Special Report
Network Security
Chapter 2
What Have You Learned?
- A network is ...
- Any large computer.
- Two or more computers connected together.
- Three or more computers connected together.
- At least two LANs connected together.
(See Section 1.1, Your Vulnerable Computer System.)
- When you hear about an incident of computer crime ...
- You are getting an accurate representation of the incidence of
computer crime globally.
- It is probably exaggerated.
- You are only hearing about a very small percentage of the actual
incidence of computer crime globally.
- None of the above.
(See Section 1.2, A Startling Discovery by the Department of Defense.)
- LAN stands for ...
- Local Area Network.
- Large Area Network.
- Large Area Node.
- Locally Aired Network.
(See Section 1.3, The Truth About Networks and the Internet.)
- When two or more LANs are connected together, they form a/an ...
- World Area Network.
- Wide Area Network.
- Secure ID address.
- IP address.
(See Section 1.3, The Truth About Networks and the Internet.)
- What is the unit of information that is used to transfer other
information from one computer system to another?
- The Internet.
- The LAN.
- The packet.
- The computer.
(See Section 1.3, The Truth About Networks and the Internet.)
- The sending and receiving of packets on a LAN is similar to ...
- The sending and receiving of radio transmissions.
- Two people talking on the telephone.
- Three or more people talking on the telephone via a "conference
call".
- A traffic accident.
(See Section 1.3, The Truth About Networks and the Internet.)
- Promiscuity mode ...
- Is the same as an IP address.
- Enables your computer to receive anything that is sent across your
network.
- Gives your computer more memory.
- Enables your computer to operate faster.
(See Section 1.3, The Truth About Networks and the Internet.)
- An IP address ...
- Is the same as an email address.
- Uniquely identifies the computer you are on.
- Both a and b.
- None of the above.
(See Section 1.4, The Frightening Reality of Computer Crime.)
- A firewall sits ...
- At the junction of the Internet and the LAN.
- Directly on the LAN.
- On your IP address.
- Directly on the Internet.
(See Section 1.5, The Firewall.)
- What does a firewall look for before it decides whether or not to
let you past?
- Your email address.
- Your IP address.
- Promiscuity mode.
- None of the above.
(See Section 1.5, The Firewall.)
- To get past a firewall, a cracker might program his computer to
look like it has your IP address. This is called ...
- Sequence number prediction.
- Bandwidth modification.
- LAN incognito.
- IP spoofing.
(See Section 1.5, The Firewall.)
- In order to use a stolen Secure ID Card, the cracker still needs
to know your ...
- LAN identification code.
- Email address.
- Password.
- Sequence number.
(See Section 1.6, Hardware Tokens---The Secure ID Card.)
- Why is hijacking more commonplace now than it was ten years ago?
- Computers are less expensive.now.
- Computers are more powerful now.
- Both a and b above.
- None of the above.
(See Section 1.7, Hijacking.)
- What do two computers use to communicate the "validity" of each
other's packets?
- Sequence numbers.
- IP challenge.
- Hijacking.
- IP spoofing.
(See Section 1.7, Hijacking.)
- The inclusion of Secure ID Cards and firewalls practically
guarantees that your network will be secure against attacks by crackers.
- True.
- False.
(See Section 1.7, Hijacking.)
- Surveillance is just as important as, if not more important than,
a firewall in a complete network security package.
- True.
- False.
(See Section 1.10, Surveillance: Your Own Secret Agent.)
2.1 Summary and Vocabulary Builder
Jennifer has a computer.
Jennifer's IP address is a number that uniquely identifies her
computer.
Jennifer's computer is connected to other computers on a Local Area
Network (LAN).
Jennifer's LAN is connected to other LANs, forming a Wide Area
Network (WAN).
Jennifer's WAN is connected to other WANs all across the world, forming
the Internet.
The information Jennifer sends out on the Internet is broken down into
packets.
Each packet has a sequence number, which ensures the validity
of the packet.
A cracker is a person who makes his living breaking into
computer systems.
A cracker can program his computer to promiscuity mode and
receive Jennifer's packets, thereby learning her passwords and user
names.
Jennifer can try to stop the cracker from getting onto her network by
putting up a firewall. A firewall checks the IP address of
anyone attempting to access Jennifer's network, and does not let anyone
through who does not have the proper IP address.
A cracker can obtain Jennifer's IP address and program his computer to
look like it has her IP address so that the firewall will let him in.
This is called IP spoofing.
To foil the cracker's IP spoofing attempts, Jennifer can employ the use
of a Secure ID Card. A Secure ID Card ensures that Jennifer is
who she says she is by enabling her to communicate with a similar
Secure ID Card on the firewall.
A cracker can get around Jennifer's Secure ID Card defense by using
sequence number prediction to hijack her session.
Jennifer can protect her network against hijacking through the use of a
Virtual Private Network (VPN). A VPN encrypts the data that
Jennifer sends, so that the cracker cannot read it.