Homework – Network Security – CIS 377

  1. ‘Network security’ often used interchangeably with ‘cybersecurity’? Why? Do you agree? Why or why not – write 500 words.
  • List and describe each of the layers of the TCP/IP Model. Also list each layer in the table below.
  • List and describe each of the layers of the OSI Model.
  • What is the difference between TCP/IP and OSI models?

For each of the terms below – describe it and write it at the correct place on the table (see examples below). User your book and/or web for resources.

  • Ethernet Cable – The physical cable used in to connect to devices in wired networks. Layer 1.
  • Optical fiber
  • WIFI
  • Radio waves
  • Packet
  • MAC
  • ARP
  • IP address
  • IP spoofing
  • ARP Cache poisoning
  • Router
  • UDP
  • SYN flood
  • Port scanning
  • Port
  • NMAP
  • Ping
  • Ping of Death
  • Firewall – An application used to filter traffic in a network. Can span layers (layers 3, 4, 5).
  • Session hijacking
  • SSL
  • TLS
  • SSH
  • HTTP
  • HTTPS
  • Digital key
  • FTP
  • IDS
  • IPS
  • Trojan horse
  • Physical security
  • Eavesdropping
  • Switch
  • Flooding attacks
  • ARP spoofing
  • WPA2
  • VLAN
  • Encryption
  • IPv4
  • IPv6
  • IPSec
  • VPN
  • Access control list
  • Segments
  • DNS
  • DNS Spoofing
  • DoS
  • ICMP
  • Malware
  • DDoS
  • Zombie
  • Botnet
  • Onion routing
  • Create a brief ‘tip sheet’ to give to your friends and family on being secure on public WiFi networks (like on an airport). Along with tips, give a small explanation on the consequences of not taking security precautions on public networks.
TCP/IP Model Components/protocols Vulnerabilities Attacks
       
       
       
       
Physical Ethernet cable    

If you need answers to this question, WhatsApp/Call +1 646 978 1313

Leave a Reply

Your email address will not be published.