talk
An IP address is the address of a host on the network just like a
phone number
Overview of Networks
Routers are highly susceptible to attacks
because they are critical to communication
Firewalls are security devices that block
service and traffic destined to a certain
port
Network services include Telnet and FTP
Hosts have logs that details network
transactions and their data and time
Network Technology
Attached Resource Computer Network (ARCNET)
Earliest network technology
Developed by Datapoint Corp in 1970’s
Used active and passive hubs in the topology
Based on token scheme (proprietary)
Speeds from 2.5 Mbps (copper) to 20 Mbps (fiber)
Ethernet
Most popular and accepted technology for networking
Each computer has a NIC and it is connected to a central hub,
switch or router
Variable speeds
Uses Carrier Sense Multiple Access with Collision Detection
(CSMA/CD)
Like people at a dinner party, when two start talking at the same
time, both stop talking and then only one starts talking again
A typical ARCNET configuration.
Network Technology
Fiber Distributed data Interface (FDDI)
Encoding pulses of light
Expensive but fast
Data travel in only one direction
Developed in mid-1980’s
High Speed backbone connection between distributed
LANs
Dual Counter Rotating Rings: one primary, one
secondary
Attach up to 1000 workstations in both directions
Multiple messages/tokens rotate at the same time
Token Passing
Token circulates on a Ring Topology
Sender acquires free token, attaches message
and sends downstream
Receiver copies message and acknowledges
same in busy token
Original sender responsible for taking the
message off the ring and sending a free token
downstream
Deterministic performance
Good for factories
Can calculate maximum time to get to a unit
An FDDI network with primary and secondary token rings. During normal conditions, only one of the
rings is used and data travels in one direction. When a station or a cable segment fails, the traffic
loops to form a closed ring, moving data in the opposite direction.
Network Technology
Asynchronous Transfer Mode (ATM)
Uses fiber optics and special equipment called ATM
switches
Gigbts/sec communication rate
Establishes a connection first
ATM switch is connected to a large network
Connection-oriented protocol (over virtual paths
and/or channels)
Backbone Technology; switch-based; fiber based
Wireless
WLAN – uses RF technology
WAP – Wireless Access Point – connects
to wired LAN; acts as a wireless hub
WLAN Adapters – wireless NICs with
antennas
Wireless supports peer-to-peer without
WAPs
IEEE 802.11g
Speeds of 1-54 Mbps
Uses the 2.4GHz band
Is backwards compatible with IEEE
802.11b
Ratified in June of 2003
802.11 Wireless Security Issues
Easy to “listen” for id and password
Easy to mimic in order to gain access to
the wired Network
Earliest Protection was WEP – Wired
Equivalent Privacy – which was easy to
crack
WPA
Wi-Fi Protected Access
Replacement for WEP
WPA password initiates encryption
Encryption key changes every packet
Much harder to crack than WEP
Does not work in Ad Hoc Mode
Bluetooth
A wireless standard; short range
Used to connect network appliances,
printers, …
Low Power; max speed – 1Mbps over 30 foot
area or less
Operates in the 2.4GHz band and can
interfere with 802.11b
Connects devices point to point
A WLAN with two access points.
Wireless standards.
Multiple access points with overlapping coverage.
OSI Reference Model
Provides
useful way to describe and
think about networking
Breaks networking down into series
of related tasks
Each aspect is conceptualized as a
layer
Each task can be handled separately
The OSI Communications Reference
Model
OSI – Open Systems Interconnection
Committee of ISO
Reference adopted in 1978 (took 6 yrs)
Resulted in very little actual product
(software)
Is THE standard for describing networks;
the linqua franca of networking world wide
Understanding Layers
Layering
helps clarify process of
networking
Groups related tasks & requirements
OSI model provides theoretical frame
of reference
Clarifies
what networks are
Explains how they work
OSI Reference Model Structure
Breaks
networked communications
into even layers:
Application
Presentation
Session
Transport
Network
Data
Link
Physical
OSI Reference Model Structure
Each layer responsible for different aspect
of data exchange
Each layer puts electronic envelope
around data as it sends it down layers or
removes it as it travels up layers for
delivery
Each layer of OSI model communicates
and interacts with layers immediately
above and below it
OSI Reference Model Structure
Interface
boundaries separate layers
Individual layer communicates only
adjacent layers
“Peer layers” describes logical or
virtual communication between same
layer on both sending and receiving
computers
Relationships Among
OSI Layers
OSI Reference Model Structure
Date is broken into packets or PDUs as it
moves down stack
PDU
stands for protocol data unit, packet data
unit, or payload data unit
PDU is self-contained data structure from
one layer to another
At
sending end, each layer adds special
formatting or addressing to PDU
At receiving end, each layer reads packet and
strips off information added by corresponding
layer at sending end
Application Layer
Layer
7 is top layer of OSI reference
model
Provides general network access
Includes set of interfaces for
applications to access variety of
networked services such as:
File
transfer
E-mail message handling
Database query processing
May
also include error recovery
Presentation Layer
Layer 6 handles data formatting and
protocol conversion
Converts outgoing data to generic
networked format
Does data encryption and decryption
Handles character set issues and graphics
commands
May include data compression
Includes redirector software that redirects
service requests across network
Session Layer
Layer 5 opens and closes sessions
Performs data and message exchanges
Monitors session identification and security
Performs
logout
name lookup and user login and
Provides synchronization services on both
ends
Determines which side transmits data, when,
and for how long
Transmits keep-alive messages to keep
connection open during periods of inactivity
Transport Layer
Layer
4 conveys data from sender to
receiver
Breaks long data payloads into
chunks called segments
Includes error checks
Re-sequences chunks into original
data on receipt
Handles flow control
Network Layer
Layer 3 addresses messages for delivery
Translates logical network address into
physical MAC address
Decides how to route transmissions
Handles packet switching, data routing,
and congestion control
Through fragmentation or segmentation,
breaks data segments from Layer 4 into
smaller data packets
Reassembles data packets on receiving
end
Data Link Layer
Layer 2 creates data frames to send to
Layer 1
On receiving side, takes raw data from
Layer 1 and packages into data frames
Data
frame is basic unit for network traffic on
the wire
See next slide for contents of typical data
frame
Performs Cyclic Redundancy Check (CRC)
to verify data integrity
Detects errors and discards frames
containing errors
Data Frame
Physical Layer
Layer 1 converts bits into signals for
outgoing messages and signals into bits
for incoming messages
Manages computer’s interface to medium
Instructs driver software and network
interface to send data across medium
Sets timing and interpretation of signals
across medium
Translates and screens incoming data for
delivery to receiving computer
Actions of Each layer of
OSI Reference Model
OSI in Summary
The Reference Model breaks the
communication process into seven distinct
and independent layers
Each layer’s functionality is well defined as
is its interface with surrounding layers and
peer layers
Lower layers service upper layers in
sequence
Network interconnection hardware operates at various layers of the OSI
model.