Day 4 Topics

Day 4 Assignment

Today we will review several core security concepts used in modern networks and web applications. These topics are commonly used when deploying servers, protecting web traffic, and securing remote access.

1. Review of DNS

DNS (Domain Name System) is responsible for translating human-readable domain names into IP addresses that computers use to communicate.

Example:

www.example.com  →  93.184.216.34

Common DNS record types:

Example DNS lookup command:

dig google.com

or

nslookup google.com

Key security considerations:

2. Review of SSL / TLS

SSL (Secure Sockets Layer), now commonly referred to as TLS (Transport Layer Security), is used to encrypt communication between a client and a server.

It is commonly used to secure websites using HTTPS.

Example:

http://example.com
https://example.com

When HTTPS is used, data transmitted between the browser and the server is encrypted.

SSL/TLS relies on certificates issued by trusted Certificate Authorities (CAs).

Example tools used to inspect certificates:

openssl s_client -connect example.com:443

Key concepts:

3. Review of SSH Keys

SSH keys are used to authenticate users without requiring passwords. They are commonly used for secure remote access to Linux servers.

SSH uses a pair of keys:

The public key is stored on the server inside the authorized_keys file.

Example command to generate a key pair:

ssh-keygen

Example location of SSH keys:

~/.ssh/id_rsa
~/.ssh/id_rsa.pub

The public key is copied to the server:

~/.ssh/authorized_keys

Example connection using an SSH key:

ssh username@server-ip

Key security benefits:

4. Research on Security Products

In today's assignment you will research several types of security and networking products that are commonly used in home and small office networks.

Categories to research include:

For each category, identify at least two vendors and review their products.

Examples of vendors:

You will also design a simple home network layout that includes:

Example network diagram:

Internet
   |
ISP Modem
   |
Firewall / Router
   |
Switch
 |   |   |
PC  NAS  Access Point
          |     |     |
       Laptop Phone Smart TV

The goal of this research is to understand how these products fit together to create a secure and functional network.


End of Day 4 Topics