Keimyung University 1 Network Control Hong Taek Ju College of Information and Communication Keimyung University Tel: 053-580-5234

Slides:



Advertisements
Similar presentations
Cryptography and Network Security 2 nd Edition by William Stallings Note: Lecture slides by Lawrie Brown and Henric Johnson, Modified by Andrew Yang.
Advertisements

30/04/2015Tim S Roberts COIT13152 Operating Systems T1, 2008 Tim S Roberts.
1 Computer Security Instructor: Dr. Bo Sun. 2 Course Objectives Understand basic issues, concepts, principles, and mechanisms in computer network security.
Cryptography and Network Security Chapter 1
Lecture 1: Overview modified from slides of Lawrie Brown.
Fundamentals of Computer Security Geetika Sharma Fall 2008.
IT 221: Introduction to Information Security Principles Lecture 1: Introduction to IT Security For Educational Purposes Only Revised: August 28, 2002.
Informationsteknologi Thursday, October 11, 2007Computer Systems/Operating Systems - Class 161 Today’s class Security.
6/2/2015B.Ramamurthy1 Security B.Ramamurthy. 6/2/2015B.Ramamurthy2 Computer Security Collection of tools designed to thwart hackers Became necessary with.
CSA 223 network and web security Chapter one
1 Cryptography and Network Security Third Edition by William Stallings Lecturer: Dr. Saleem Al_Zoubi.
Note1 (Intr1) Security Problems in Computing. Overview of Computer Security2 Outline Characteristics of computer intrusions –Terminology, Types Security.
Evidor: The Evidence Collector Software using for: Software for lawyers, law firms, corporate law and IT security departments, licensed investigators,
1 ITC242 – Introduction to Data Communications Week 12 Topic 18 Chapter 19 Network Management.
CPE 5002 Network security. Look at the surroundings before you leap.
Applied Cryptography for Network Security
Introduction (Pendahuluan)  Information Security.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
SNMP and CMIP By, Vishwajit Singh Srigiri Laxman Srinivas ISQS 6341, Spring 2000.
SNMP Simple Network Management Protocol
COEN 252: Computer Forensics Router Investigation.
LECTURE16 NET 301. HOW TO SET UP A SECURE LOCAL NETWORK Step 1: Identify Your Networking Needs This is a very important step.the key considerations are:
Check Disk. Disk Defragmenter Using Disk Defragmenter Effectively Run Disk Defragmenter when the computer will receive the least usage. Educate users.
Developing a Security Policy Chapter 2. Learning Objectives Understand why a security policy is an important part of a firewall implementation Determine.
Chapter 19 Security Transparencies. 2 Chapter 19 - Objectives Scope of database security. Why database security is a serious concern for an organization.
Computer Security Tran, Van Hoai Department of Systems & Networking Faculty of Computer Science & Engineering HCMC University of Technology.
1 Kyung Hee University Prof. Choong Seon HONG Network Control.
Cryptography and Network Security
Protection & Security Introduction to Operating Systems: Module 16.
11 SECURING YOUR NETWORK PERIMETER Chapter 10. Chapter 10: SECURING YOUR NETWORK PERIMETER2 CHAPTER OBJECTIVES  Establish secure topologies.  Secure.
29.1 Lecture 29 Security I Based on the Silberschatz & Galvin’s slides And Stallings’ slides.
© Oxford University Press 2011 DISTRIBUTED COMPUTING Sunita Mahajan Sunita Mahajan, Principal, Institute of Computer Science, MET League of Colleges, Mumbai.
1 Network Monitoring Mi-Jung Choi Dept. of Computer Science KNU
Course code: ABI 204 Introduction to E-Commerce Chapter 5: Security Threats to Electronic Commerce AMA University 1.
Network security Network security. Look at the surroundings before you leap.
Network Security Introduction Light stuff – examples with Alice, Bob and Trudy Serious stuff - Security attacks, mechanisms and services.
Network Security. 2 SECURITY REQUIREMENTS Privacy (Confidentiality) Data only be accessible by authorized parties Authenticity A host or service be able.
Information Security By:-H.M.Patel. Information security There are three aspects of information security Security service Security mechanism Security.
Computer and Network Security Rabie A. Ramadan. Organization of the Course (Cont.) 2 Textbooks William Stallings, “Cryptography and Network Security,”
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami 2 nd Semester
What security is about in general? Security is about protection of assets –D. Gollmann, Computer Security, Wiley Prevention –take measures that prevent.
Information Security What is Information Security?
1 Chapter 1 – Background Computer Security T/ Tyseer Alsamany - Computer Security.
Topic 1 – Introduction Huiqun Yu Information Security Principles & Applications.
NETWORK CONTROL The Fourth Meeting. 2 Table of Contents  Introduction  Configuration Control  Security Control.
Programming Logic and Design Fourth Edition, Comprehensive Chapter 16 Using Relational Databases.
1 © 2005 Cisco Systems, Inc. All rights reserved. 111 © 2004, Cisco Systems, Inc. All rights reserved. CNIT 221 Security 2 ver.2 Module 8 City College.
Network Security & Accounting
IT Security. What is Information Security? Information security describes efforts to protect computer and non computer equipment, facilities, data, and.
Chap1: Is there a Security Problem in Computing?.
Using Routing and Remote Access Chapter Five. Exam Objectives in this Chapter:  Plan a routing strategy Identify routing protocols to use in a specified.
Network Security Introduction
INTRODUCTION TO COMPUTER & NETWORK SECURITY INSTRUCTOR: DANIA ALOMAR.
Computer threats, Attacks and Assets upasana pandit T.E comp.
C OMPUTER THREATS, ATTACKS AND ASSETS DONE BY NISHANT NARVEKAR TE COMP
Distributed Systems Ryan Chris Van Kevin. Kinds of Systems Distributed Operating System –Offers Transparent View of Network –Controls multiprocessors.
15.1 Chapter 15 Connecting LANs, Backbone Networks, and Virtual LANs Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or.
Threats, Attacks And Assets… By: Rachael L. Fernandes Roll no:
Unit 2 Personal Cyber Security and Social Engineering Part 2.
1 Network Security Maaz bin ahmad.. 2 Outline Attacks, services and mechanisms Security attacks Security services Security Mechanisms A model for Internetwork.
Lecturer: Eng. Mohamed Adam Isak PH.D Researcher in CS M.Sc. and B.Sc. of Information Technology Engineering, Lecturer in University of Somalia and Mogadishu.
Introduction to networking (Yarnfield) Configure a router.
Manajemen Jaringan, Sukiswo ST, MT 1 Network Control Sukiswo
Cryptography and Network Security
Security Shmuel Wimer prepared and instructed by
– Chapter 3 – Device Security (B)
Chapter 8: Monitoring the Network
Security network management
Cryptography and Network Security
Standards, Models and Language
Presentation transcript:

Keimyung University 1 Network Control Hong Taek Ju College of Information and Communication Keimyung University Tel:

Keimyung University 2 Table of Contents Introduction Configuration Control Security Control

Keimyung University 3 Introduction Network control is concerned with modifying parameters in and causing actions to be taken by the end systems, intermediate systems, and subnetworks that make up the network to be managed All five functional areas of NM involve monitoring and control but configuration and security are more concerned with control Issues in network control –what to control? define what is to be controlled –how to control? how to cause actions to be performed

Keimyung University 4 Configuration Management 1.Define Configuration Information 2.Configuration Monitoring –Examine values and relationships –Report on configuration status 3. Configuration Control may be required as a result of monitoring or event reports –Initialize and terminate network operations –Set and modify attribute values –Define and modify relationships

Keimyung University 5 Define Configuration Information Includes the nature and status of managed resources –specification and attributes of resources Network Resources –physical resources end systems, routers, bridges, switches, modems, etc. –logical resources TCP connections, timers, counters, virtual circuits, etc. Attributes –name, address, ID number, states, operational characteristics, # of connections, etc. Control function should be able to –define new classes and attributes (mostly done off-line) –define the type and range of attribute values

Keimyung University 6 Set and Modify Attribute Values when requesting agents to perform set and modify –the manager must be authorized –some attributes cannot be modified (e.g., # of physical ports) Modification categories –MIB update only does not require the agent to perform any other action e.g., update of static configuration information –MIB update plus resource modification requires the agent to modify the resource itself e.g., changing the state of a physical port to “disabled” –MIB update plus action perform actions as a side effect of set operation SNMP takes this approach

Keimyung University 7 Define and Modify Relationships a relationship describes an association, connection, or condition that exists between network resources –topology –hierarchy –containment –physical or logical connections –management domain Configuration control should allow on-line modification of resources without taking all or part of network down

Keimyung University 8 Security Management What should be secured in networks? –information security –computer security –network security Security Requirements –Secrecy making information accessible to only authorized users includes the hiding of the existence of information –Integrity making information modifiable to only authorized users –Availability making resources available to only authorized users

Keimyung University 9 Security Threats Interruption –destroyed or becomes unavailable or unusable –threat to “availability” Interception –an unauthorized party gains access –threat to “secrecy” Modification –an unauthorized party makes modification –threat to “integrity” Fabrication –an unauthorized party inserts false information Masquerade –an entity pretends to be a different entity

Keimyung University 10 Types of Security Threats Information source information destination (a) Normal flow (b) Interruption (c) Interception (d) Modification (e) Fabrication

Keimyung University 11 Security Threats and Network Assets.... Data Communication Lines hardware Software Masquerade Modification Interception (capture, analysis) Interruption (loss) Masquerade Modification Interception (capture, analysis) Interruption (loss) Modification Interception Interruption (deletion) Interruption (theft, denial of service)

Keimyung University 12 Security Management Functions Maintain Security Information –event logging, monitoring usage of security-related resources –receiving notification and reporting security violations –maintaining and examining security logs –maintaining backup copies of security-related files Control Resource Access Service –use access control (authentication and authorization) security codes (e.g., passwords) routing tables, accounting tables, etc. Control the Encryption Process –must be able to encrypt messages between managers & agents –specify encryption algorithms

Keimyung University 13 Summary Network control is concerned with setting and changing parameters of various parts of network resources as consequences of network monitoring and analysis Configuration control and security control are two essential aspects of network control READ Chapter 3 of Textbook