Cyber Security Seminar Day 1

Apurv Singh Gautam
Apurv Singh GautamSecurity Researcher | Threat Intelligence | Cybersecurity@GeorgiaTech
CYBER SECURITY
FUNDAMENTALS
Cyber Security Seminar Day 1
WHAT TO EXPECT??
NEED OF SECURITY
 Increasing awareness of technology but not Security
 Continuous Development & Competition in IT
 Increasing number of Cyber Criminals
 Increasing use of Network elements & applications
 Decreasing level of skill set
Cyber Security Seminar Day 1
NEED OF SECURITY
 Any Security breach in the website of any person increases the risk of the public
image
 Any Security breach in the website of any company increases the risk of company
reputation
 Any Security breach in the government website may increase the risk on project
management and government operations
 Any Security breach in the Military sector may jeopardise the safety of any country
Cyber Security Seminar Day 1
What is HACKING??
 Hacking is an art of exploring various security breaches
 What people believe: It’s an anti-social activity
: All the hackers are bad people
 The terms Hacker and Hacking are being misinterpreted and
misunderstood with negative sidelines
COMMUNITIES OF HACKERS
 Hackers
 Crackers
 Phreaks
 Script Kiddies
TYPES OF HACKERS
 White Hat Hacker - They use their knowledge and skill set for good
constructive intents. They find out new security loopholes and their
solutions
 Black Hat Hacker - They use their knowledge and skill set for illegal
activities and destructive intents
 Grey Hat Hacker – They use their knowledge and skill set for legal and
illegal purpose. They are white hats in public but internally they do some
black hat work
HACKING STRATEGY
 Reconnaissance (Information Gathering)
 Scanning
 Gaining Access
 Maintaining Access
 Covering Tracks
Cyber Crime is no more FUN…!!!
 Cyber crime controlled by IT ACT 2008 and respective IPC (constantly evolving)
 Complete control of Govt agencies over information stored, processed and
transmitted over internet
 Upgradation of Investigating agencies with latest technology
 Service providers like ISPs, email service providers, etc are liable to share
information with Govt agencies
 Upgradation of Forensic labs
 Stringent punishment for cyber crimes
Common Scenarios - Cyber Pornography
 Cyber pornography covers pornographic websites, pornographic magazines
produced using computers and the Internet.
 Whoever publishes or transmits or causes to be published in the electronic form,
any material which is obscene in nature falls under cyber pornography
 Section 67: Punishment for publishing or transmitting obscene material in
electronic form
 Punishment – Imprisonment from 2 – 10 years with fine upto 10 lakhs
Common Scenarios – Identity Theft
 Identity theft is a term used to refer to fraud that involves stealing money or getting
other benefits by pretending to be someone else.
 Section 66C Punishment for identity theft.
Whoever, fraudulently or dishonestly make use of the electronic signature, password or
any other unique identification feature of any other person, shall be punished with
imprisonment of either description for a term which may extend to three years and shall
also be liable to fine which may extend to rupees one lakh.
 Section 66D Punishment for cheating by personation by using computer resource
Whoever, by means of any communication device or computer resource cheats by
personation, shall be punished with imprisonment of either description for a term which
may extend to three years and shall also be liable to fine which may extend to one lakh
rupees.
NETWORKING
FUNDAMENTALS
TYPES OF NETWORK
 LAN – Local Area Network
LAN can establish the communication within a lab or within a building
e.g.-Office, Schools, etc
 MAN – Metropolitan Area Network
MAN can establish the communication between two or more LANs
e.g.-Radio, ATM, Metro, etc
 WAN – Wide Area Network
WAN can establish the communication globally
e.g.-VSAT, Telecom Networks, Internet, etc
IP ADDRESS
IP Address is also known as,
 Logical Address, or
 Unique Identity Address
It is used to identify the systems. Whenever any computer connects itself with
the internet or with LAN, it gets one IP address, that IP address is always
unique in the network. This means, once an IP address is assigned to any
system in the network, it cannot be assigned to any other system. The same
in the internet, if one IP address has been assigned to one system, it cannot
be assigned to anyone else
IP VERSION
 IPv4 - Internet Protocol Version -4
IPv4 is a 32 bit addressing protocol. The range of this IP starts from
0.0.0.0 to 255.255.255.255
i.e. – 192.168.1.24
 IPv6 – Internet Protocol Version-6
IPv6 is a 128 bit addressing protocol. IPv6 addresses are written in
eight groups of four hexadecimal digits separated by colons.
i.e. - 2001:0db8:85a3:0000:0000:8a2e:0370:7334
IP TYPES
 Internal IP - Whenever a computer connects itself with an Internal
Network (LAN) , it gets an Internal IP. This IP will be the identity of the
particular computer in the network
 External IP - Whenever a computer connects itself with the internet , it
gets an IP address by ISP. This IP will be the identity of the particular
computer over the internet.
IP TYPES
Both the Internal & External IP address can be allocated in two forms.
 Static IP Address - Static IP Address remains same in all the sessions.
 Dynamic IP Address - Dynamic IP Address keeps changing in all the
sessions.
ISP & IANA
ISP is an Internet Service Provider. All the internet users get the IP Address
from the ISP.
 According to the client request, ISP assigns them Static or Dynamic IP
IANA manages global IP ranges space.
 IANA works in co-operation with five Regional Internet Registries (RIRs) to
allocate IP address blocks to Local Internet Registries (Internet Service
Providers) and other entities
1 of 21

Recommended

A Review of IP and MAC Address Filtering in Wireless Network Security by
A Review of IP and MAC Address Filtering in Wireless Network SecurityA Review of IP and MAC Address Filtering in Wireless Network Security
A Review of IP and MAC Address Filtering in Wireless Network SecurityUniversitas Pembangunan Panca Budi
279 views4 slides
Cyber Crime by
Cyber CrimeCyber Crime
Cyber CrimeDarshan Vithani
5.1K views15 slides
Shilpa by
ShilpaShilpa
ShilpaShilpa Nayak
481 views10 slides
Cyber law by
Cyber law Cyber law
Cyber law Arshad_A
604 views10 slides
Mobile security issues & frauds in India by
Mobile security issues & frauds in IndiaMobile security issues & frauds in India
Mobile security issues & frauds in IndiaYogesh Lolge
1.1K views21 slides
Email crimes and Cyber Law-Nasscom Cyber safe 2010 by
Email crimes and Cyber Law-Nasscom Cyber safe 2010Email crimes and Cyber Law-Nasscom Cyber safe 2010
Email crimes and Cyber Law-Nasscom Cyber safe 2010Adv Prashant Mali
3.4K views29 slides

More Related Content

What's hot

Cyber Laws by
Cyber LawsCyber Laws
Cyber Lawsmayur_ceh
2.9K views20 slides
Cyber Crime and a Case Study by
Cyber Crime and a Case StudyCyber Crime and a Case Study
Cyber Crime and a Case StudyPratham Jaiswal
2.9K views11 slides
Web security by
Web securityWeb security
Web securityJatin Grover
683 views12 slides
It act by
It actIt act
It actAkash Maheshwari
333 views14 slides
Cyber crime and laws by
Cyber crime and lawsCyber crime and laws
Cyber crime and lawsAjnish Rana
626 views22 slides
IT ACT 2000 by
IT ACT 2000IT ACT 2000
IT ACT 2000Kaustubh Barve
3.1K views26 slides

What's hot(20)

Cyber Laws by mayur_ceh
Cyber LawsCyber Laws
Cyber Laws
mayur_ceh2.9K views
Cyber crime and laws by Ajnish Rana
Cyber crime and lawsCyber crime and laws
Cyber crime and laws
Ajnish Rana626 views
87161911 selected-case-studies-on-cyber-crime by homeworkping4
87161911 selected-case-studies-on-cyber-crime87161911 selected-case-studies-on-cyber-crime
87161911 selected-case-studies-on-cyber-crime
homeworkping44.2K views
Pervasive Device and Service Discovery Protocol in Interoperability XBee-IP N... by TELKOMNIKA JOURNAL
Pervasive Device and Service Discovery Protocol in Interoperability XBee-IP N...Pervasive Device and Service Discovery Protocol in Interoperability XBee-IP N...
Pervasive Device and Service Discovery Protocol in Interoperability XBee-IP N...
Cyber laws by ananthu07
Cyber lawsCyber laws
Cyber laws
ananthu07766 views
IRJET- Wireless LAN Intrusion Detection and Prevention System for Malicious A... by IRJET Journal
IRJET- Wireless LAN Intrusion Detection and Prevention System for Malicious A...IRJET- Wireless LAN Intrusion Detection and Prevention System for Malicious A...
IRJET- Wireless LAN Intrusion Detection and Prevention System for Malicious A...
IRJET Journal20 views
Cyber law cases by Snavi
Cyber law casesCyber law cases
Cyber law cases
Snavi418 views
Cyber Crime & Information technology Act 2000 by V'vek Sharma
Cyber Crime & Information technology Act 2000Cyber Crime & Information technology Act 2000
Cyber Crime & Information technology Act 2000
V'vek Sharma13.2K views
Cyber Crime(Hacking) - IT acts by Jayati Tiwari
Cyber Crime(Hacking) - IT acts Cyber Crime(Hacking) - IT acts
Cyber Crime(Hacking) - IT acts
Jayati Tiwari133 views
Various cyber crime by asha mali
Various cyber crimeVarious cyber crime
Various cyber crime
asha mali1.1K views

Similar to Cyber Security Seminar Day 1

Introduction To Ethical Hacking by
Introduction To Ethical HackingIntroduction To Ethical Hacking
Introduction To Ethical HackingNeel Kamal
52.7K views90 slides
Cyber crime ✔ by
Cyber  crime  ✔Cyber  crime  ✔
Cyber crime ✔hubbysoni
2.4K views29 slides
Unit 1 Introducation by
Unit 1 IntroducationUnit 1 Introducation
Unit 1 IntroducationTushar Rajput
570 views27 slides
What Are The Advantages And Disadvantages Of I-Voting System by
What Are The Advantages And Disadvantages Of I-Voting SystemWhat Are The Advantages And Disadvantages Of I-Voting System
What Are The Advantages And Disadvantages Of I-Voting SystemAlejandra Rodriguez
3 views44 slides
Cyber Law in India.pptx by
Cyber Law in India.pptxCyber Law in India.pptx
Cyber Law in India.pptxRahul Bharati
212 views44 slides
IT Act,2000 - Law by
IT Act,2000 - LawIT Act,2000 - Law
IT Act,2000 - LawApurva Kavishwar
14.7K views34 slides

Similar to Cyber Security Seminar Day 1(20)

Introduction To Ethical Hacking by Neel Kamal
Introduction To Ethical HackingIntroduction To Ethical Hacking
Introduction To Ethical Hacking
Neel Kamal52.7K views
Cyber crime ✔ by hubbysoni
Cyber  crime  ✔Cyber  crime  ✔
Cyber crime ✔
hubbysoni2.4K views
What Are The Advantages And Disadvantages Of I-Voting System by Alejandra Rodriguez
What Are The Advantages And Disadvantages Of I-Voting SystemWhat Are The Advantages And Disadvantages Of I-Voting System
What Are The Advantages And Disadvantages Of I-Voting System
Legal aspects of handling cyber frauds by Sagar Rahurkar
Legal aspects of handling cyber fraudsLegal aspects of handling cyber frauds
Legal aspects of handling cyber frauds
Sagar Rahurkar2.2K views
A Review Paper on Cyber-Security by IRJET Journal
A Review Paper on Cyber-SecurityA Review Paper on Cyber-Security
A Review Paper on Cyber-Security
IRJET Journal29 views
Cyber crime & security final tapan by Tapan Khilar
Cyber crime & security final tapanCyber crime & security final tapan
Cyber crime & security final tapan
Tapan Khilar669 views
Cyber crime presentation By Vaibhav Gaur by Vaibhav's Group
Cyber crime presentation By Vaibhav GaurCyber crime presentation By Vaibhav Gaur
Cyber crime presentation By Vaibhav Gaur
Vaibhav's Group2.8K views
MIS 21 Security and Ethical Challenges by Tushar B Kute
MIS 21 Security and Ethical ChallengesMIS 21 Security and Ethical Challenges
MIS 21 Security and Ethical Challenges
Tushar B Kute2.1K views
presentation_cybercrime_1486105587_257582.ppt by JatinRajput67
presentation_cybercrime_1486105587_257582.pptpresentation_cybercrime_1486105587_257582.ppt
presentation_cybercrime_1486105587_257582.ppt
JatinRajput6713 views

More from Apurv Singh Gautam

Automating Threat Hunting on the Dark Web and other nitty-gritty things by
Automating Threat Hunting on the Dark Web and other nitty-gritty thingsAutomating Threat Hunting on the Dark Web and other nitty-gritty things
Automating Threat Hunting on the Dark Web and other nitty-gritty thingsApurv Singh Gautam
919 views36 slides
Threat Hunting on the Dark Web by
Threat Hunting on the Dark WebThreat Hunting on the Dark Web
Threat Hunting on the Dark WebApurv Singh Gautam
210 views28 slides
All about Cyber Security - From the perspective of a MS student by
All about Cyber Security - From the perspective of a MS studentAll about Cyber Security - From the perspective of a MS student
All about Cyber Security - From the perspective of a MS studentApurv Singh Gautam
216 views28 slides
SIT Summer School (Cyber Security) by
SIT Summer School (Cyber Security)SIT Summer School (Cyber Security)
SIT Summer School (Cyber Security)Apurv Singh Gautam
147 views60 slides
Cyber Security Seminar Day 2 by
Cyber Security Seminar Day 2Cyber Security Seminar Day 2
Cyber Security Seminar Day 2Apurv Singh Gautam
133 views32 slides
Cyber Security Fundamentals by
Cyber Security FundamentalsCyber Security Fundamentals
Cyber Security FundamentalsApurv Singh Gautam
287 views32 slides

More from Apurv Singh Gautam(15)

Automating Threat Hunting on the Dark Web and other nitty-gritty things by Apurv Singh Gautam
Automating Threat Hunting on the Dark Web and other nitty-gritty thingsAutomating Threat Hunting on the Dark Web and other nitty-gritty things
Automating Threat Hunting on the Dark Web and other nitty-gritty things
Apurv Singh Gautam919 views
All about Cyber Security - From the perspective of a MS student by Apurv Singh Gautam
All about Cyber Security - From the perspective of a MS studentAll about Cyber Security - From the perspective of a MS student
All about Cyber Security - From the perspective of a MS student
Apurv Singh Gautam216 views

Recently uploaded

Cocktail of Environments. How to Mix Test and Development Environments and St... by
Cocktail of Environments. How to Mix Test and Development Environments and St...Cocktail of Environments. How to Mix Test and Development Environments and St...
Cocktail of Environments. How to Mix Test and Development Environments and St...Aleksandr Tarasov
23 views135 slides
Redefining the book supply chain: A glimpse into the future - Tech Forum 2023 by
Redefining the book supply chain: A glimpse into the future - Tech Forum 2023Redefining the book supply chain: A glimpse into the future - Tech Forum 2023
Redefining the book supply chain: A glimpse into the future - Tech Forum 2023BookNet Canada
44 views19 slides
Transcript: Redefining the book supply chain: A glimpse into the future - Tec... by
Transcript: Redefining the book supply chain: A glimpse into the future - Tec...Transcript: Redefining the book supply chain: A glimpse into the future - Tec...
Transcript: Redefining the book supply chain: A glimpse into the future - Tec...BookNet Canada
41 views16 slides
LLMs in Production: Tooling, Process, and Team Structure by
LLMs in Production: Tooling, Process, and Team StructureLLMs in Production: Tooling, Process, and Team Structure
LLMs in Production: Tooling, Process, and Team StructureAggregage
57 views77 slides
PCCC23:日本AMD株式会社 テーマ2「AMD EPYC™ プロセッサーを用いたAIソリューション」 by
PCCC23:日本AMD株式会社 テーマ2「AMD EPYC™ プロセッサーを用いたAIソリューション」PCCC23:日本AMD株式会社 テーマ2「AMD EPYC™ プロセッサーを用いたAIソリューション」
PCCC23:日本AMD株式会社 テーマ2「AMD EPYC™ プロセッサーを用いたAIソリューション」PC Cluster Consortium
25 views12 slides
Measuring User on the web with the core web vitals - by @theafolayan.pptx by
Measuring User on the web with the core web vitals - by @theafolayan.pptxMeasuring User on the web with the core web vitals - by @theafolayan.pptx
Measuring User on the web with the core web vitals - by @theafolayan.pptxOluwaseun Raphael Afolayan
14 views13 slides

Recently uploaded(20)

Cocktail of Environments. How to Mix Test and Development Environments and St... by Aleksandr Tarasov
Cocktail of Environments. How to Mix Test and Development Environments and St...Cocktail of Environments. How to Mix Test and Development Environments and St...
Cocktail of Environments. How to Mix Test and Development Environments and St...
Redefining the book supply chain: A glimpse into the future - Tech Forum 2023 by BookNet Canada
Redefining the book supply chain: A glimpse into the future - Tech Forum 2023Redefining the book supply chain: A glimpse into the future - Tech Forum 2023
Redefining the book supply chain: A glimpse into the future - Tech Forum 2023
BookNet Canada44 views
Transcript: Redefining the book supply chain: A glimpse into the future - Tec... by BookNet Canada
Transcript: Redefining the book supply chain: A glimpse into the future - Tec...Transcript: Redefining the book supply chain: A glimpse into the future - Tec...
Transcript: Redefining the book supply chain: A glimpse into the future - Tec...
BookNet Canada41 views
LLMs in Production: Tooling, Process, and Team Structure by Aggregage
LLMs in Production: Tooling, Process, and Team StructureLLMs in Production: Tooling, Process, and Team Structure
LLMs in Production: Tooling, Process, and Team Structure
Aggregage57 views
PCCC23:日本AMD株式会社 テーマ2「AMD EPYC™ プロセッサーを用いたAIソリューション」 by PC Cluster Consortium
PCCC23:日本AMD株式会社 テーマ2「AMD EPYC™ プロセッサーを用いたAIソリューション」PCCC23:日本AMD株式会社 テーマ2「AMD EPYC™ プロセッサーを用いたAIソリューション」
PCCC23:日本AMD株式会社 テーマ2「AMD EPYC™ プロセッサーを用いたAIソリューション」
Webinar : Desperately Seeking Transformation - Part 2: Insights from leading... by The Digital Insurer
Webinar : Desperately Seeking Transformation - Part 2:  Insights from leading...Webinar : Desperately Seeking Transformation - Part 2:  Insights from leading...
Webinar : Desperately Seeking Transformation - Part 2: Insights from leading...
Mobile Core Solutions & Successful Cases.pdf by IPLOOK Networks
Mobile Core Solutions & Successful Cases.pdfMobile Core Solutions & Successful Cases.pdf
Mobile Core Solutions & Successful Cases.pdf
IPLOOK Networks14 views
NTGapps NTG LowCode Platform by Mustafa Kuğu
NTGapps NTG LowCode Platform NTGapps NTG LowCode Platform
NTGapps NTG LowCode Platform
Mustafa Kuğu437 views
Discover Aura Workshop (12.5.23).pdf by Neo4j
Discover Aura Workshop (12.5.23).pdfDiscover Aura Workshop (12.5.23).pdf
Discover Aura Workshop (12.5.23).pdf
Neo4j15 views
AIM102-S_Cognizant_CognizantCognitive by PhilipBasford
AIM102-S_Cognizant_CognizantCognitiveAIM102-S_Cognizant_CognizantCognitive
AIM102-S_Cognizant_CognizantCognitive
PhilipBasford21 views
Adopting Karpenter for Cost and Simplicity at Grafana Labs.pdf by MichaelOLeary82
Adopting Karpenter for Cost and Simplicity at Grafana Labs.pdfAdopting Karpenter for Cost and Simplicity at Grafana Labs.pdf
Adopting Karpenter for Cost and Simplicity at Grafana Labs.pdf
MichaelOLeary8213 views
The Power of Generative AI in Accelerating No Code Adoption.pdf by Saeed Al Dhaheri
The Power of Generative AI in Accelerating No Code Adoption.pdfThe Power of Generative AI in Accelerating No Code Adoption.pdf
The Power of Generative AI in Accelerating No Code Adoption.pdf
Saeed Al Dhaheri39 views
PCCC23:日本AMD株式会社 テーマ1「AMD Instinct™ アクセラレーターの概要」 by PC Cluster Consortium
PCCC23:日本AMD株式会社 テーマ1「AMD Instinct™ アクセラレーターの概要」PCCC23:日本AMD株式会社 テーマ1「AMD Instinct™ アクセラレーターの概要」
PCCC23:日本AMD株式会社 テーマ1「AMD Instinct™ アクセラレーターの概要」
"Package management in monorepos", Zoltan Kochan by Fwdays
"Package management in monorepos", Zoltan Kochan"Package management in monorepos", Zoltan Kochan
"Package management in monorepos", Zoltan Kochan
Fwdays34 views

Cyber Security Seminar Day 1

  • 4. NEED OF SECURITY  Increasing awareness of technology but not Security  Continuous Development & Competition in IT  Increasing number of Cyber Criminals  Increasing use of Network elements & applications  Decreasing level of skill set
  • 6. NEED OF SECURITY  Any Security breach in the website of any person increases the risk of the public image  Any Security breach in the website of any company increases the risk of company reputation  Any Security breach in the government website may increase the risk on project management and government operations  Any Security breach in the Military sector may jeopardise the safety of any country
  • 8. What is HACKING??  Hacking is an art of exploring various security breaches  What people believe: It’s an anti-social activity : All the hackers are bad people  The terms Hacker and Hacking are being misinterpreted and misunderstood with negative sidelines
  • 9. COMMUNITIES OF HACKERS  Hackers  Crackers  Phreaks  Script Kiddies
  • 10. TYPES OF HACKERS  White Hat Hacker - They use their knowledge and skill set for good constructive intents. They find out new security loopholes and their solutions  Black Hat Hacker - They use their knowledge and skill set for illegal activities and destructive intents  Grey Hat Hacker – They use their knowledge and skill set for legal and illegal purpose. They are white hats in public but internally they do some black hat work
  • 11. HACKING STRATEGY  Reconnaissance (Information Gathering)  Scanning  Gaining Access  Maintaining Access  Covering Tracks
  • 12. Cyber Crime is no more FUN…!!!  Cyber crime controlled by IT ACT 2008 and respective IPC (constantly evolving)  Complete control of Govt agencies over information stored, processed and transmitted over internet  Upgradation of Investigating agencies with latest technology  Service providers like ISPs, email service providers, etc are liable to share information with Govt agencies  Upgradation of Forensic labs  Stringent punishment for cyber crimes
  • 13. Common Scenarios - Cyber Pornography  Cyber pornography covers pornographic websites, pornographic magazines produced using computers and the Internet.  Whoever publishes or transmits or causes to be published in the electronic form, any material which is obscene in nature falls under cyber pornography  Section 67: Punishment for publishing or transmitting obscene material in electronic form  Punishment – Imprisonment from 2 – 10 years with fine upto 10 lakhs
  • 14. Common Scenarios – Identity Theft  Identity theft is a term used to refer to fraud that involves stealing money or getting other benefits by pretending to be someone else.  Section 66C Punishment for identity theft. Whoever, fraudulently or dishonestly make use of the electronic signature, password or any other unique identification feature of any other person, shall be punished with imprisonment of either description for a term which may extend to three years and shall also be liable to fine which may extend to rupees one lakh.  Section 66D Punishment for cheating by personation by using computer resource Whoever, by means of any communication device or computer resource cheats by personation, shall be punished with imprisonment of either description for a term which may extend to three years and shall also be liable to fine which may extend to one lakh rupees.
  • 16. TYPES OF NETWORK  LAN – Local Area Network LAN can establish the communication within a lab or within a building e.g.-Office, Schools, etc  MAN – Metropolitan Area Network MAN can establish the communication between two or more LANs e.g.-Radio, ATM, Metro, etc  WAN – Wide Area Network WAN can establish the communication globally e.g.-VSAT, Telecom Networks, Internet, etc
  • 17. IP ADDRESS IP Address is also known as,  Logical Address, or  Unique Identity Address It is used to identify the systems. Whenever any computer connects itself with the internet or with LAN, it gets one IP address, that IP address is always unique in the network. This means, once an IP address is assigned to any system in the network, it cannot be assigned to any other system. The same in the internet, if one IP address has been assigned to one system, it cannot be assigned to anyone else
  • 18. IP VERSION  IPv4 - Internet Protocol Version -4 IPv4 is a 32 bit addressing protocol. The range of this IP starts from 0.0.0.0 to 255.255.255.255 i.e. – 192.168.1.24  IPv6 – Internet Protocol Version-6 IPv6 is a 128 bit addressing protocol. IPv6 addresses are written in eight groups of four hexadecimal digits separated by colons. i.e. - 2001:0db8:85a3:0000:0000:8a2e:0370:7334
  • 19. IP TYPES  Internal IP - Whenever a computer connects itself with an Internal Network (LAN) , it gets an Internal IP. This IP will be the identity of the particular computer in the network  External IP - Whenever a computer connects itself with the internet , it gets an IP address by ISP. This IP will be the identity of the particular computer over the internet.
  • 20. IP TYPES Both the Internal & External IP address can be allocated in two forms.  Static IP Address - Static IP Address remains same in all the sessions.  Dynamic IP Address - Dynamic IP Address keeps changing in all the sessions.
  • 21. ISP & IANA ISP is an Internet Service Provider. All the internet users get the IP Address from the ISP.  According to the client request, ISP assigns them Static or Dynamic IP IANA manages global IP ranges space.  IANA works in co-operation with five Regional Internet Registries (RIRs) to allocate IP address blocks to Local Internet Registries (Internet Service Providers) and other entities