Describe a network worm. Provide an example of how a network worm attacked an organization.
- The discussion assignment requires an Original Posting (main post) from you of 2-3 paragraphs answering the module’s question.
- Please respond to ALL 3 peers below
- Peer 1:
Different Ethernet LAN systems
In this discussion I will be talking about different types of Ethernet LAN systems, such as wired, optical, and wireless. Ethernet used to only be used and promoted by certain companies but today it is an industry standard that covers a ton of networking technologies. Local and metropolitan networks now comply with the IEEE 802 standard and the 802.3 standard applies to coax-based Ethernet and other modern versions like optical or wired fibers. Wireless falls under IEEE 802.11 but in general all the 802 networks are similar in the fact that they use similar packet structures. This means that they can change hardware dramatically without changing majorly changing software.
For wired ethernet networks, they use cabes with twisted pairs of wires and plugs and jacks named RJ-45. Ethernet wires are marked to show how fast they run and the type of connector. There’s a 1000baseT, 100baseT, and 10baseT, their speeds are 1000Mb/second, 100 Mb/sec, and 10Mb/sec respectively all using RJ-45.
Optical ethernet networks use optical fibers instead of copper wires that transmit messages with lasers through fibers that carry the light waves. Optical ethernet networks are the highest speed transmitters that we have to date.
Wireless network technology evolved during the ’90s and it has several common varients. The 802.11b and the 802.11.g frequencies are both on a 2.4 GHz frequency and the 802.11n is on both the 2.4 and 5 GHz frequency while also being the fastest data exchange rate.
There’s an alliance called the Wi-Fi Alliance, it’s a group that promotes 802.11 tech and passes the interoperability standards of Wi-Fi technologies.
Peer 2
How Botnets Work
Botnets have always fascinated me, the idea of a single user or small collection of users infecting dozens or hundreds of computers is scary but interesting. I am sure most of you reading this are already at least vaguely familar with the concept, but I will give a brief definition. The word botnet is formed from combining robot and network, as it is a sort of collection of robot computers. Once one device is infected, the code is able to replicate itself and spread to others via various means. This can create a vast array of infected, or so-called “zombie computers.
Once the network has been established, the “bot herder” has under control many computers, and can cause harm. For example, one variation of a botnet is spread via an infected download, or Trojan, which then replicates itself. However, sometimes the virus does not want to be discovered. Some attackers use their army of bots to mine for cryptocurrency in the background of users’s computers, slowing down their devices. Many victims will not realize their computer is apart of a vast botnet and being exploited for monetary gain by the attacker, as the only sign is a slowed computer, which is not unusual for most people to experience. Regardless, botnets can be difficult to deal with as only part of a comprimised network being reinstated is not enough to stop it.
Peer 3:
IP Addresses
IP Address, what does it mean?
An IP address, also known as an Internet Protocol Address, is the set of rules that allow your web browser to operate on the internet. There are two different types of IP addresses, IPv4 and IPv6. Most people are likely familiar with an IPv4 address, they are a collection of 4 numbers that range from 0 to 255. These look like 162.126.139.204. An IPv6 address is a bit more complex with eight sets of four hexadecimal digits (128 bits), looking like FE80:CD00:0000:0CDE:1257:0000:211E:729C.
IPv6 was concocted by the Internet Engineering Task Force in the late 2000s to counteract running out of IPv4 addresses. While IPv4 has a pool of 4.3 billion addresses, the vast amount of internet connected devices within the Internet of Things has quickly consumed those addresses. Thanks to the complicated principal behind IPv6, we have about 340 undecillion addresses to use.
The first pieces of each type of address identify the network ID. This is the first three numbers in IPv4 and the first half of IPv6. The last digit in IPv4 and 2nd half of IPv6 identify the host ID. In addition to the two different types of IP addresses (v4 and v6), there are also Private and Public IP addresses. Your private IP address identifies the device that you are using for the internet. Your public IP address identifies your router that gives your device access to the internet. Cyber criminals can use your IP address to compromise your devices. A VPN can be used to hide your IP address from ads, hackers, and criminals.