background preloader

Mankwe

Facebook Twitter

Manuel Dantas

Cyber Intelligent Security - Be a CCFAi-Certified Professional Ethical Hacker. Insecure.Org - Nmap Free Security Scanner, Tools & Hacking resources. BackTrack Linux - Penetration Testing Distribution. Penetration Testing Software. Wireshark · Go deep. Home Network Security. This section provides a basic introduction to the technologies that underlie the Internet.

Home Network Security

It was written with the novice end-user in mind and is not intended to be a comprehensive survey of all Internet-based technologies. Subsections provide a short overview of each topic. This section is a basic primer on the relevant technologies. For those who desire a deeper understanding of the concepts covered here, we include links to additional information. Network Security Resources. Network Security is the process of taking physical and software preventative measures to protect the underlying networking infrastructure from unauthorized access, misuse, malfunction, modification, destruction, or improper disclosure, thereby creating a secure platform for computers, users and programs to perform their permitted critical functions within a secure environment.

Network Security Resources

Paid SANS Network Security Resources SEC503: Intrusion Detection In-Depth This is the most advanced program in network intrusion detection where you will learn practical hands-on intrusion detection methods and traffic analysis from top practitioners/authors in the field. All of the course material is either new or just updated to reflect the latest attack patterns. Network security. Network security[1] consists of the provisions and policies adopted by a network administrator to prevent and monitor unauthorized access, misuse, modification, or denial of a computer network and network-accessible resources.

Network security

Network security involves the authorization of access to data in a network, which is controlled by the network administrator. Users choose or are assigned an ID and password or other authenticating information that allows them access to information and programs within their authority. Network security covers a variety of computer networks, both public and private, that are used in everyday jobs conducting transactions and communications among businesses, government agencies and individuals.

HDLC, UDP, FTP, HTTP, GSM, SIP, GPRS. Internet protocol suite. The Internet protocol suite is the computer networking model and set of communications protocols used on the Internet and similar computer networks.

Internet protocol suite

It is commonly known as TCP/IP, because its most important protocols, the Transmission Control Protocol (TCP) and the Internet Protocol (IP), were the first networking protocols defined in this standard. Often also called the Internet model, it was originally also known as the DoD model, because the development of the networking model was funded by DARPA, an agency of the United States Department of Defense. TCP/IP provides end-to-end connectivity specifying how data should be packetized, addressed, transmitted, routed and received at the destination. The TCP/IP model and related protocol models are maintained by the Internet Engineering Task Force (IETF).

Telecommunications. TCP / IP Protocols: ICMP UDP FTP HTTP Reference Page. The Defense Advance Research Projects Agency (DARPA) originally developed Transmission Control Protocol/Internet Protocol (TCP/IP) to interconnect various defense department computer networks.

TCP / IP Protocols: ICMP UDP FTP HTTP Reference Page

The Internet, an international Wide Area Network, uses TCP/IP to connect government and educational institutions across the world. TCP/IP is also in widespread use on commercial and private networks. The TCP/IP suite includes the following protocols The TCP/IP suite is illustrated here in relation to the OSI model: Click the protocols on the map to see more details. RFC 1180 - TCP/IP tutorial. [Docs] [txt|pdf] [Errata] INFORMATIONAL Errata Exist Network Working Group T.

RFC 1180 - TCP/IP tutorial

Socolofsky Request for Comments: 1180 C. Kale Spider Systems Limited January 1991 Status of this Memo This RFC is a tutorial on the TCP/IP protocol suite, focusing particularly on the steps in forwarding an IP datagram from source host to destination host through a router. It does not specify an Internet standard. Distribution of this memo is unlimited. 1. This tutorial contains only one view of the salient points of TCP/IP, and therefore it is the "bare bones" of TCP/IP technology. RFC 1180 A TCP/IP Tutorial January 1991 The next section is an overview of TCP/IP, followed by detailed descriptions of individual components.

RFC 2460 - Internet Protocol, Version 6 (IPv6) Specification. [Docs] [txt|pdf] [draft-ietf-ipngwg...]

RFC 2460 - Internet Protocol, Version 6 (IPv6) Specification

[Diff1] [Diff2] [Errata] Updated by: 5095, 5722, 5871, 6437, 6564, 6935, DRAFT STANDARD 6946, 7045, 7112 Errata Exist Network Working Group S. Deering Request for Comments: 2460 Cisco Obsoletes: 1883 R. Hinden Category: Standards Track Nokia December 1998 Status of this Memo This document specifies an Internet standards track protocol for the Internet community, and requests discussion and suggestions for improvements. Please refer to the current edition of the "Internet Official Protocol Standards" (STD 1) for the standardization state and status of this protocol. RFC 2460 IPv6 Specification December 1998 Appendix A. 1. RFC 791 - Internet Protocol.

[Docs] [txt|pdf] [Errata] Updated by: 1349, 2474, 6864 INTERNET STANDARD Errata Exist RFC: 791 INTERNET PROTOCOL DARPA INTERNET PROGRAM PROTOCOL SPECIFICATION September 1981 prepared for Defense Advanced Research Projects Agency Information Processing Techniques Office 1400 Wilson Boulevard Arlington, Virginia 22209 by Information Sciences Institute University of Southern California 4676 Admiralty Way Marina del Rey, California 90291 September 1981 Internet Protocol TABLE OF CONTENTS PREFACE ........................................................ iii 1.

RFC 791 - Internet Protocol

INTRODUCTION ..................................................... 1 1.1 Motivation .................................................... 1 1.2 Scope ......................................................... 1 1.3 Interfaces .................................................... 1 1.4 Operation ..................................................... 2 2. September 1981 Internet Protocol [Page ii] 1.1. 1.2. 1.3.

Firewall (computing) An illustration of where a firewall would be located in a network.

Firewall (computing)

In computing, a firewall is a software or hardware-based network security system that controls the incoming and outgoing network traffic by analyzing the data packets and determining whether they should be allowed through or not, based on applied rule set. A firewall establishes a barrier between a trusted, secure internal network and another network (e.g., the Internet) that is not assumed to be secure and trusted.[1] Firewall technology emerged in the late 1980s when the Internet was a fairly new technology in terms of its global use and connectivity. The predecessors to firewalls for network security were the routers used in the late 1980s:[3] The first paper published on firewall technology was in 1988, when engineers from Digital Equipment Corporation (DEC) developed filter systems known as packet filter firewalls.

Packet filters act by inspecting the "packets" which are transferred between computers on the Internet. IOS Security Configuration Guide, Release 12.2 - Configuring Cisco IOS Firewall Intrusion Detection System  [Cisco IOS Software Releases 12.2 Mainline. LAN switching. This article addresses packet switching in computer networks.

LAN switching

LAN switching is a form of packet switching used in local area networks. Switching technologies are crucial to network design, as they allow traffic to be sent only where it is needed in most cases, using fast, hardware-based methods. Layer 2 switching[edit] Layer 2 switching uses the media access control address (MAC address) from the host's network interface cards (NICs) to decide where to forward frames. Packet switching. Packet switching is a digital networking communications method that groups all transmitted data – regardless of content, type, or structure – into suitably sized blocks, called packets.

Overview[edit] An animation demonstrating data packet switching across a network (Click on the image to load the animation) Packet switching features delivery of variable bitrate data streams (sequences of packets) over a computer network which allocates transmission resources as needed using statistical multiplexing or dynamic bandwidth allocation techniques. When traversing network adapters, switches, routers, and other network nodes, packets are buffered and queued, resulting in variable delay and throughput depending on the network's capacity and the traffic load on the network. History[edit] First proposed for military uses in the early 1960s and implemented on small networks in 1968, packet switching became one of the fundamental networking technologies behind the Internet and most local area networks.

Routing. Routing is the process of selecting best paths in a network. In the past, the term routing was also used to mean forwarding network traffic among networks. However this latter function is much better described as simply forwarding. Routing is performed for many kinds of networks, including the telephone network (circuit switching), electronic data networks (such as the Internet), and transportation networks. Border Gateway Protocol. BGP may be used for routing within an AS. In this application it is referred to as Interior Border Gateway Protocol, Internal BGP, or iBGP. In contrast, the Internet application of the protocol may be referred to as Exterior Border Gateway Protocol, External BGP, or EBGP. Current version[edit] RFC 4271 - A Border Gateway Protocol 4 (BGP-4) [Docs] [txt|pdf] [draft-ietf-idr-bgp4] [Diff1] [Diff2] [Errata] Updated by: 6286, 6608, 6793 DRAFT STANDARD Errata Exist Network Working Group Y.

Rekhter, Ed. Request for Comments: 4271 T. Li, Ed. Obsoletes: 1771 S. RFC 4271 BGP-4 January 2006 Table of Contents 1. RFC 4271 BGP-4 January 2006 8.2.1.5. Dijkstra's algorithm. The algorithm exists in many variants; Dijkstra's original variant found the shortest path between two nodes,[3] but a more common variant fixes a single node as the "source" node and finds shortest paths from the source to all other nodes in the graph, producing a shortest-path tree. For a given source node in the graph, the algorithm finds the shortest path between that node and every other.[4]:196–206 It can also be used for finding the shortest paths from a single node to a single destination node by stopping the algorithm once the shortest path to the destination node has been determined.

For example, if the nodes of the graph represent cities and edge path costs represent driving distances between pairs of cities connected by a direct road, Dijkstra's algorithm can be used to find the shortest route between one city and all other cities. Dijkstra's original algorithm does not use a min-priority queue and runs in time. Open Shortest Path First. RFC 2740 - OSPF for IPv6. RFC 2328 - OSPF Version 2. OSPF Design Guide. Cisco Systems, Inc. Code analysis and security audit (tools)