Friday, November 9, 2018

Week 2 Blog


Week 2 Course Blog
Introduction
This week was all about network security. This blog will be split into six parts that focus on important parts of this week’s lesson. Security measures are done with both hardware and software and even as far as secured rooms using finger scanners. These security measures differ with ever network.
Application security and software updates
Not every application is perfect, in fact most aren’t. My antivirus software has many updates a week. This is because there’s always new ways for people to get in where they shouldn’t. Linux is great because you can update all installed software with one line of code (su -c 'dnf update').  If you’re logged in as an administrator, then simply type sudo dnf update. If you’re scared that you’ll forget to constantly check for updates, then login as admin and enter sudo /sbin/chkconfig --level 345 dnf on; /sbin/service dnf start. This script automatically updates all software at 4:00 AM.
Network protection and firewalls
There’s safety in numbers for when it comes to networks.  Filtering traffic is a great way to see who’s doing what on a network. A great way to do this is by using a firewall with hardware, software, or both. Firewalls can set rules for an individual IP address and Ports like we did in this week’s lab! We also blocked traffic with just a few commands.
Local Software Firewalls
Most ISPs will provide a physical firewall when setting up a network. This isn’t enough for a larger network. Software firewalls are great for running on a server. This week we used iptables. I mentioned above that you can block incoming and outcoming traffic. Software firewalls can also show if a file server has been compromised. If your file server is making web page requests that’s not a good sign.
Routers and Network Address Translation (NAT)
Every device on a network has their own address, this is so traffic knows where to go. Routers is responsible for mapping your private IP address and port to the web page you’re visiting (like this blog). NAT makes internal private addresses into external public addresses (or external public addresses into internal private addresses) with a router or gateway.
Proxy Servers
Proxy servers are a type of firewall that filters traffic and hide the identity of workstations. The type of traffic that proxy servers filter can be domain names and keywords. Proxy servers also cache data. Here’s an example of caching: open a website you’ve never visited before then close your browser. When you go back to that website, you’ll notice that it loaded faster.
Name Resolution
Name resolution is an easy to understand concept. We use domain names like Google.com because it’s easier to remember than a public IP. On top of that, IPs can change but you can keep the domain name. The domain name has to be translated to the public address so that you’re transferred to the website.
Outro
Hopefully if you’re reading this you’re not learning anything new. If you do, great! If not, review is always important.

No comments:

Post a Comment