28.06.2014 Views

Learning by Doing: CISCO Certified Network ... - SCN Research

Learning by Doing: CISCO Certified Network ... - SCN Research

Learning by Doing: CISCO Certified Network ... - SCN Research

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Supplemental Lab or Challenge Activities:<br />

1. Go out to <strong>CISCO</strong> and find out how Designated Routers and Backup<br />

Designated Routers are elected.<br />

2. Find out why we use loopback address with OSPF.<br />

3. Capture and analyze the OSPF packet structure.<br />

4. What is a “hello” packet in OSPF?<br />

So What Did I Just Learn Here?<br />

In this lab you learned the basics of the OSPF routing protocol. Trust me…there is a lot<br />

more to this routing protocol. You also learned about the basics of wildcard masks. We<br />

will be using these in a couple more labs on Access Control Lists so now was a good time<br />

to bring this up.<br />

Guest Router Name<br />

Washington Leung was sentenced in early 2002 to 18 months in Federal prison and<br />

$92,000 in restitution for illegally accessing and deleting records at his former place of<br />

employment using the computers of his new place of employment (I will bet the new<br />

place of employment is now another former place of employment). Apparently he made<br />

unwanted advances to a female at his first company and was fired for it. He worked in<br />

the Human Resources Department on employment records, compensation, payroll, and<br />

passwords of accounts. After he was terminated from his first company he landed a job<br />

at a new company. Guess what? The first company never changed those passwords. So<br />

Leung copied and then deleted about 1000 records from the first company over the<br />

Internet using computers at his second job. He also gave that woman’s file a makeover: a<br />

$40,000 a year RAISE and a $100,000 bonus. Then he created a Hotmail account in the<br />

woman’s name and sent an email to the executives of the first company from “her” with<br />

an attachment of her original file. Don’t try this at home boys and girls: Forensic images<br />

of the computer he used at the second company revealed the hotmail account was created<br />

with that computer. Boo-ya! Busted prison style!<br />

316

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!