16.05.2014 Views

Wireless Security.pdf - PDF Archive

Wireless Security.pdf - PDF Archive

Wireless Security.pdf - PDF Archive

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

704 Appendix B<br />

device that is configured to use DHCP contacts the DHCP server to request an IP address.<br />

The DHCP server then assigns an IP address from the range it has been configured to<br />

use. The IP address is leased for a certain amount of time. When the device is removed<br />

from the network or when the lease expires, the IP address is placed back into the pool<br />

to be used by another device.<br />

Demilitarized Zone: The demilitarized zone (DMZ) is a neutral zone or buffer that<br />

separates the internal and external networks and usually exists between two firewalls.<br />

External users can access servers in the DMZ, but not the computers on the internal network.<br />

The servers in the DMZ act as an intermediary for both incoming and outgoing traffic.<br />

DNS: The Domain Name System (DNS) was created to provide a way to translate<br />

domain names to their corresponding IP addresses. It is easier for users to remember<br />

a domain name (e.g., yahoo.com) than to try and remember an actual IP address (e.g.,<br />

65.37.128.56) of each site they want to visit. The DNS server maintains a list of domain<br />

names and IP addresses so that when a request comes in it can be pointed to the correct<br />

corresponding IP address.<br />

Keeping a single database of all domain names and IP addresses in the world would be<br />

exceptionally difficult, if not impossible. For this reason, the burden has been spread<br />

around the world. Companies, Web hosts, ISPs, and other entities that choose to do so can<br />

maintain their own DNS servers. Spreading the workload like this speeds up the process<br />

and provides better security instead of relying on a single source.<br />

Denial of Service: A Denial-of-Service (DoS) attack floods a network with an<br />

overwhelming amount of traffic, thereby slowing its response time for legitimate traffic or<br />

grinding it to a halt completely. The more common attacks use the built-in features of the<br />

Transmission Control Protocol (TCP)/IP to create exponential amounts of network traffic.<br />

E-mail Spoofing: E-mail spoofing is the act of forging the header information on an<br />

e-mail so that it appears to have originated from somewhere other than its true source.<br />

The protocol used for e-mail, Simple Mail Transfer Protocol (SMTP), does not have any<br />

authentication to verify the source. By changing the header information, the e-mail can<br />

appear to come from someone else.<br />

E-mail spoofing is used by virus authors. By propagating a virus with a spoofed e-mail<br />

source, it is more difficult for users who receive the virus to track its source. E-mail<br />

spoofing is also used by distributors of spam to hide their identity.<br />

www.newnespress.com

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!