Physical and Network Topology Security

Slides:



Advertisements
Similar presentations
Network Hardware and Physical Media
Advertisements

Chapter 4 Computer Networks
Introduction to Network
Chapter 3: Planning a Network Upgrade
Top-Down Network Design Chapter Ten Selecting Technologies and Devices for Campus Networks Oppenheimer.
Top-Down Network Design Chapter Ten Selecting Technologies and Devices for Campus Networks Oppenheimer.
Network Topologies.
Network Topologies CS 1202.
Network Topologies CSC (c) Nouf AlJaffan.
1 LANs are Subnet Standards Only Physical and Data Link Layer standards Implemented by the NICs:NICs Application Transport Internet LAN Subnet (NIC) Application.
NETWORK DESIGN Customer requirements Network topologies Cable choice Hardware TSB 75 TSB72.
Computer Networks & Security
Designing and Implementing Cabling Infrastructure Dr. Saif al Zahir King Fahd University of Petroleum & Minerals Computer Engineering Department Dr. Saif.
Lesson 4 – UNDERSTANDING NETWORK CABLING. Network topologies Network cabling Installing and maintaining Network cabling Selecting and installing a SOHO.
1 LAN Topologies, Access methods (Week 1, Wednesday 1/10/2007) © Abdou Illia, Spring 2007.
Technology in Action Chapter 12 Behind the Scenes: Networking and Security in the Business World This chapter takes you behind the scenes of networking.
TYPES OF NETWORKS NETWORK CONFIGURATIONS /TOPOLOGIES TRANSMISSION MEDIA By B. Vialva.
Many Roads To Home. LAN Roads UTP STP Coaxial Fiber Optics.
Network Cabling and Wireless Network
DATA COMMUNICATION (ELA…) NETWORK TOPOLOGIES 1. O BJECTIVES Describe the basic and hybrid LAN physical topologies, and their uses, advantages and disadvantages.
Network Topologies.
 Local Area Network (LAN) Local Area Network (LAN)  Wide Area Network (WAN) (The Internet) Wide Area Network (WAN)
This is the way an organisation distributes the data across its network. It uses different types of networks to communicate the information across it.
Chapter 3 Physical Components of a Network
Communications & Networks
Network Design Essentials
Chapter 5 Networks Communicating and Sharing Resources
Computer Network: It is group of interconnected computers and devices which are sharing the same communication infrastructure and communication protocols.
Chapter 4: Computer Networks Department of Computer Science Foundation Year Program Umm Alqura University, Makkah Computer Skills /1436.
NETWORK Topologies An Introduction.
Networking and Operating Systems. Networking What is it? Things that are hooked together. Computer Network- Computers that are connected together.
Networks and Telecommunications
Chapter 2 Network Design Essentials Instructor: Nhan Nguyen Phuong.
1 Chapter 2: LAN Standards, Physical Connectivity, and Media Access.
What is a Topology? The physical topology of a network refers to the configuration of cables, computers, and other peripherals. Physical topology should.
NETWORK TOPOLOGIES There are three basic configurations used to connect computers they are the  Bus  Ring  Star.
Server is ‘host’ Clients do not communicate with each other.
Technology in Action Alan Evans Kendall Martin Mary Anne Poatsy Twelfth Edition.
Hands-on Networking Fundamentals
SYSTEM ADMINISTRATION Chapter 1 Logical and Physical Network Topologies.
Network Topologies Lecturer: Hyder R. Hamandi. Network Topologies Physical topologies describe how the cables are run in the network A topology is a way.
Gorman, Stubbs, & CEP Inc. 1 Introduction to Operating Systems Lesson 9 Introduction to Network Operating Systems.
Transmission Media The physical pathways that connect computers and devices on a network.
Net work topology Suzann Muhammad abu rewaedh
Intro to Network Design
 Topology Topology  Different types of topology Different types of topology  bus topologybus topology  ring topologyring topology  star topologystar.
OBJECTIVE: o Describe various network topologies o Discuss the role of network devices o Understand Network Configuration Factors to deploy a new network.
Chapter2 Networking Fundamentals
LAN and WAN Design: Putting It All Together
Star Topology Star Networks are one of the most common network topologies. consists of one central switch, hub or computer, which acts as a conduit to.
Networking Topology 1.BUS Topology 2.RING Topology 3.STAR Topology
Transmission Media. Characteristics to consider for Media Selection Throughput Cost Installation Maintenance Obsolescence vs bleeding edge Support Life.
Networks Network Components. Learning Objectives Describe different media for transmitting data and their carrying capabilities. Explain the different.
WELCOME TO THE WORLD OF NETWORK CLICKTECHSOLUTION.COM.
Guide to Networking Essentials Fifth Edition Chapter 2 Network Design Essentials.
What Is A Network A network is a group of computers interconnected with communication lines which allows users to share information and resources.
Chapter 1 : Computer Networks.
LECTURE#6 - CABLES Asma AlOsaimi. Copper Coaxial Cable - Thick or Thin Unshielded Twisted Pair - CAT 3,4,5,5e&6 Optical Fiber Multimode Singlemode Wireless.
Physical Network Topology. When working with a network What is Physical Topology????? The physical topology of a network refers to the configuration of.
Computer Networks Part 2
Introduction Chapter 1. Introduction  A computer network is two or more computers connected together so they can communicate with one another.  Two.
Chapter Seven Network Topology [tə'p ɒ ləd ʒɪ ]. In networking, the term “topology” refers to the layout of connected devices on a network. This article.
LECTURE#6 - CABLES Asma AlOsaimi. Copper Coaxial Cable - Thick or Thin Unshielded Twisted Pair - CAT 3,4,5,5e&6 Optical Fiber Multimode Singlemode Wireless.
Network Topologies.
Featrues of Compputer Networks
Network Topologies.
DEPARTMENT OF COMPUTER SCIENCE M.TEJASWINI
Network Topologies CS 1202.
Network Topologies CS 1202.
Physical Network Topology
Presentation transcript:

Physical and Network Topology Security Chapter 7 Physical and Network Topology Security

Objectives Explain physical security methods for workstations, servers, and network devices Implement a network topology for security Explain network communications media in relation to security Use structured network design for security Guide to Operating System Security

Physical Security Limiting physical access Location of equipment Construction quality Devices to protect Workstations Servers Network devices and communications media Guide to Operating System Security

Workstation Security Password protect user accounts Configure screen saver with a password Log off or turn off computers when not in use Lock office doors Keep ventilation holes unobstructed Keep liquids away from computer Guide to Operating System Security

Workstation Security Guide to Operating System Security

Server Security (Continued) Centralized versus decentralized considerations Environmentally controlled computer room Strong access controls Cipher locks on locked doors Power regulation devices Guide to Operating System Security

Server Security (Continued) Motion sensors Camera-monitored entrances and equipment Fire detection and suppression equipment Screen savers for servers Guide to Operating System Security

Configuring Screen Savers Windows Server Use screen saver options with passwords for servers Red Hat Linux 9.x Lock a screen using screen saver NetWare SCRSAVER command at the console SECURE CONSOLE command Guide to Operating System Security

Configuring a NetWare Screen Saver (Continued) Guide to Operating System Security

Configuring a NetWare Screen Saver Guide to Operating System Security

Network Devices Access servers Bridges Chassis hubs Firewalls Hubs Multiplexers Repeaters Routers Switches Transceivers UPS Guide to Operating System Security

Securing Network Devices Place central wiring and network devices in wiring closets that follow EIA/TIA-569 standards Telecommunications room Main cross-connect Intermediate cross-connect Locate wiring closets away from sources of EMI and RFI Guide to Operating System Security

Designing a Network Topology for Security Main network topologies Bus Ring Star Bus-star Guide to Operating System Security

Bus Topology Cable runs from one computer to the next, like a chain Terminators connect to each bus cable segment Disadvantages Easily compromised by removing a terminator Easy for unauthorized person to tap into cable segment Guide to Operating System Security

Bus Topology Guide to Operating System Security

Ring Topology Continuous path for data; no logical beginning or ending point; no terminators Easier to manage, more reliable, and more secure than the bus More expensive than the bus Guide to Operating System Security

Ring Topology Guide to Operating System Security

Star Topology Multiple stations attached to central hub or switch Allows you to emphasize security, efficiency, and reliability Guide to Operating System Security

Star Topology Guide to Operating System Security

Star Topology Advantages Disadvantages Wide variety of equipment available Unauthorized taps are difficult Easier to manage than the bus Expansion options Disadvantages Hub or switch is single point of failure Requires more cable than bus Guide to Operating System Security

Logical Bus Networks in a Physical Star Layout Most common topology Advantages No exposed terminators to pose security risk Expansion capabilities Guide to Operating System Security

Communications Media and Network Security Coaxial cable Twisted-pair cable Fiber-optic cable Wireless technologies Guide to Operating System Security

Coaxial Cable Copper wire construction Thick and thin varieties Suitability Older LANs LANs with strong sources of signal interference Guide to Operating System Security

Thick Coaxial Cable Guide to Operating System Security

Thin Coaxial Cable (Thinnet) Guide to Operating System Security

Twisted-Pair Cable Copper wire construction Shielded twisted-pair (STP) and unshielded twisted-pair (UTP) Most commonly used cabling Guide to Operating System Security

Twisted-Pair Cable Guide to Operating System Security

Fiber-Optic Cable Glass (usually) or plastic cable Single mode and multimode Suitability High-speed LAN and WAN access To connect networks between different locations In situations with significant electrical interference Where security is a concern Guide to Operating System Security

Fiber-Optic Cable Guide to Operating System Security

Wireless Technologies Radio, infrared, or microwave Suitability Difficult or too expensive to use cable When flexibility to move network hosts and devices is required Guide to Operating System Security

Comparing Cable Types Guide to Operating System Security

Using Structured Design Follow accepted guidelines for cable installation Deploy structured wiring design Implement structured network design Guide to Operating System Security

Guidelines for Cable Installation (Continued) Meet or exceed maximum bandwidth requirements Category 5 or better UTP cable Multimode fiber-optic riser cable between floors IEEE specifications Single-mode fiber-optic cable for long runs Guide to Operating System Security

Guidelines for Cable Installation (Continued) Wireless options where needed Star-based cable plants High-quality cable Building codes (eg, plenum cable) Do not exceed tension limits of twisted-pair cable Guide to Operating System Security

Guidelines for Cable Installation (Continued) Follow rules for cable bend radius Extra cable at endpoints Qualified contractor Label all cable Ground cable plants (EIA/TIA-607 standard) Guide to Operating System Security

Structured Wiring Requirements Flexible cabling Wiring stations into a physical star Adherence to EIA/TIA-568-A/EIA-TIA-568-B standards for horizontal wiring Centralizing cable plant in chassis hubs or switches Guide to Operating System Security continued…

Structured Wiring Requirements Intelligence built into chassis hubs and switches to detect problems at stations Ability to isolate hosts and servers on their own cable segments Ability to provide high-speed links to hosts and servers and other network devices Guide to Operating System Security

Structured Wiring Design Guide to Operating System Security

Structured Network Design Solid horizontal and vertical wiring design enables: Centralizing a network at strategic points Customization for security and efficiency Linking together by a fast backbone Guide to Operating System Security

Structured Network for Centralized Management Figure 7-10 Structured network for centralized management Guide to Operating System Security

Vertical Wiring Principles Extended star topology between devices High-speed cable to reduce congestion not susceptible to EMI and RFI EIA/TIA-568-A/EIA-TIA-568-B standards for vertical or backbone cabling Riser-rated cable for cable runs through cable ports or vertical shafts Fire-stop material to cover cable between floors Guide to Operating System Security

Centralized Management Central points are established for critical network functions Simple Network Management Protocol (SNMP) Community name Network management station (NMS) Network agents Guide to Operating System Security

Using Virtual LANs Can be used as a central management tool Potential problems Improper configuration exposes network to security risks Trunks are vulnerable to attacks Guide to Operating System Security

Using Network Redundancy for Security Vital network areas remain running even if equipment fails or an attack occurs Guide to Operating System Security

Designing for Redundancy Figure 7-11 Designing for redundancy Guide to Operating System Security

Building Multiple Redundant Pathways Figure 7-12 Building multiple redundant pathways Guide to Operating System Security

Summary How to physically secure workstations and servers How network topologies can be used to enhance security Which network media offer the best security How to combine network topology and media in a structured wiring and networking design for efficiency and security Guide to Operating System Security