Manajemen Jaringan dan Network Security Pertemuan 26 Matakuliah: H0484/Jaringan Komputer Tahun: 2007.

Slides:



Advertisements
Similar presentations
Cryptography and Network Security 2 nd Edition by William Stallings Note: Lecture slides by Lawrie Brown and Henric Johnson, Modified by Andrew Yang.
Advertisements

CIS : Network Management. Introduction Network, associated resources and distributed applications indispensable Complex systems —More things can.
Network Layer Pertemuan 17 Matakuliah: H0484/Jaringan Komputer Tahun: 2007.
Internetworking Pertemuan 07 Matakuliah: H0484/Jaringan Komputer Tahun: 2007.
Arsitektur Jaringan Pertemuan 09 Matakuliah: H0484/Jaringan Komputer Tahun: 2007.
NS-H /11041 Attacks. NS-H /11042 The Definition Security is a state of well-being of information and infrastructures in which the possibility.
1 Pertemuan 05 Model Informasi - SMI Matakuliah: H0372/Manajemen Jaringan Tahun: 2005 Versi: 1/0.
Chapter 1 – Introduction
1 Cryptography and Network Security Third Edition by William Stallings Lecturer: Dr. Saleem Al_Zoubi.
1 Pertemuan 10 Arsitektur Jaringan Model OSI Matakuliah: H0174/Jaringan Komputer Tahun: 2006 Versi: 1/0.
1 Pertemuan 01 Pandangan Umum Jaringan Matakuliah: H0372/Manajemen Jaringan Tahun: 2005 Versi: 1/0.
Application Layer Pertemuan 25 Matakuliah: H0484/Jaringan Komputer Tahun: 2007.
1 Pertemuan 03 Garis besar manajemen jaringan Matakuliah: H0372/Manajemen Jaringan Tahun: 2005 Versi: 1/0.
1 Pertemuan 05 Firewall Matakuliah: H0451/Praktikum Jaringan Komputer Tahun: 2006 Versi: 1/0.
1 ITC242 – Introduction to Data Communications Week 12 Topic 18 Chapter 19 Network Management.
1 Pertemuan 03 Routing Matakuliah: H0451/Praktikum Jaringan Komputer Tahun: 2006 Versi: 1/0.
1 Pertemuan 07 Model Komunikasi Matakuliah: H0372/Manajemen Jaringan Tahun: 2005 Versi: 1/0.
1 Pertemuan 01 Teknologi Jaringan Matakuliah: H0242 / Keamanan Jaringan Tahun: 2006 Versi: 1.
Transport Layer Pertemuan 24 Matakuliah: H0484/Jaringan Komputer Tahun: 2007.
1 Pertemuan 11 IPSec dan SSL Matakuliah: H0242 / Keamanan Jaringan Tahun: 2006 Versi: 1.
NS-H /11041 SNMP. NS-H /11042 Outline Basic Concepts of SNMP SNMPv1 Community Facility SNMPv3 Recommended Reading and WEB Sites.
Applied Cryptography for Network Security
1 Pertemuan 09 Model Fungsional Matakuliah: H0372/Manajemen Jaringan Tahun: 2005 Versi: 1/0.
1 Pertemuan 26 Manajemen Jaringan dan Network Security Matakuliah: H0174/Jaringan Komputer Tahun: 2006 Versi: 1/0.
Cryptography and Network Security Chapter 1. Chapter 1 – Introduction The art of war teaches us to rely not on the likelihood of the enemy's not coming,
Routing Protocol Pertemuan 21 Matakuliah: H0484/Jaringan Komputer Tahun: 2007.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
1 System support & Management Protocols Lesson 13 NETS2150/2850 School of Information Technologies.
Pertemuan 02 Aspek dasar keamanan Jaringan dan ketentuan baku OSI
Cryptography and Network Security Chapter 1 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
1 Network Management and SNMP  What is Network Management?  ISO Network Management Model (FCAPS)  Network Management Architecture  SNMPv1 and SNMPv2.
McGraw-Hill The McGraw-Hill Companies, Inc., 2000 SNMP Simple Network Management Protocol.
1.  TCP/IP network management model: 1. Management station 2. Management agent 3. „Management information base 4. Network management protocol 2.
Review security basic concepts IT 352 : Lecture 2- part1 Najwa AlGhamdi, MSc – 2012 /1433.
Cryptography and Network Security Overview & Chapter 1 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
Dr. Lo’ai Tawalbeh 2007 INCS 741: Cryptography Chapter 1:Introduction Dr. Lo’ai Tawalbeh New York Institute of Technology (NYIT) Jordan’s Campus
Cryptography and Network Security
Eng. Wafaa Kanakri Second Semester 1435 CRYPTOGRAPHY & NETWORK SECURITY Chapter 1:Introduction Eng. Wafaa Kanakri UMM AL-QURA UNIVERSITY
1 Pertemuan 13 IDS dan Firewall Matakuliah: H0242 / Keamanan Jaringan Tahun: 2006 Versi: 1.
Network Security Essentials Chapter 1
Network Security Essentials Chapter 1 Fourth Edition by William Stallings (Based on Lecture slides by Lawrie Brown)
1 Network Management Security Behzad Akbari Fall 2009 In the Name of the Most High.
Lec 3: Infrastructure of Network Management Part2 Organized by: Nada Alhirabi NET 311.
1 Network Management: SNMP The roots of education are bitter, but the fruit is sweet. - Aristotle.
1 Chapter 8 Network Management Security. 2 Outline Basic Concepts of SNMP SNMPv1 Community Facility SNMPv3 Recommended Reading and WEB Sites.
SNMP Simple Network Management Protocol SNMP Simple Network Management Protocol Haris Ribic.
Network Management Security
Cryptography and Network Security (CS435) Part One (Introduction)
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami 2 nd Semester
1 Pertemuan 03 Ancaman dan Serangan Matakuliah: H0242 / Keamanan Jaringan Tahun: 2006 Versi: 1.
1 Chapter 1 – Background Computer Security T/ Tyseer Alsamany - Computer Security.
Topic 1 – Introduction Huiqun Yu Information Security Principles & Applications.
1 Kyung Hee University Prof. Choong Seon HONG SNMP Network Management Concepts.
Network Management  introduction  Internet SNMP: Simple Network Management Protocol  required reading: section 7.3 in text.
Cryptography and Network Security Chapter 1. Background  Information Security requirements have changed in recent times  traditionally provided by physical.
1 Network Security: Introduction Behzad Akbari Fall 2009 In the Name of the Most High.
By Marwan Al-Namari & Hafezah Ben Othman Author: William Stallings College of Computer Science at Al-Qunfudah Umm Al-Qura University, KSA, Makkah 1.
Jaringan LAN Pertemuan 04 Matakuliah: H0524/Jaringan Komputer Tahun: 2009.
1 Network Security Maaz bin ahmad.. 2 Outline Attacks, services and mechanisms Security attacks Security services Security Mechanisms A model for Internetwork.
Lec 3: Infrastructure of Network Management Part2 Organized by: Nada Alhirabi NET 311.
Jaringan Telekomunikasi, Sukiswo ST, MT Sukiswo
Computer and Information Security
Lec 5: SNMP Network Management
Information Security.
Introduction to Internet Network Management
Pertemuan 11 Model TCP/IP
Fundamentals of Network Management
Lec 5: SNMP Network Management
Cryptography and Network Security
Network Management Security
Presentation transcript:

Manajemen Jaringan dan Network Security Pertemuan 26 Matakuliah: H0484/Jaringan Komputer Tahun: 2007

Bina Nusantara Learning Outcomes Pada akhir pertemuan ini, diharapkan mahasiswa akan mampu : Menjelaskan peran Manajemen Jaringan dan Network Security

Bina Nusantara Outline Materi Network Management principles Protocol Security Attacks Methods of Defence

Bina Nusantara Network Management Networks are becoming indispensable – More complexity makes failure more likely Require automatic network management tools Standards required to allow multi-vendor networks covering: – Services – Protocols – Management information TCP/IP Network has SNMP (Simple Network Management Protocol as platform

Bina Nusantara Key Elements Management station or manager Managed Entities or Agent Management information base Network management protocol

Bina Nusantara Management Station - Manager Stand alone system or part of shared system Interface for human network manager Set of management applications – Data analysis – Fault recovery Interface to monitor and control network Translate manager’s requirements into monitoring and control of remote elements Data base of network management information extracted from managed entities

Bina Nusantara Managed Entities - Agent Network Elements such as Hosts, bridges, hubs, routers equipped with agent software Allowed to be managed from management station Respond to requests for information Respond to requests for action Asynchronously supply unsolicited information

Bina Nusantara Management Information Base Representation of network resources as objects Each object represents one aspect of managed object MIB is collection of objects (access points) at agent for management of station Objects standardized across class of system

Bina Nusantara Network Management Protocol OSI uses Common Management Information Protocol (CMIP) TCP/IP uses SNMP – SNMPv2 (enhanced SNMP) for OSI and TCP/IP

Bina Nusantara SNMP Protocol Architecture Application-level protocol Part of TCP/IP protocol suite Runs over UDP Manager supports SNMP messages – GetRequest, GetNextRequest, and SetRequest – Port 161 Agent replies with GetResponse Agent may issue trap message in response to event that affects MIB and underlying managed entities – Port 162

Bina Nusantara SNMPv1 Configuration

Bina Nusantara Role of SNMP v1

Bina Nusantara Security Requirements Confidentiality Integrity – Authentic – Non Repudiable Availability

Bina Nusantara Security Threats and Attacks A threat is a potential violation of security. – Flaws in design, implementation, and operation. An attack is any action that violates security. – Active adversary Common threats: – Snooping/eavesdropping, alteration, spoofing, repudiation of origin, denial of receipt, delay and denial of service

Bina Nusantara Types of Attacks Passive ThreatsActive Threats Release of Message Contents Traffic Analysis MasqueradeReplayModification of Message Contents Denial of Service

Bina Nusantara Network Access Security Using this model requires us to: – select appropriate gatekeeper functions to identify users – implement security controls to ensure only authorised users access designated information or resources Trusted computer systems can be used to implement this model

Bina Nusantara Model for Network Security This model requires us to: – design a suitable algorithm for the security transformation – generate the secret information (keys) used by the algorithm – develop methods to distribute and share the secret information – specify a protocol enabling the principals to use the transformation and secret information for a security service

Bina Nusantara Methods of Defence Encryption Software Controls – Access limitations in a data base – In operating system protect each user from other users Hardware Controls – Smartcard, biometric Policies – Frequent changes of passwords Physical Controls