Network Problems and Solutions M. Sc. Juan Carlos Olivares Rojas

Slides:



Advertisements
Similar presentations
Presented by Nikita Shah 5th IT ( )
Advertisements

SECAM Systems Product Presentation SECAM Systems © 2010.
Discovering Computers Fundamentals, Third Edition CGS 1000 Introduction to Computers and Technology Fall 2006.
1 Defining System Security Policies. 2 Module - Defining System Security Policies ♦ Overview An important aspect of Network management is to protect your.
FIREWALLS. What is a Firewall? A firewall is hardware or software (or a combination of hardware and software) that monitors the transmission of packets.
© Cisco Systems, Inc. All rights reserved. Cisco Public ITE PC v4.1 Chapter 4 1 Chapter 12: Advanced Troubleshooting IT Essentials v5.0.
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
1.  To analyze and explain the IDS placement in network topology  To explain the relationship between honey pots and IDS  To explain, analyze and evaluate.
IS Network and Telecommunications Risks
Information Security 1 Information Security: Demo of Some Security Tools Jeffy Mwakalinga.
Web Server Administration
Security Management IACT 918 July 2004 Gene Awyzio SITACS University of Wollongong.
7.1 © 2007 by Prentice Hall 7 Chapter Telecommunications, the Internet, and Wireless Technology.
Beth Johnson April 27, What is a Firewall Firewall mechanisms are used to control internet access An organization places a firewall at each external.
Security Management IACT 418/918 Autumn 2005 Gene Awyzio SITACS University of Wollongong.
How Clients and Servers Work Together. Objectives Learn about the interaction of clients and servers Explore the features and functions of Web servers.
Polaris Financial Technologies Welcomes the members of Hyderabad chapter for the 2nd event on 4 th July 14 held by PACE (The Testing Practice)
Small Business Security By Donatas Sumyla. Content Introduction Tools Symantec Corp. Company Overview Symantec.com Microsoft Company Overview Small Business.
Host Intrusion Prevention Systems & Beyond
A Survey on Interfaces to Network Security
Network security policy: best practices
Hands-On Microsoft Windows Server 2008 Chapter 8 Managing Windows Server 2008 Network Services.
Presented by INTRUSION DETECTION SYSYTEM. CONTENT Basically this presentation contains, What is TripWire? How does TripWire work? Where is TripWire used?
Chapter 14 Network Management Business Aspects Architectures Technology.
Network Management M. Sc. Juan Carlos Olivares Rojas
Hafez Barghouthi. Model for Network Access Security (our concern) Patrick BoursAuthentication Course 2007/20082.
Computer Crime and Information Technology Security
Chapter 7: Using Windows Servers to Share Information.
1 Autonomic Computing An Introduction Guenter Kickinger.
Term 2, 2011 Week 3. CONTENTS The physical design of a network Network diagrams People who develop and support networks Developing a network Supporting.
Hands-On Microsoft Windows Server 2008 Chapter 1 Introduction to Windows Server 2008.
Lecture 10 Intrusion Detection modified from slides of Lawrie Brown.
A+ Guide to Managing and Maintaining Your PC Fifth Edition Chapter 19 PCs on the Internet.
HoneyD (Part 2) Small Business NIDS This presentation demonstrates the ability for Small Businesses to emulate virtual operating systems and conduct.
Honeypot and Intrusion Detection System
© Cisco Systems, Inc. All rights reserved. Cisco Public ITE PC v4.1 Chapter 4 1 Chapter 12: Advanced Troubleshooting IT Essentials v5.0.
Network Security. 2 SECURITY REQUIREMENTS Privacy (Confidentiality) Data only be accessible by authorized parties Authenticity A host or service be able.
2  Supervisor : MENG Sreymom  SNA 2012_Group4  Group Member  CHAN SaratYUN Sinot  PRING SithaPOV Sopheap  CHUT MattaTHAN Vibol  LON SichoeumBEN.
Hands-On Microsoft Windows Server Implementing Microsoft Internet Information Services Microsoft Internet Information Services (IIS) –Software included.
Wireless Intrusion Prevention System
Module 11: Designing Security for Network Perimeters.
INTRUSION DETECTION SYSYTEM. CONTENT Basically this presentation contains, What is TripWire? How does TripWire work? Where is TripWire used? Tripwire.
BASIC NETWORK PROTOCOLS AND THEIR FUNCTIONS Created by: Ghadeer H. Abosaeed June 23,2012.
1 Microsoft Windows 2000 Network Infrastructure Administration Chapter 4 Monitoring Network Activity.
Overview of Firewalls. Outline Objective Background Firewalls Software Firewall Hardware Firewall Demilitarized Zone (DMZ) Firewall Types Firewall Configuration.
Understand Network Isolation Part 2 LESSON 3.3_B Security Fundamentals.
Computer Security By Duncan Hall.
I NTRUSION P REVENTION S YSTEM (IPS). O UTLINE Introduction Objectives IPS’s Detection methods Classifications IPS vs. IDS IPS vs. Firewall.
Principles of Information Systems, Sixth Edition Security, Privacy, and Ethical Issues in Information Systems and the Internet Chapter 14.
Network Management M. Sc. Juan Carlos Olivares Rojas
Securing a Host Computer BY STEPHEN GOSNER. Definition of a Host  Host  In networking, a host is any device that has an IP address.  Hosts include.
ASHRAY PATEL Securing Public Web Servers. Roadmap Web server security problems Steps to secure public web servers Securing web servers and contents Implementing.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
Topic 11 Network Management. SNMPv1 This information is specific to SNMPv1. When using SNMPv1, the snmpd agent uses a simple authentication scheme to.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
Information Technology Network and Security. Networking In the world of computers, networking is the practice of linking two or more computing devices.
Network Monitoring Sebastian Büttrich, NSRC / IT University of Copenhagen Last edit: February 2012, ICTP Trieste
Successfully Implementing The Information System Systems Analysis and Design Kendall and Kendall Fifth Edition.
OPEN SOURCE NETWORK MANAGEMENT TOOLS
Chapter 14 Network Management
Top 5 Open Source Firewall Software for Linux User
Protecting Your Maps and Data when using ArcGIS Server
System And Application Software
Firewalls Routers, Switches, Hubs VPNs
Internet Protocols IP: Internet Protocol
Network Monitoring Charles Warren.
PLANNING A SECURE BASELINE INSTALLATION
6. Application Software Security
Chapter 21 Successfully Implementing The Information System
Presentation transcript:

Network Problems and Solutions M. Sc. Juan Carlos Olivares Rojas

Outline Preventive Measures Diagnostic Monitoring Main Problems Error Solutions Computer Network Performance Computer Network Accountants Maintenace Recovering Security

Objectives To know the principal Network Problems and To Solution these problems. Competences: Diagnostic and Monitoring Services in a Network. Maintaining and Performing Services and Resources over a Network Securizing and Virtualizing Services

Preventive Measures The most important thing in an Network is the Network Management. Network Management include the definition of measures to aim to improve the correct function of the Network. One of the most important Network Measure is the Network “speed” (Bandwith utilization), other is related with Security, etc.

Diagnostic Diagnostic is the First Process to detect and solve Network Problems. Exits some Network Diagnostic Tools for automatizing the detection of Network Problems. Actually, most of the recently OS have Network Diagnostic Tools to improve and solve problems with the Network.

Monitoring The term network monitoring describes the use of a system that constantly monitors a computer network for slow or failing components and that notifies the network administrator in case of outages via , pager or other alarms. It is a subset of the functions involved in network management.

Monitoring Network Monitor Tools make a serie of services such as: Analyze protocols such as HTTP, FTP, DNS, among other detecting problems and cheking their performance. They realize a network tomography and notify all events defined in the configuration process

Monitoring Most of the implementation of Network Monitors used the Simple Network Management Protocol (SNMP) for Obtaining the features of a Node in a Network. Simple Network Management Protocol (SNMP) is used in network management systems to monitor network-attached devices for conditions that warrant administrative attention. SNMP is a component of the Internet Protocol Suite as defined by the Internet Engineering Task Force (IETF).

Monitoring It consists of a set of standards for network management, including an application layer protocol, a database schema, and a set of data objects. SNMP exposes management data in the form of variables on the managed systems, which describe the system configuration. These variables can then be queried (and sometimes set) by managing applications.

Monitoring The isn’t a unique tool who monitor all services in a Network, this depend of the service such as: WebSense/Squid for Web IDS (Intrusion Detection Systems) such Snort Firewall (IPS –Intrusion Preventing Systems) Bandwith utilization such as MRTG, Nagios Sniffers: WireShark, Nmap, Ntop

Main Problems There isn’t a Network Connection There isn’t an Internet Connection The Wireless Network disconnect frecuently How can we shared an Internet Connection? The computer is connected but it can’t see the other or the other computers can’t see that computer Some Network Applications don’t run and others runs correctly

Error Solutions Explain how can you to solve the problems listed in the past slide?

Computer Network Performance Computer Network Performance is the result to monitoring and solving all the events ocurred in a Network. It’s an optimization process to guaranted Quality of All Network Services provide in the Network. The Network Performance also include the correct admnistration of users.

Computer Network Accountants It’s a very important process which consists in registred all the users’ activities in a Network. It’s crucial to know what users are doing.

Maintenace Network Maintenace is the process to improve the network services for controlling the Network performance. Exist three types of maintenace preventive, corrective and performance.

Recovering Recovering is a process to return the configuration, information and executing services when a server was failed for diverse reason such as: virus, attacks an other security incidentes.

Security Network security consists of the provisions made in an underlying computer network infrastructure, policies adopted by the network administrator to protect the network and the network-accessible resources from unauthorized access, and consistent and continuous monitoring and measurement of its effectiveness (or lack) combined together.

Security The terms network security and information security are often used interchangeably, however network security is generally taken as providing protection at the boundaries of an organization, keeping the intruders (e.g. black hat hackers, script kiddies, Trudy, etc.) out. Network security systems today are mostly effective, so the focus has shifted to protecting resources from attack or simple mistakes by people inside the organization, e.g. with Digital Leak Protection (DLP).

Exam 3 Installation, administration and presentation of one Network Service, for example: Snort MRTG Nagios GZIP HTTP Compression Squid Instant Messenger Service (Jabber) Groupware

Exam 3 Exam Guidelines: 10 slides maximus Software Demonstration (video presentation is suggested) Questions of classmates and professor Extrapoint for new services (not widely used)

References Forouzan, B. (2008), Data Comunications and Networking, 4th. Edition, McGraw-Hill. Tanenbaum, A (2004). Computer Networks. 4th Edition. Prentice Hall. Kurose, J. and Ross, K. (2007) Computer Networking: A Top Down Approach 4th edition. Addison-Wesley, July 2007.

¿Preguntas?