• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar

Ethical Hacking

Wade Mackey

Ethical Hacking

MIS 5211.702 ■ Fall 2020 ■ Wade Mackey
  • Home
  • About
  • Syllabus
  • Gradebook

Week #1 Reading Discussions

September 4, 2020 by Mei X Wang 1 Comment

Basics of computer networking

  • Differences between an open system and a closed system, why would anyone use a closed system if it can’t be connected to a network or communicated with. Computer networks include the devices and also things can help connect the devices such as routers and switches.

How can the MAC address help incriminate an electronic device compared to just using the IP Address?

How can you use the IP address to physically locate the electronic device?

Intro to basic networking terminology

  • To facilitate the connection between two parties, a number of protocols have to be in place so the products can communicate and share information. A number of protocols working together are called protocol suites or stacks.

Why would it be useful to have network reference models developed for products(different manufacturers)?

Why would VPNs be useful to you?

Layers of OSI

  • The physical layer would be the one responsible for the connection of devices and also for translate to 0s and 1s. It’s required that the physical layer translate and then the data link pieces the message back together.

Which layer would be most important to ensure the connection is secure? What’s the use of the dialog controller?

TCP/IP

  • The application layer of the TC/IP model performs the top three layers of OSI, Application, Presentation, and Session. TC/IP model protocols are not easily replaced and can only provide connectionless services.

What are the key differences between layers of OSI and layers of TCP/IP models?

Filed Under: Uncategorized Tagged With:

Reader Interactions

Comments

  1. Vraj Patel says

    September 17, 2020 at 12:28 pm

    Why would VPNs be useful to you?
    VPN creates an secure encrypted tunnel from your device to the companies network. There are multiple services and application companies uses that are only accessible within the companies network and are not connect to the internet for security purposes. In time like this where every one is working from home they would need a secure way to access those services and application and this is where the VPN would be useful because it can create a secure connection from the users’s device to the companies network. IS provides would not be able to see the traffic between the user’s device to their companies network.

    Log in to Reply

Leave a Reply Cancel reply

You must be logged in to post a comment.

Primary Sidebar

Weekly Discussions

  • Uncategorized (46)
  • Week 01: Overview (3)
  • Week 02: TCP/IP and Network Architecture (6)
  • Week 03: Reconnaisance (5)
  • Week 04: Network Mapping and Vulnerability Scanning (11)
  • Week 05: Metasploit (10)
  • Week 06: More Metasploit (4)
  • Week 07: Social Engineering (7)
  • Week 08: Malware (6)
  • Week 09: Web Application Hacking (7)
  • Week 10: SecuritySheperd (6)
  • Week 11: Intro to Dark Web and Intro to Cloud (4)
  • Week 12: Introduction to Wireless Security with WEP and WPA2 PSK (7)
  • Week 13: WPA2 Enterprise and Beyond WiFi (3)
  • Week 14: Jack the Ripper, Cain and Able, and Ettercap (4)

Copyright © 2025 · Course News Pro on Genesis Framework · WordPress · Log in