Posts

Showing posts from January, 2025

Week 7

 Week 7 Post      Securing TCP/IP requires measures to protect data and prevent unauthorized access. Encryption protocols ensure data confidentiality and integrity, while authentication methods, such as certificates, verify the identities of devices and users. Firewalls restrict network traffic to authorized sources, and techniques like deep packet inspection help block malicious activities. Intrusion detection and prevention systems further enhance security by monitoring for suspicious behavior.      To address specific threats, keeping software and devices up to date ensures vulnerabilities are patched, while monitoring and logging aid in detecting and analyzing security incidents. Together, these measures ensure secure and reliable communication over TCP/IP networks.

Week 6

Name resolution Breakdown Name Resolution : The process of converting domain names (like www.google.com ) into IP addresses (e.g., 192.168.1.100). Why It's Important : Computers communicate using IP addresses, so name resolution is essential for network interaction. How It Works : Browser checks the local hosts file (personal address book) first. If the domain is not found, the computer queries a DNS server (like an internet librarian). DNS server sends back the IP address, allowing the computer to connect to the website. Methods of Name Resolution : Hosts file : Simple, but requires manual updates. DNS : A distributed system that efficiently handles domain-to-IP translation. Multicast DNS : Used for automatic name discovery in local networks. Link-Local Multicast Name Resolution : A protocol specific to Windows systems. DNS Security : Critical for the internet's function; attacks can disrupt access for many users. DNS queries can reveal browsing history, raising privacy conc...

Week 5

 Week 5 - Whois and TracerRT      This week was little challenging. Learning to read tracer RT's and make sense of the data that is provided was a challenge. I did learn a lot seeing the various companies researched by fellow students and seeing how many registrars are really out in the world. I think it is very interesting the amount of data and information that can be pulled from running a tracer RT. The amount of hops, timeouts that occur and the various IP address a simple search goes through is amazing.      The Whois provides key data on companies. Who is their registrar, office locations,  when domains were first acquired and when they will expire unless renewed, are all points of data that can be view on a whois report.