-
Notifications
You must be signed in to change notification settings - Fork 34
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
- Loading branch information
1 parent
9bbe620
commit 2e87cb7
Showing
2 changed files
with
28 additions
and
1 deletion.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -16,7 +16,7 @@ | |
handout: 06/ | ||
|
||
- week: Network Security | ||
# handout: 07/ | ||
handout: 07/ | ||
|
||
- week: Passwords | ||
# handout: 08/ | ||
|
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,27 @@ | ||
--- | ||
layout: default | ||
permalink: /tutorials/07/ | ||
--- | ||
|
||
# Network Security | ||
|
||
Two companies A, located in Canada, and B, located in France, want to collaborate on a super secret project. Each company has its own internal network with private servers and they want to allow the employees from the other company to access them. | ||
|
||
These two companies have hired you as a consultant to help them to enable their collaboration wile keeping their project secret. They are giving you a list of concerns: | ||
|
||
- if the network is opened to the "outside", anybody could connect to their servers? Is there any way to prevent that? | ||
- someone outside of their network might be able to eavesdrop or hijack their communication? | ||
- people might suspect that the two are working on super secret project if they see the type of communication they have? | ||
|
||
For each concern, they are asking you to: | ||
|
||
1. explain whether it is a valid concern by explaining them how they could be attacked or not | ||
2. help them secure their networks by providing the best and the most straightforward solution to their concern | ||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|