Networking and Security Issues in Digital Library

Slides:



Advertisements
Similar presentations
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 1: Exploring the Network Network Basics.
Advertisements

Principles of Information Systems, Sixth Edition The Internet, Intranets, and Extranets Chapter 7.
Fundamentals of Information Systems, Second Edition 1 Telecommunications, the Internet, Intranets, and Extranets Chapter 4.
Internet, Intranet and Extranets
2 An Overview of Telecommunications and Networks Telecommunications: the _________ transmission of signals for communications (home net) (home net)
IS Network and Telecommunications Risks
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Mgt 20600: IT Management & Applications Telecommuncations and Networks Tuesday March 28, 2006.
1 Pertemuan 11 & 12 The Internet and the New Information Technology Infrastructure Matakuliah: J0454 / Sistem Informasi Manajemen Tahun: 2006 Versi: 1.
Chapter 9 The Internet: Information Technology Infrastructure for the Digital Firm.
NETWORKS Lauren Hickman Patrick McCamy Morgan Pace Noah Ryder.
Lecture 11 Reliability and Security in IT infrastructure.
SESSION 9 THE INTERNET AND THE NEW INFORMATION NEW INFORMATIONTECHNOLOGYINFRASTRUCTURE.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 1: Exploring the Network Introduction to Networks.
Lecture slides prepared for “Business Data Communications”, 7/e, by William Stallings and Tom Case, Chapter 8 “TCP/IP”.
1 Telecommunications, the Internet, Intranets, and Extranets CSC101 SECTIONS 01 & 02.
Business Computing 550 Lesson 4. Fundamentals of Information Systems, Fifth Edition Chapter 4 Telecommunications, the Internet, Intranets, and Extranets.
Principles of Information Systems, Sixth Edition The Internet, Intranets, and Extranets Chapter 7.
1 IS 8950 Managing Network Infrastructure and Operations.
The Internet, Intranets, & Extranets Chapter 7. IS for Management2 The Internet (1) A collection of networks that pass data around in packets, each of.
COMP 6005 An Introduction To Computing Session Four: Internetworking and the World Wide Web.
“Assuring Reliable and Secure IT Services”. IT Redundancy: Its Value How much reliability to buy? Customer Service impacted as a result of 15 minutes.
Introduction to Information Technology, 2 nd Edition Turban, Rainer & Potter © 2003 John Wiley & Sons, Inc. 7-1 Introduction to Information Technology.
Exploring Business 2.0 © 2012 Flat World Knowledge Chapter 15: Managing Information And Technology.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 1: Exploring the Network Introduction to Networks.
1.Too many users 2.Technical factors 3.Organizational factors 4.Environmental factors 5.Poor management decisions Which of the following is not a source.
Exploring the Network.
ITEC 1010 Introduction to Information Technologies Introduction to Information Technology The Internet, Intranets, and Extranets.
1 An Overview of Telecommunications Telecommunications: the electronic transmission of signals for communications Telecommunications medium: anything that.
Fundamentals of Information Systems, Second Edition 1 Telecommunications, the Internet, Intranets, and Extranets.
Networking and Security Issues in Digital Library Dr. R. Radhakrishna Pillai IIM Kozhikode.
IS Network and Telecommunications Risks Chapter Six.
Introduction to Information Systems Lecture 06 Telecommunications and Networks Business Value of Networks Jaeki Song.
ACM 511 Introduction to Computer Networks. Computer Networks.
Principles of Information Systems, Sixth Edition 1 The Internet, Intranets, and Extranets Chapter 7.
Living Online Module Lesson 23 — Networks and Telecommunication Computer Literacy BASICS.
CHAPTER 7 THE INTERNET AND INTRANETS 1/11. What is the Internet? 2/11 Large computer network ARPANET (Dept of Defense) It is international and growing.
Security and Assurance in IT organization Name: Mai Hoang Nguyen Class: INFO 609 Professor: T. Rohm.
Fundamentals of Information Systems, Second Edition 1 Telecommunications, the Internet, Intranets, and Extranets.
TELECOMMUNICATIONS AND NETWORKS
Communications and Networks Chapter 9 9-1Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved.
Understanding IT Infrastructure Lecture 9. 2 Announcements Business Case due Thursday Business Analysis teams have been formed Business Analysis Proposals.
Communications and Networks Chapter 9 McGraw-HillCopyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved.
Network Processing Systems Design
Chapter5 TELECOMMUNICATIONS AND NETWORKS. Content Networking the Enterprise Trends in Telecommunications The Business Value of Telecommunications Networks.
E-Business Infrastructure PRESENTED BY IKA NOVITA DEWI, MCS.
Virtual Private Networks
Chapter 1: Explore the Network
Securing Information Systems
Instructor Materials Chapter 5 Providing Network Services
Internet, Intranet and Extranets
Discovering Computers 2010: Living in a Digital World Chapter 14
The Internet & World Wide Web
Internet and Intranet.
Internet, Intranet and Extranets
E-Commerce.
Communications and Networks Chapter 9 McGraw-Hill/Irwin
CHAPTER 1 INTRODUCTION NETWORKING
Chapter 1: Introduction
Internet and Intranet.
Internet, Intranet and Extranets
Chapter 1: Introduction
Virtual Private Network
Department of Computer Science Course : Pre Computer Skills
Firewalls Jiang Long Spring 2002.
Internet and Intranet.
Introduction to Information Technology
Internet and Intranet.
Topic 12: Virtual Private Networks
Presentation transcript:

Networking and Security Issues in Digital Library Dr. R. Radhakrishna Pillai IIM Kozhikode

What is the Internet? The largest computer network in the world (a network of networks) Information exchange is seamless using open, non-proprietary standards and protocols, within interconnected networks Spirit of information sharing and open access underlies the Internet.

Networking Components Hosts (end Systems) Server Packet Switch/Router Modem Mobile Base Station Satellite link

The rule for exchanging information between two computers Networking Protocol The rule for exchanging information between two computers

End-to-end Communication The communication always takes place between two end systems (hosts)

The network core comprises of switches or routers

Circuit Switching In Circuit Switching the network resources (e.g., capacity/bandwidth) are reserved for communication

Circuit Switching In Circuit Switching the network resources (e.g., capacity/bandwidth) are reserved for communication

Packet Switching In Packet Switching the network resources (e.g., capacity/bandwidth) are NOT reserved for communication. Packets between various hosts share common resources

Classification of Networks Packet switched networks have “Efficient” utilization of resources (e.g. The Internet) compared to circuit switched networks (e.g., The Telephone Network)

Access Networks Access networks connect the end-systems to the core network. Different technologies are used for access

Access Networks Access networks connect the end-systems to the core network. Different technologies are used for access (e.g. Hybrid fiber-coaxial access)

Access Networks Access networks connect the end-systems to the core network. Different technologies are used for access (e.g. Home Network)

Various components of packet delay include Delays in Networks Various components of packet delay include Nodal processing delay Queueing delay Transmission delay Propagation delay

Dependence of Queueing delay on traffic intensity Delays in Networks Dependence of Queueing delay on traffic intensity

Smaller sized packets result in smaller end-to-end delays Delays in Networks Smaller sized packets result in smaller end-to-end delays

Layers of functions with standardised interface between them Protocol Stack Layers of functions with standardised interface between them

Layers of functions with standardised interface between them Protocol Stack Layers of functions with standardised interface between them

Storage Area Networks (SAN) Storage use is growing explosively Managing locally attached storage is difficult Backup Access by multiple servers Combines the best of storage and networking technologies to provide low latency, high bandwidth, high availability interconnect Components Servers Storage Fabric

Storage Area Networks (SAN) SAN enables storage resources and server resources to grow independently Storage on a given server can be increased or decreased as needed without complex reconfiguring or re-cabling of devices. Enforcing security policies for access rights to a given device is a core part of the infrastructure Data can be transferred directly from device to device without server intervention The primary technology used in storage area networks today is Fibre Channel.

Fibre Channel Technologies Arbitrated Loop

The Infrastructure of the Internet

Internet Services – World Wide Web An application that uses the Internet transport functions A system with universally accepted standards for storing, retrieving, formatting, and displaying information via a client/server architecture Based on HTML - standard hypertext language used in Web Handles text, hypermedia, graphics, and sound

Internet Challenges Internet Regulation Technical organizations (e.g., World Wide Web Consortium) develop standards governing the Internet’s functionality These organizations are not formally charged in any legal or operational sense with responsibility for the Internet How to control controversial content on the Web?

Internet Challenges (continued) Internet Expansion Tremendous Internet traffic growth has strained some elements of the network Slower retrieval times Unreliable data transmission Denial of service by overloaded servers Approaches to overcoming this congestion include Improved hardware technology Improved Web management software

Internet Challenges (continued) Internet Privacy - Web sites collect information with and without consumers’ knowledge Cookie - small data file placed on users’ hard drives when a site is first visited. Collects data on pages visited and content viewed. Three potential approaches to the privacy issue Government lets groups develop voluntary privacy standards; does not take any action now unless real problems arise Government recommends privacy standards for the Internet; does not pass laws at this time Government passes laws now for how personal information can be collected and used on the Internet Financial transaction security also a concern

Intranets A private network that uses Internet software and TCP/IP protocols Provide employees with easy access to corporate information Used to deploy corporate applications Examples – policies and procedures manuals; human resource forms; product catalogs Security is a concern Security measures include – public key security, encryption, digital certificates, firewalls

Extranets An extension of an intranet to selected outside business partners, such as suppliers, distributors, and key customers Provide business partners with easy access to corporate information and easy collaboration Security Critical to prevent unwanted entry into internal systems Virtual private networks (VPNs) are often used to add security to Internet communication

Operational Characteristics of Internet Internetworking technologies are based on open standards Internetworking technologies operate asynchronously Internet communications have inherent latency Naturally decentralised Scalable

The rise of Internetworking: Business Implications Network becomes a computer Quicker realization of economic value Emergence of real-time infrastructure: Better data better decisions, improved process visibility, Improved process efficiency, From make-to-sell to sense-and-respond Broader exposure to operational threats New models of service delivery Managing legacies

Future Internet Initiatives A collaboration among more than 180 U.S. universities to develop leading-edge networking and advanced applications for learning and research. A group of very high bandwidth networks on the Internet. Partnership between universities, industry, and government. Next Generation Internet (NGI) Federal government led initiative to advance Internet technology and applications.

Securing Infrastructure against Malicious Threats External attacks – DoS attacks, DDoS, Spoofing Intrusion Viruses and Worms

DoS/DDoS Easy to execute, difficult to defend against Abrupt termination of conversation Attack from different sites – monitoring difficult Degradation of service attack

Intrusion Get access to company’s internal IT infrastructure User name, password Sniffer software Vulnerabilities left in the software Difficult to figure out what intruders might have done inside

Viruses and Worms Replicate and spread themselves (worms) Virus needs assistance to replicate The Code Red Worm (2001)

Securing Infrastructure against Malicious Threats Defensive Measures Security Policies Firewalls Authentication Encryption Patching and Change management Intrusion detection and network monitoring

Securing Infrastructure against Malicious Threats A HOLISTIC APPROACH IS THE NEED OF THE DAY

Thank You