KAPLAN SCHOOL OF INFORMATION SYSTEMS AND TECHNOLOGY Network Management Unit 4 Course Name – IT475-01 Network Management Instructor – Jan McDanolds, MS,

Slides:



Advertisements
Similar presentations
Information System Audit : © South-Asian Management Technologies Foundation Chapter 4: Information System Audit Requirements.
Advertisements

VoIP: Full Lifecycle Management Russell M. Elsner APM Technology Director OPNET Technologies, Inc.
Security+ Guide to Network Security Fundamentals
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Qualitative.
ITS Offsite Workshop 2002 PolyU IT Security Policy PolyU IT/Computer Systems Security Policy (SSP) By Ken Chung Senior Computing Officer Information Technology.
1 Output Controls Ensure that system output is not lost, misdirected, or corrupted and that privacy is not violated. Exposures of this sort can cause serious.
©2003 Prentice Hall Business Publishing, Accounting Information Systems, 9/e, Romney/Steinbart 18-1 Accounting Information Systems 9 th Edition Marshall.
Unit 7 Chapter 9, plus Lab 11 Course Name – IT Network Design
Security Overview. 2 Objectives Understand network security Understand security threat trends and their ramifications Understand the goals of network.
Network security policy: best practices
UNIT 9 SEMINAR – THE LAST ONE  ! Unit 9 Chapter 9 in CompTIA Security + 1 Course Name – IT Introduction to Network Security Instructor – Jan McDanolds,
UNIT 4 SEMINAR Unit 4 Chapter 4 in CompTIA Security + Course Name – IT Introduction to Network Security Instructor – Jan McDanolds, MS Contact Information:
SEC835 Database and Web application security Information Security Architecture.
Chapter 17: Computer Audits ACCT620 Internal Accounting Otto Chang Professor of Accounting.
HIPAA COMPLIANCE WITH DELL
Security Baseline. Definition A preliminary assessment of a newly implemented system Serves as a starting point to measure changes in configurations and.
Product Development Chapter 6. Definitions needed: Verification: The process of evaluating compliance to regulations, standards, or specifications.
Sample Security Model. Security Model Secure: Identity management & Authentication Filtering and Stateful Inspection Encryption and VPN’s Monitor: Intrusion.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Identifying Application Impacts on Network Design Designing and Supporting.
KAPLAN SCHOOL OF INFORMATION SYSTEMS AND TECHNOLOGY Unit 4 IT 484 Networking Security Course Name – IT Networking Security 1203C Term Instructor.
Information Assurance Policy Tim Shimeall
UNIT 6 SEMINAR Unit 6 Chapter 7 and 8, plus Lab 12 Course Name – IT482 Network Design Instructor – David Roberts – Office Hours:
Chapter 2 Securing Network Server and User Workstations.
KAPLAN SCHOOL OF INFORMATION SYSTEMS AND TECHNOLOGY Welcome to Introduction to Network Security! Course Name – IT Introduction to Network Security.
KAPLAN SCHOOL OF INFORMATION SYSTEMS AND TECHNOLOGY Welcome to Introduction to Network Security! Course Name – IT Introduction to Network Security.
KAPLAN SCHOOL OF INFORMATION SYSTEMS AND TECHNOLOGY Network Management Unit 7 Course Name – IT Network Management Instructor – Jan McDanolds, MS,
Audit Evidence Process
Network management Network management refers to the activities, methods, procedures, and tools that pertain to the operation, administration, maintenance,
IS3220 Information Technology Infrastructure Security
UNIT 6 SEMINAR Unit 5 Chapter 7 and 8, plus Lab 10 Course Name – IT Network Design Instructor – Jan McDanolds, MS, Security+ Contact Information:
© ITT Educational Services, Inc. All rights reserved. IS3220 Information Technology Infrastructure Security Unit 10 Network Security Management.
INFORMATION ASSURANCE POLICY. Information Assurance Information operations that protect and defend information and information systems by ensuring their.
UNIT 8 SEMINAR Unit 8 Chapter 10, plus Lab 12 Course Name – IT Network Design Instructor – Jan McDanolds, MS, Security+ Contact Information: AIM.
Lecturer: Eng. Mohamed Adam Isak PH.D Researcher in CS M.Sc. and B.Sc. of Information Technology Engineering, Lecturer in University of Somalia and Mogadishu.
KAPLAN SCHOOL OF INFORMATION SYSTEMS AND TECHNOLOGY Intrusion Detection and Incidence Response Course Name – IT Intrusion Detection and Incidence.
KAPLAN SCHOOL OF INFORMATION SYSTEMS AND TECHNOLOGY IT375 Window Enterprise Administration Course Name – IT Introduction to Network Security Instructor.
Welcome to the ICT Department Unit 3_5 Security Policies.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 17 – IT Security.
UNIT 7 SEMINAR Unit 7 Chapter 9, plus Lab 13 Course Name – IT482 Network Design Instructor – David Roberts – Office Hours: Tuesday.
KAPLAN SCHOOL OF INFORMATION SYSTEMS AND TECHNOLOGY Welcome to Introduction to Network Security! Course Name – IT Introduction to Network Security.
Lecture 1 Introduction Dr. nermin hamza 1. Aim of Course Overview Cryptography Symmetric and Asymmetric Key management Researches topics 2.
TIME MANAGEMENT: One of the Key Components to Being a Successful Online Student Unit 2.
Information Systems Security
CS457 Introduction to Information Security Systems
Auditing Concepts.
Information Security Policy
CompTIA Security+ Study Guide (SY0-401)
Chapter 9 Optimizing Network Performance
SOFTWARE TESTING Date: 29-Dec-2016 By: Ram Karthick.
CSCE 548 Secure Software Development Risk-Based Security Testing
Subcontracting SBP 210 Lesson 1: Introduction
9/4/2018 6:45 PM Secure your Office 365 environment with best practices recommended for political campaigns Ethan Chumley Campaign Technology Advisor Civic.
Security Engineering.
Information Security Seminar
THE STEPS TO MANAGE THE GRID
CompTIA Security+ Study Guide (SY0-401)
Chapter 3: Open Systems Interconnection (OSI) Model
IS4680 Security Auditing for Compliance
IS4550 Security Policies and Implementation
Network Performance Manager
IS4680 Security Auditing for Compliance
Chapter 27 Security Engineering
1 Stadium Company Network. The Stadium Company Project Is a sports facility management company that manages a stadium. Stadium Company needs to upgrade.
DEPLOYING SECURITY CONFIGURATION
PLANNING A SECURE BASELINE INSTALLATION
Requirements Definition
Cryptography and Network Security
Tonight – Finishing off workshop
Unit # 1: Overview of the Course Dr. Bhavani Thuraisingham
Presentation transcript:

KAPLAN SCHOOL OF INFORMATION SYSTEMS AND TECHNOLOGY Network Management Unit 4 Course Name – IT Network Management Instructor – Jan McDanolds, MS, Security+ Contact Information: AIM – JMcDanolds – Office Hours: Tuesday, 7:00 PM ET or Wednesday, 8:00 PM ET

UNIT 3 REVIEW What was covered in Chapter 5 and 6 Fault Detection and Correction and Accounting and Billing F - Fault detection and correction C - Configuration and operation A - Accounting and billing P - Performance assessment and optimization S - Security assurance and protection

UNIT 4 Chapter 7 and Chapter 8 Chapter 7 (Performance Assessment and Optimization) and Chapter 8 (Security) – Last two in FCA PS Performance Assessment – how resources are currently being used and long-term trends, capacity Security – “there is no such thing as a secure computer network” Management goals – protection of resources, control of access and guarantee of confidentiality and safety

UNIT 4 Aspects of Performance What to measure? How to obtain measurements? What to do with the measurements? What can be measured: individual links, network elements, network services and applications Measures: latency, throughput, packet loss, jitter and availability

UNIT 4 Application and Endpoint Sensitivity Not easily measured – end user perception Application sensitivity – remote login, voice (VoIP) or file transfer. Various needs – high throughput, low latency, low jitter, etc. Not one measurement, different paths and equipment

UNIT 4 Congestion Degraded service – from baseline including latency, throughput, lose, and jitter. Also, nonoptimal routes or route flapping. Congestion – high burst rate, queue fills Equation – D = D divided by increase in utilization (if utilization approaches 100%, congestion causes delay)

UNIT 4 Local vs End-to-End Measurements Local – single resources, link, or element End-to-End – behavior of application across the entire network. Not just a calculation of each element/link

UNIT 4 Passive Observation vs Active Probing Passive observation – nonintrusive mechanism to obtain measurements without affecting the network or the traffic. Mostly local. Active probing – intrusive because the probes add additional traffic. Measures end-to-end performance.

UNIT 4 Bottlenecks and Future Planning Two types of performance optimization: - Optimize current network performance (identify bottlenecks - Optimize future network performance (anticipate future needs for throughput, latency, etc. and integrate new equipment/topology)

UNIT 4 Capacity Planning “Capacity planning requires a manager to estimate the size of resources that will be needed to meet anticipated load, taking into account a desired level of performance, a desired level of robustness and resilience, and a bound on cost.” Measurements, guess work, a crystal ball and gut feelings.

UNIT 4 Capacity Planning Six steps: #1 Use measurement of the current network and forecasting to device an estimate of expected load #2 Translate the expected load into a model that can be used with capacity planning software #3 Use the load model plus a description of network resources to compute resource utilization estimates and validate the results #4 Propose modifications to the network topology or routing and compute the new resource utilization estimates. #5 Use resource utilization estimates to derive estimates on the performance needed from network elements and links #6 Use performance estimates to make recommendations for capacity increases and the resulting costs.

UNIT 4 Security The “S” in FCAPS Security as a continual process: Assess potential risks Establish policies to avoid risk Evaluate technologies and mechanisms Deploy appropriate procedures and technologies Measure effective solutions Pg. 98 Security Terminology – Identity, Authentication, Authorization, Data Integrity, Privacy and Confidentiality, and Encryption

UNIT 4 Security Management goals relating to security: protection of resources, control of access and guarantee of confidentiality and safety Risk Assessment: ease-of-use versus risk of misuse Security Policies: documented guidelines for the organization. Statements may focus on personnel, procedures, required handling of data, or results of misuse

UNIT 4 Security Basic Technologies Used: - Encryption technologies - Perimeter control technologies - Content control technologies Security of the Network “In addition to technologies that protect the network itself, a manager needs to find ways to check changes that personnel make because many security problems arise from human error.” Access Control, Audit Trails and Security Logging, and Encryption Key Management provide mechanisms to manage tasks and team members

UNIT 4 OPNet IT Guru Download and install OPNet IT Guru You will need to copy the License Approval Code and paste it into the box. Download the IT475-Manuals.zip file from Doc Sharing Follow the instructions in the to get the lab files installed in a directory.

UNIT 4 Unit 4 Readings Chapter 7 and 8 In Automated Network Management Systems ALSO: Download and install OPNET IT Guru Academic Edition

UNIT 4 Unit 4 Assignment Be sure to do screen captures! any questions: Or you can call me

UNIT 4 Unit 4 Assignments Download the two chapters and Manuals.zip (labs) from Doc Sharing Download and install OPNET IT Guru Read the two chapters Post to Discussion (three topics) Attend Seminar or do alternate essay Complete Assignment using OPNet (show screen captures)