Lecture 2 3
Lecture 2 3
Networking
The International
Organization for
Standardization (ISO)
established the Open
Systems
Interconnection (OSI)
Reference Model
Each layer deals with a
Figure 5 The layers of the OSI Reference Model
particular aspect of
network communication
Network Protocols
Figure 7
Some protocols
and the ports
they use
Firewalls
Figure 9
An IP address is
stored in four
bytes
Domain Name System
Figure 11
Some of the top-level domain
names based on country codes
Domain Name System
Intentional
Things like malware, ransomware, phishing,
malicious code, wrongfully accessing user
login credentials.
Unintentional
Unintentional threats are often attributed to
human error.
Someone might leave the door to the IT
servers unlocked or leave sensitive
information unmonitored.
Types of Threats
Natural threats:
floods, hurricanes, tornadoes, earthquakes,
etc.
Damage to your asset.
Not directly related to information security
Vulnerability
Infectious:
Viruses, worms
Concealment:
Trojan horses, logic bombs, rootkits
Virus
Backdoor
Trojan horse
Spyware
Scareware
Worm
Ransomeware
Virus