Controls. Chapter 9: Identifying and Analyzing Risk Mitigation Controls.

Slides:



Advertisements
Similar presentations
CST Computer Networks NAT CST 415 4/10/2017 CST Computer Networks.
Advertisements

1 Ports and IPv6. 2 Ports Transmission Control Protocol (TCP) or the User Datagram Protocol (UDP), used for communication Generally speaking, a computer.
© N. Ganesan, All rights reserved. Chapter IP Addressing Format.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 VLSM and CIDR Routing Protocols and Concepts – Chapter 6.
IP Subnetting.
© 2007 Cisco Systems, Inc. All rights reserved.ICND1 v1.0—1-1 Building a Simple Network Understanding the TCP/IP Internet Layer.
Intermediate TCP/IP TCP Operation.
Information Networking Security and Assurance Lab National Chung Cheng University Private IP(RFC1918) The Internet Assigned Numbers Authority (IANA) has.
Information Networking Security and Assurance Lab National Chung Cheng University Anti-hacker Tool Kit: CH13 Port Redirection Jared 04/03/31.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2001 TCP/IP.
Introduction to Networking (Yarnfield) Classful subnetting.
IP Addressing and Subnetting
McGraw-Hill©The McGraw-Hill Companies, Inc., 2001 Chapter 24 TCP/IP.
Chapter Overview TCP/IP Protocols IP Addressing.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Network Addressing Networking for Home and Small Businesses – Chapter 5.
IP Addresses: Classful Addressing An IP address is a 32-bit address.
By Junaid Shaikh SE Computer
How to ? Subnetting. Scenario How Many Networks? 2 How Many Network addresses are required? 2 Addresses Used: subnet mask
4: Addressing Working At A Small-to-Medium Business or ISP.
Chapter 23 TCP/IP Overview Network Layer Transport Layer Application Layer WCB/McGraw-Hill  The McGraw-Hill Companies, Inc., 1998.
1 Chapter Client-Server Interaction. 2 Functionality  Transport layer and layers below  Basic communication  Reliability  Application layer.
Chabot College ELEC Ports (Layer 4).
1 7-Oct-15 OSI transport layer CCNA Exploration Semester 1 Chapter 4.
Application Layer Last Update Copyright Kenneth M. Chipps Ph.D.
1 Exercise: IPv4 subnetting. 2 Task 1 Given is an IP network with address : Divide this network into 8 subnets.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Addressing the Network – IPv4 Network Fundamentals – Chapter 6.
IP ADDRESSING, SUBNETTING & VLSM 1. Decimal vs. Binary Numbers – Decimal numbers are represented by the numbers 0 through 9. – Binary numbers are represented.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Planning the Addressing Structure Working at a Small-to-Medium Business.
Internet Protocol CLASS E
1 Chapter 8 – TCP/IP Fundamentals TCP/IP Protocols IP Addressing.
Chapter 2 Dissecting the OSI Model
,294,967,296 Q. What are private IP addresses? A. The Internet Assigned Numbers Authority (IANA) has reserved the following three blocks of the.
Lesson 2 – IP Addressing IP Address (IPv4 – Version 4) Private and Public Address Brief Introduction to IPv6 – Version 6.
Telecommunications Essentials John R. Durrett July 5, 2005.
NETWORK LAYER.
Hour 5 Subnetting 1. you will be able to Explain how subnets and supernets are used Explain the benefits of subnetting Develop a subnet mask that meets.
CCNA Discovery Semester 3 Addressing in an Enterprise Network Chapter 4 K. Martin.
1 Pertemuan 23 Overview of Transport Layer Ports.
NETWORKING IP ADDRESSING. TYPES OF IP ADDRESS PRIVATE IP ADDRESS PUBLIC IP ADDRESS STATIC IP ADDRESS DYNAMIC IP ADDRESS.
Objective 1.Understand Network 2.Understand IP Addressing (IPv4 and IPv6) 3.Understand Subnetting 4.Examples 5.IP addressing and Vlan’s in TIFR 6.TIFR.
Ethernet Basics – 7 IP Addressing. Introducing IP Addressing  IP address (TCP/IP address)  Not unique (but should be), user assigned  Layer 3  4 byte.
INTERNET PROTOCOL ADDRESS AND SUBNET MASK KAAN EREN.
IP Addresses & IP Subnetting
Computer Network Architecture Lecture 7: OSI Model Layers Examples II 1 26/12/2012.
Networks Connecting Two Computers With UTP. Every machine on a network has a unique identifier. Just as you would address a letter to send in the mail,
Discovery 2 Internetworking Module 4 JEOPARDY K. Martin.
Planning the Addressing Structure
Understand IPv6 Part 2 LESSON 3.3_B Networking Fundamentals.
Subnetting Divide a network to smaller networks (subnets) Reasons
Internet Architecture
Chapter 5 Exploring IPv4.
LESSON Networking Fundamentals Understand IPv4.
Addressing the Network – IPv4
Networking for Home and Small Businesses – Chapter 5
Network Wiring and Reference
– Chapter 6 – NAT and Security
IPV4.
IP Address.
Introduction to TCP/IP
IPV4 Address & subnet masks
כתובות IP.
CIS 82 Routing Protocols and Concepts Chapter 11 NAT
Creating Subnets – Network Requirements
Planning the Addressing Structure
Planning the Addressing Structure
Planning the Addressing Structure
IP Addressing.
Networking for Home and Small Businesses – Chapter 5
Network Addressing.
Presentation transcript:

Controls

Chapter 9: Identifying and Analyzing Risk Mitigation Controls

Identifying and Analyzing Risk Mitigation Controls

Overview of Control Families Identifying and Analyzing Risk Mitigation Controls Review with Class

Overview of Control Families Identifying and Analyzing Risk Mitigation Controls

Overview of Control Families Identifying and Analyzing Risk Mitigation Controls

Overview of Control Families Identifying and Analyzing Risk Mitigation Controls

Procedural Controls Identifying and Analyzing Risk Mitigation Controls

Policies Identifying and Analyzing Risk Mitigation Controls Procedures

Plans Identifying and Analyzing Risk Mitigation Controls

Technical Controls Identifying and Analyzing Risk Mitigation Controls

12 Port Numbers

13 Port Numbers The port numbers are divided into three ranges: The Well Known Ports are those from 0 through The Registered Ports are those from 1024 through The Dynamic and/or Private Ports are those from through 65535

14 Well-Known Ports The Well Known Ports are those from 0 through 1023 The Well Known Ports are controlled and assigned by the IANA and typically can only be used by system (or root) processes or by programs executed by privileged users. Ports are defined in the TCP [RFC793] to name the ends of logical connections which carry long term conversations. For the purpose of providing services to unknown callers, a service contact port is defined. To the extent possible, these same port assignments are used with the UDP [RFC768].

15 Registered Ports The Registered Ports are those from 1024 through The Registered Ports are not controlled by the IANA and on most systems can be used by ordinary user processes or programs executed by ordinary users.

16 Dynamic/Private Ports The Dynamic and/or Private Ports are those from through 65535

17 Port Number References TCP/UDP Port Numbers Well Known Port Numbers

Private IP Addresses TCP/UDP Port Numbers Well Known Port Numbers RFC1918 name IP address range number of addresses classfulclassful de scription largest CI DR block (subnet mask)CI DR host id size mask bits 24-bit block ,777,21 6 single clas s A networkclas s A network /8 ( ) 24 bits8 bits 20-bit block ,048, contiguou s class B networks /12 ( ) 20 bits12 bits 16-bit block , contiguou s class C networks /16 ( ) 16 bits The Internet Engineering Task Force (IETF) has directed the Internet Assigned Numbers Authority (IANA) to reserve the following IPv4 address ranges for private networks, as published in RFC 1918