Wednesday, August 5, 2020

Week 10 - FINAL ENTRY: Network Monitoring Tools/Blog Lessons Learned

Part I: Network Monitoring Tools
For my last blog posting, I have compiled a list of network monitoring tools that are either free or affordable for the average user. Network system monitoring is necessary for every small business or large enterprise. Knowing what sort of threats your company is at risk for will help understand why your data needs monitoring and protecting. Every system should have some sort of performance monitoring system in place. One of the top tools available (which also comes with a free 30 day trial) is from SolarWinds. SolarWinds Network Performance Monitor is a comprehensive network performance monitoring tool that can monitor the status of devices with SNMP. It can automatically discover network devices connected to your network. Use the dashboard to monitor the availability and performance of connected network devices from a holistic perspective. It also includes a network topology map and you can set alerts to see when issues are impacting your network. This tool costs about $2995 (below).


Some other recommended network monitors include:
  • ManageEngine OpManager (FREE TRIAL) Network monitor that can monitor SNMP devices, switches, servers, and virtualized network services.
  • Paessler PRTG Network Monitor Free network monitoring software that uses SNMP, packet sniffing and WMI to monitor your network.
  • Atera Cloud-based RMM system includes a large range of monitors – server, network device, and application – suitable for all sized businesses.
  • Site24x7 Network management platform tools that can monitor network devices, websites, servers, applications, and more.
  • Nagios Core – One of the top open-source network monitoring tools. Includes a dashboard view, alerts system, community plugins, and more.
  • Zabbix – Open source network monitoring software with SNMP and IPMP monitoring. Includes an alerts system and community plugins.
  • Icinga – Open source network monitoring system with a DSL. Includes extensions.
  • Spiceworks Connectivity Dashboard – Free network monitoring software with a high-quality dashboard and simple alert system.
For more information on these tools, please visit: https://www.comparitech.com/net-admin/network-monitoring-tools/

Part II: Blog Lessons Learned
Writing once a week in a blog format for 10 weeks wasn't as challenging as I thought it would be. It was fairly easy to pick a topic and do some research on said topic to make a post about it. I have blogged in previous classes before so this experience isn't entirely new. It makes it easier to have a theme for the week from material covered in our chapters in class. 

I think blogging during a college class helps retain the information that you are learning every week. Usually a discussion post or paper topic will align similarly to the blog posting, so I can further elaborate on the subject and understand it better. I think that blogs are useful and can provide the reader with new information and first-hand experiences/scenarios that normal news articles or websites cannot provide. Blogging is a more intimate setting and I appreciate the impact this experience has given me. As for blogging on my own, I'm not sure if it is something I would continue in my personal time, but the idea of keeping some sort of log or journal is definitely beneficial to the individual writing it and potentially other viewers.

Until next time, this is Holly G. signing out! 😏


Tuesday, July 28, 2020

Week 9 - Hardening A Network



There are many ways to harden your network against potential cyber attacks. Hardening a network means protecting it from outside threats. Many companies have been forced to fork out millions of dollars in settlement fees because of not protecting consumer data. These days, almost every electronic device has some sort of WiFi or Bluetooth capability. The Internet of Things (IoT) devices are estimated to reach nearly 75 billion by 2025, and that means people are even at more of a risk for a cyber breach. Protecting your data is more important than ever before. Here are some ways you can harden your network (home or office).


1. Educate employees on how to protect/backup their data. Make sure they complete annual/semi-annual training on network security. Conducting exercises or simulations of cyber attacks or phishing attempts will help employees be more vigilant and aware of suspicious activity. More often the security breach happens from an internal source, so it's vital that employees receive the proper training.

2. Adopt a zero trust culture. Authenticate first/connect second. Traditionally users would connect to the internet first before authenticating. This reverse process is great for protecting the network. It works best against DDoS, man-in-the-middle, and advanced network attacks.

3. Combine on-site and cloud based storage solutions. Having this strategic combination will make it harder for an attacker to access the entire system of files.

4. Use out-of-band remote access controls. Use out-of-band methods where possible for remote access rather than opening up your firewalls to inbound network attacks.

5. Automate configuration management and firmware updates. Leaving platforms prone to configuration mistakes or open to known vulnerabilities can be mitigated by automation.


Tuesday, July 21, 2020

Week 8 - Basics of Virtualization

What is Virtualization? 

Virtualization is the process of creating a virtual version of something, such as an operating system, a server, a storage device or other network resources.

Virtualization describes a technology in which an application, guest operating system or data storage is eliminated from the true underlying hardware or software. A key use of virtualization technology is server virtualization, which uses a software layer called a Hypervisor to act as the underlying hardware. This often includes the CPU's memory, input/output, and network traffic. Hypervisors take the physical resources and separate them so they can be utilized by the virtual environment. They are able to sit on top of an OS or they can be directly installed onto the hardware. The latter is how most enterprises virtualize their systems.

Below are the basic steps of virtualization:

  1. Hypervisors detach the physical resources from their physical environments.
  2. Resources are taken and divided, as needed, from the physical environment to the various virtual environments.
  3. System users work with and perform computations within the virtual environment.
  4. Once the virtual environment is running, a user or program can send an instruction that requires extra resources form the physical environment. In response, the hypervisor relays the message to the physical system and stores the changes.

The virtual environment is often referred to as a guest machine or virtual machine (VM). The VM acts like a single data file that can be transferred from one computer to another and opened in both; it is expected to perform the same way on every computer. 

Reference: https://searchservervirtualization.techtarget.com/definition/virtualization

Tuesday, July 14, 2020

Week 7 - Wireless Internet



Wireless network connections have replaced the traditional wired connection as the more popular form of internet. They are considered faster, cheaper, and more reliable. When it comes to wireless, there are many different configurations to consider and it all depends on how you will be using it. Each type of wireless network connection has a specified range for the wireless signal and certain standards to follow. They are also configured a little differently. The format of a wireless network follows closely to the traditional wired formula, there is just the wireless concept added. 
The chart below explains a WPAN, WLAN, WMAN, and WWAN.



There are a number of things that can cause degradation to your wireless internet. The below graphic provides some helpful information and tips on how to stop your internet from slowing down.

Monday, July 6, 2020

Week 6 - IPv6

IPv6 is the newest Internet Protocol (IP) standard created to replace IPv4, the protocol many Internet services still use today. Every computer, cell phone, and any other device connected to the Internet needs a numerical IP address in order to communicate with other devices. 

IPv4 uses a 32-bit addressing scheme to support billions of devices. Computer engineers realized that eventually there wouldn't be any unique address left, so they created a new standard. In 1998, IPv6, a new protocol that uses 128-bit addressing, was introduced. Instead of the IPv4 address method of four sets of 1 to 3 digit numbers, IPv6 uses eight groups of four hexadecimal digits, separated by colons.

So how do you know if you are using IPv6? You can check out this list to see if your ISP pr device is on it. You can also visit one of many free websites that test your IPv6 connection.

test-IPv6.com is an open-sourced web site dedicated to helping end users identify whether or not their IPv6 is working; and whether specific detectable errors are found. This is meant to be useful both to end users (with reasonably friendly terminology and explanations); as well as useful to help desks.

I decided to check my own IPv6 connection, and here is what I found:


















I discovered that my ISP (COMCAST) is in fact using IPv6. I can also see what my IPv4 and IPv6 addresses are on the public Internet. It also says that my readiness score for IPv6 stability and readiness is a 10/10.


















Under the Tests Run tab, I see what tests were run to determine my compatibility for when other websites start using IPv6. All of these tests came back "ok."

There is also a "For the Help Desk" tab on the right that has specific information you would need to give to your help desk technician if you were experiencing any issues. This information can help them troubleshoot the problem.

What sources have you found helpful for IPv6? And is your ISP using it yet?

Thursday, July 2, 2020

Week 5 - TCP/IP Applications


TCP/IP, or Transmission Control Protocol/Internet Protocol, is a group of communication protocols used to connect network devices on the internet. The entire Internet Protocol set -- a set of rules and procedures -- is commonly referred to as TCP/IP. TCP and IP are the two main protocols. These protocols work between internet applications and the routing/switching fabric.

What do people use their computers for? There are several applications that run on the TCP/IP protocol. Checking email, searching for a website, downloading and saving files... computers are used for many different functions, and it’s the applications that run on TCP/IP that allow people to use these functions and ultimately make your computer useful. Below is a list of common applications and what they are used for. Which ones are you familiar with?



Monday, June 22, 2020

Week 4 - TCP/IP Routing

TCP/IP is a series of protocols used to transmit data over the internet. What is a protocol you ask? Well, a protocol is a set of rules that computers use to talk to each other. This communication happens on the Transmission Control Protocol (TCP) and Internet Protocol (IP). TCP prepares data by breaking it down into packets, and IP makes sure these packets get sent and delivered from one computer to another.

IPv4 vs IPv6

When data packets arrive at the router, the router needs to know where the data came from and where to send the data. This is what the IP address is for. An IP address is a 32-bit label that is unique to that device, so in transmitting data, there is a source IP and a destination IP. Internet Protocol version 4 (IPv4) is the 32-bit number that was created back in 1983. There are over 4 trillion unique addresses available, but that still wasn’t enough. In the 2000s, developers started to create Internet Protocol version 6 (IPv6). This version is still in the process of replacing IPv4 and officially became an Internet Standard in 2017. With the rapid growth of the internet and its users, developers had to develop a 128-bit identifier. The problem with this is that IPv4 and IPv6 were not designed to be interoperable, so the switch has been more complicated than developers would have liked.

When it comes to routing, IPv6’s larger address space makes room for address allocation hierarchy which allows route aggregation and the expansion of routing tables. There is also device mobility and security that was considered when developing IPv6.

 

Here is a more detailed blog about why IPv6 adoption has been so slow at being implemented: 
https://www.auvik.com/franklymsp/blog/ipv6-network-design/

Also, here is a report card on the state of deployment of IPv6 and who is currently using it:
https://www.internetsociety.org/resources/2018/state-of-ipv6-deployment-2018/


Personally, I don't have any experience with IPv6 yet, but hopefully soon!

What experience have you had? What are some of the pros/cons you have heard about IPv6?


References:
https://en.wikipedia.org/wiki/IP_address
https://en.wikipedia.org/wiki/IPv6
https://www.sangoma.com/how-ip-routing-works/


Monday, June 15, 2020

Week 3 - Ethernet Standards

Ethernet Standards have been developed by non-profit organizations such as IEEE for decades. They employ the world's top experts to develop and implement the newest technology to enhance and improve our ethernet capabilities, focusing on speed and performance. Originally created by Xerox in 1973 for company use, Ethernet was then handed over to IEEE to allow them to promote a new industry standard. A working group called IEEE 802.3 was formed to focus on these standards. The 802.3 committee defines wired network standards that share the same basic frame type and network access method.
 Here are some examples of some of these standards from Mike Meyer's CompTIA Network+ Certification All-in-One Exam guide:
  • 802.3i - 10 Mbps Ethernet using twisted pair cabling (1990)
  • 802.3ab - Gigabit Ethernet over twisted pair (1999)
  • 802.3by - 25 Gigabit Ethernet over fiber (2016)

In the beginning, the most popular Ethernet version was 10BaseT (10 Mbps using twisted pair), consisting of two or more computers connected to one central hub. In the 1990's IEEE created Gigabit Ethernet, which is the most common Ethernet used today.1000BaseT uses four pair UTP or STP to create the gigabit performance. This is also the most dominant standard of twisted pair cabling.

There are several other standard configurations that can be used, such as 1000BaseSX, which uses fiber to increase speed. In 2010, the IEEE 802.3ba committee approved 40 and 100 Gb Ethernet standards. Next up for Ethernet standards, is 800 Gb (800GBASE-R).

This article talks about the 25G Ethernet Consortium (now called the Ethernet Technology Consortiumformed by Google and Microsoft. It seems that IEEE isn't as aggressive as most people in the industry would like, so they took it upon themselves to set the future standards.

What do you think is the best Ethernet standard and why?

Do you agree with companies, aside from IEEE, forming their own committees to develop and promote the latest technology developments?


Reference:
Meyers, Mike. CompTIA Network+ Certification Exam Guide: (Exam N10-007). McGraw-Hill Education,     2018.

Tuesday, June 9, 2020

Week 2 - Network Topology Configurations

Simply put, a network topology is the way computers or nodes are configured on a network. There are many different types of configurations, some being replaced over the years with more secure, fail-proof methods. I will cover a few of the most common topologies and the pros/cons of using one over the other. Ultimately, it is up to you and your company to choose the most efficient configuration for your data.

One of the most common network topologies is Star, because each computer has its own connection to a central hub, making it easier to manage. If one node goes down, the others will remain connected to the network.
  • Star Pros: Easy to manage network from a single location and to troubleshoot any issues, inexpensive to set up due to less cabling, ability to add or removed computers without going offline.
  • Star Cons: If the central hub goes down, all connections are lost. This is a single point of failure. They are also limited in bandwidth, which makes them expensive to maintain. 
Another common topology is Bus. The bus configuration isn't used as much these days, because it is one cable connecting all of the nodes together in one direction. However, it is easy to set up and cost effective.
  • Bus Pros: easy to setup, simple layout, cost effective.
  • Bus Cons: vulnerable due to using only a single cable, only half-duplex data.
The Ring topology places nodes in a circle configuration, where the data can travel in one direction or both.
  • Ring Pros: packet collision reduced due to one node sending data at a time, repeaters used to prevent data loss, cost-effective.
  • Ring Cons: since all nodes are connected, if one goes down the whole network can go down, limited bandwidth slows down data, network must be taken offline to reconfigure or add/remove nodes.
A Mesh topology is where every single node is interconnected with each other. 

  • Mesh Pros: reliable, stable, resistant to failure, eliminates single point of failure.
  • Mesh Cons: time consuming and costly to set up.
Hybrid topologies are where two or more topologies are combined in a configuration. These are quite common in large companies. For example, Star Bus uses bus as a backbone of hubs for the network, with the nodes all connected to the different hubs.

  • Hybrid Pros: flexibility to modify configuration.
  • Hybrid Cons: costly, becomes more complex as network grows.
Ultimately, it is up to the company and network administrator to figure out the best configuration based on the needs of its users. For more information on topologies, cabling and network topology mapping, please visit https://www.dnsstuff.com/what-is-network-topology


What is your favorite network topology configuration and why? 

Tuesday, June 2, 2020

Week 1 - COVID-19 "Immunity Certificate" Technology

When I first heard about "immunity certificates," the movie Contagion came to mind. The scene where they receive their vaccines and are mandated to wear these special immunity wristbands, so everyone can tell who has the antibodies and is no longer infectious. That movie, while eerily predictable and spot on with our current real-life pandemic situation, came out in 2011. The concept of having some sort of immunity identification system is definitely not new, but the potential technology behind it is what is so intruiging to me.

As antibody testing (while still controversial in its own right) is becoming more and more available, countries worldwide will be looking to implement a tracking system for the "cured". However, paper products such as wristbands or certificates can be easily manipulated or forged. It makes sense that we would look for a more secure way to issue this sacred identifier. Currently, China has implemented a color coded system tracking everyones current health through an app on their phones. Residents are required to download this software that will tell them whether or not to quarantine and where they can and cannot go. This process is controversial because it also sends personal data to the local authorities, and is tracked not only by the government but by an outside company, so who knows how secure it really is and what data they are pulling from the users. 

Could the United States use the same type of technology in the future?

My main concern with a system like this is of course, data breach. Hackers would be all over this. Can you imagine the PII associated with this type of private health data, and how millions of people would be at risk to such an attack? Although there is such an enormous risk for something so sensitive on your smartphones, it does seem like the safest option? As opposed to losing an ID card or someone creating counterfeit wristbands to sell on the black market. We already use secure apps for banking, but even that can be vulnerable. Using technology to track the immune seems the most logical, but at what cost?

What do you suggest?