NETWORKS Lauren Hickman Patrick McCamy Morgan Pace Noah Ryder.

Slides:



Advertisements
Similar presentations
Fundamentals of Information Systems, Second Edition 1 Telecommunications, the Internet, Intranets, and Extranets Chapter 4.
Advertisements

Network Security Topologies Chapter 11. Learning Objectives Explain network perimeter’s importance to an organization’s security policies Identify place.
2 An Overview of Telecommunications and Networks Telecommunications: the _________ transmission of signals for communications (home net) (home net)
Client/Server Computing Model of computing in which very powerful personal computers (clients) are connected in a network with one or more server computers.
IS Network and Telecommunications Risks
Chapter 6 Telecommunications & Networks.
In this section, we'll cover one of the foundations of network security issues, It talks about VPN (Virtual Private Networks). What..,Why..,and How….?
Professor Michael J. Losacco CIS 1150 – Introduction to Computer Information Systems Communications and Networks Chapter 8.
Telecommunications and Networks Business value of networks Network components Chapter 6 McGraw-Hill/Irwin Copyright © 2007 by The McGraw-Hill Companies,
Nasca Internet Ch. 5Internet Ch. 8 Networking and Security Ch. 6 Networking and Security Ch. 8.
Telecommunication and Networks
Hardware & Software Needed For LAN and WAN
Network Infrastructure Security. LAN Security Local area networks facilitate the storage and retrieval of programs and data used by a group of people.
Chapter 1: Overview Lecturer: Alias Mohd Telecommunications Department Faculty of Electrical Engineering UTM SET 4573: Data Communication and Switching.
McGraw-Hill/Irwin Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. Extended Learning Module E Network Basics.
Lecture 5 Title: Networks and Businesses
6-1 Extranet Uses. 6-2 Case 2: Maryland and Colorado Serving their customers without using wires Earth Alert Emergency Management System in Maryland provides.
IT in Business Enterprise and Personal Communications Networks Lecture – 07.
The generation, storage, and movement of information are central to managing an enterprise’s business processes As a result, businesses must ensure.
Telecommunications and Networks
Comparing modem and other technologies
COMP 6005 An Introduction To Computing Session Four: Internetworking and the World Wide Web.
By Julia Nguyen B2. What is it?  Networking is two or more computers linked together  Two common types are Local Area Network (LAN) and Wide Area Network.
Business Data Communications, Stallings 1 Chapter 1: Introduction William Stallings Business Data Communications 6 th Edition.
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
Unit 1—Computer Basics Lesson 7 Networks.
©G. Millbery 2001Communications and Networked SystemsSlide 1 Purpose of Network Components  Switches A device that controls routing and operation of a.
Networks QUME 185 Introduction to Computer Applications.
Chapter 5: Networks, Internet & Ecommerce IT Auditing & Assurance, 2e, Hall & Singleton.
6-1 McGraw-Hill/Irwin Copyright © 2007 by The McGraw-Hill Companies, Inc. All rights reserved.
6-1 McGraw-Hill/Irwin Copyright © 2007 by The McGraw-Hill Companies, Inc. All rights reserved.
Living Online Module Lesson 23 — Networks and Telecommunication
Understanding Network Concepts Living Online Lesson 1 IC 3 Basics Ambrose, Bergerud, Busche, et. Al.
Fundamentals of Information Systems, Second Edition 1 Telecommunications, the Internet, Intranets, and Extranets.
NETWORKS Year 12 Unit 1. Lesson objectives To understand and define What is a network? LANs and WANs The Internet, Intranet and Extranet Network Hardware.
PRESENTED BY P. PRAVEEN Roll No: 1009 – 11 – NETWORK SECURITY M.C.A III Year II Sem.
Networks CS105. What is a computer network? A computer network is a collection of computing devices that are connected in various ways so that they can.
IS Network and Telecommunications Risks Chapter Six.
Introduction to Information Systems Lecture 06 Telecommunications and Networks Business Value of Networks Jaeki Song.
Chapter 9 Networking & Distributed Security. csci5233 computer security & integrity (Chap. 9) 2 Outline Overview of Networking Threats Wiretapping, impersonation,
1 Class 15 System Security. Outline Security Threats (External: malware, spoofing/phishing, sniffing, & data theft: Internal: unauthorized data access,
By Kim Young Jun IGCSE1.  Computer network  Common types of network  Ring, bus, star and tree  Local are networks  Wide are networks  Wireless LANs.
NETWORK INFRASTRUCTURE SECURITY Domain 5. Computer Security “in short, the average computer is about as secure as a wet paper bag, and it is one of the.
Living Online Module Lesson 23 — Networks and Telecommunication Computer Literacy BASICS.
Chap1: Is there a Security Problem in Computing?.
NETWORKING FUNDAMENTALS. Network+ Guide to Networks, 4e2.
Database security Diego Abella. Database security Global connection increase database security problems. Database security is the system, processes, and.
McGraw-Hill/Irwin Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. Chapter 6 Telecommunications and Networks.
Fundamentals of Information Systems, Second Edition 1 Telecommunications, the Internet, Intranets, and Extranets.
TELECOMMUNICATIONS AND NETWORKS
Communications and Networks Chapter 9 9-1Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved.
Chapter 6 Telecommunications and Networking Slide 1 Well, Sort-of.
CHAPTER - 4 COMPUTER NETWORK Dr. BALAMURUGAN MUTHURAMAN
Data Communication and Networks Chapter 5. What’s a Network? a network consists of two or more computers that are connected together to share information.
Networking Components Quick Guide. Hubs Device that splits a network connection into multiple computers Data is transmitted to all devices attached Computers.
Lesson 7 Networks Unit 1—Computer Basics. Computer Concepts BASICS - 2 Objectives Describe the benefits and disadvantages of networks. List and describe.
Distributed Systems Ryan Chris Van Kevin. Kinds of Systems Distributed Operating System –Offers Transparent View of Network –Controls multiprocessors.
(2) Organize information processing centers environment, the various functions and details Information technology audit: An information technology audit,
1 Lesson 24 Network Fundamentals Computer Literacy BASICS: A Comprehensive Guide to IC 3, 3 rd Edition Morrison / Wells.
Communications and Networks Chapter 9 McGraw-HillCopyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved.
 client  client/server network  communication hardware  extranet  firewall  hacker  Internet  intranet  local area network (LAN)  Network 
Chapter5 TELECOMMUNICATIONS AND NETWORKS. Content Networking the Enterprise Trends in Telecommunications The Business Value of Telecommunications Networks.
CHAPTER 6 Telecommunications and Networks. Learning Objectives 1. Understand the concept of a network. 2. Apply Metcalfe’s law in understanding the value.
Chapter 1: Explore the Network
Introduction to Computers
Computer Technology Notes #4
Chapter 6 Telecommunications and Networks.
Intro To Computer Networks
Virtual Private Network
VPN: Virtual Private Network
Presentation transcript:

NETWORKS Lauren Hickman Patrick McCamy Morgan Pace Noah Ryder

Objectives  Types of Networks  Components of Networks  Risks to Networks  Network Security/Controls  Auditing Networks

What is a Network?  Two or more connected computers that allow the process of telecommunications to occur  Telecommunications is the transfer of text, audio, video, or other data formats

Types of Networks  Characterized in 3 categories:  Distance  Ownership  Client/Server Networks

Distance  Local Area Network (LAN)  Connected computers within a short geographical distance of one another  Wide Area Network (WAN)  Connects computer large geographic away from one another

Ownership  Intranet  Internal network within a company  Extranet  Connects internal network to outside business partners  Virtual Private Network (VPN)  Uses public internet connection but achieves privacy through encryption and authentication

Client/Server Networks  Network servers that manage the networks and host applications that are shared with client computers  Two types:  Two-tiered  Three-tiered

Network Security and Controls  Authentication  Process of ensuring users are who they say they are  Encryption  Scrambling or coding data so that anyone who views will not be able to decode it without a decryption key  Firewalls  Hardware and software to control outside access to the network

Components of a Network  Computers and terminals  Telecommunication channels  Telecommunication processors  Routers and Switching devices

Computers and Terminals  Computers process data in a network and send/receive information to and from terminals  Terminals serve as input/output devices

Telecommunications Channels  Transmit data from computer to computer  Physical transmitters  Wireless transmitters

Telecommunications Processors  Most common is a modem  Transforms digital communication signals to analog signals for transfer and then back to digital signals  Digital communication networks

Routers and Switching Devices  Switches: connect network components and ensure messages are delivered to appropriate destinations  Routers: similar to switches but with more complex features based on protocols  Approaches to switching  Message switching  Packet switching  Circuit switching

Risks to Networks  Social Engineering  Physical Infrastructure Threats  Programmed Threats  Denial of Service Threats  Software Vulnerabilities

Social Engineering Diversion

“Soc-ing”  VoIP Vulnerabilities – Can open channel to network that is not fire-walled  Phishing Scams – i.e. – s from unknown persons containing malicious links.  Cross Site Scripting (XSS) – leads to account hijacking, changing of user settings, cookie theft/poisoning, or false advertising

Network Security  Network manager and network security administration  Authentication  Encryption  Firewalls

Auditing Networks  Perform risk assessment procedures to assess vulnerabilities  Evaluate controls and their effectiveness  Auditing Network Security  Network diagrams  Determine what assets, who has access, and understand connections  Penetration testing  Benchmarking

Risk Assessment Procedures  Basic vulnerabilities of a network  Interception- transmitted data is intercepted by a third party  Availability- unavailability of the network could result in losses for the firm  Access/Entry points- a weak point in access can make the information assets vulnerable to intruders

Evaluate Controls  Physical access controls  Transmitted information should be encrypted  Network should have sufficient management  Controls to limit the type of traffic  Passwords for everyone who has access

Auditing Networks  Network diagrams  Determine what assets  Who has access  Understand connections  Penetration testing

Questions?