Page 44 - CITS - Computer Software Application -TT
P. 44

COMPUTER SOFTWARE APPLICATION - CITS



           •  Discover: In this initial step, the client device (often a computer, smartphone, or any device seeking network
              connectivity) sends out a DHCP “Discover” message as a broadcast signal on the local network. This message
              indicates that the client is in need of an IP address and other configuration parameters.

           •  Offer: When a DHCP server receives the “Discover” message, it responds with a DHCP “Offer” message.
              This message is a broadcast sent by the DHCP server to the client, containing a proposed IP address, subnet
              mask, lease duration, and other network configuration information. The server temporarily reserves the offered
              IP address for the client.
           •  Request: Upon receiving one or more “Offer” messages, the client evaluates the offers and selects one of the
              proposed IP addresses. The client then sends a DHCP “Request” message to the chosen server, requesting
              the use of the offered IP address and confirming its acceptance of the configuration parameters.
           •  Acknowledge: Once the DHCP server receives the “Request” message from the client, it sends a DHCP
              “Acknowledge” (or “ACK”) message. This message confirms that the client has been assigned the requested
              IP address and provides the client with the approved network configuration details. The client device then
              configures its network settings based on the provided information.



































            Attacks, Services and Mechanisms, Security Attacks,

            Security Services, Integrity check, Digital Signatures,
            Authentication


           Network security is a critical aspect of modern computing and technology that involves the protection of a computer
           network  infrastructure  from  various  threats  and  unauthorized  access.  It  encompasses  a  range  of  practices,
           technologies, and policies designed to ensure the confidentiality, integrity, and availability of network resources
           and data.

           Numerous individuals depend on the Internet for a wide array of personal, social, and professional tasks. However,
           there exists a faction that seeks to harm our internet-linked computers, infringe upon our privacy, and disrupt
           internet services, rendering them useless.

           Network attack
           Network attacks are malicious activities or actions that target vulnerabilities in computer networks with the intent
           to compromise their confidentiality, integrity, or availability. These attacks can vary in sophistication and impact,
           ranging from simple exploits to complex, coordinated efforts.



                                                           31

                              CITS : IT&ITES - Computer Software Application - Lesson 01-17
   39   40   41   42   43   44   45   46   47   48   49