1 Kyung Hee University Prof. Choong Seon HONG Network Control.

Slides:



Advertisements
Similar presentations
Chapter ADCS CS262/0898/V1 Chapter 1 An Introduction To Computer Security TOPICS Introduction Threats to Computer Systems –Threats, Vulnerabilities.
Advertisements

Top-Down Network Design Chapter Nine Developing Network Management Strategies Copyright 2010 Cisco Press & Priscilla Oppenheimer.
Chapter 19: Network Management Business Data Communications, 5e.
CIS : Network Management. Introduction Network, associated resources and distributed applications indispensable Complex systems —More things can.
30/04/2015Tim S Roberts COIT13152 Operating Systems T1, 2008 Tim S Roberts.
Network+ Guide to Networks, Fourth Edition
11 TROUBLESHOOTING Chapter 12. Chapter 12: TROUBLESHOOTING2 OVERVIEW  Determine whether a network communications problem is related to TCP/IP.  Understand.
Lecture 1: Overview modified from slides of Lawrie Brown.
Fundamentals of Computer Security Geetika Sharma Fall 2008.
Informationsteknologi Thursday, October 11, 2007Computer Systems/Operating Systems - Class 161 Today’s class Security.
6/2/2015B.Ramamurthy1 Security B.Ramamurthy. 6/2/2015B.Ramamurthy2 Computer Security Collection of tools designed to thwart hackers Became necessary with.
Chapter 19: Network Management Business Data Communications, 4e.
1 Cryptography and Network Security Third Edition by William Stallings Lecturer: Dr. Saleem Al_Zoubi.
Evidor: The Evidence Collector Software using for: Software for lawyers, law firms, corporate law and IT security departments, licensed investigators,
1 ITC242 – Introduction to Data Communications Week 12 Topic 18 Chapter 19 Network Management.
Security Awareness: Applying Practical Security in Your World
Security Management IACT 918 July 2004 Gene Awyzio SITACS University of Wollongong.
Security Management IACT 418/918 Autumn 2005 Gene Awyzio SITACS University of Wollongong.
SNMP Simple Network Management Protocol
Check Disk. Disk Defragmenter Using Disk Defragmenter Effectively Run Disk Defragmenter when the computer will receive the least usage. Educate users.
The OSI Model A layered framework for the design of network systems that allows communication across all types of computer systems regardless of their.
McGraw-Hill The McGraw-Hill Companies, Inc., 2000 SNMP Simple Network Management Protocol.
Lecture slides prepared for “Business Data Communications”, 7/e, by William Stallings and Tom Case, Chapter 8 “TCP/IP”.
Virtual LANs. VLAN introduction VLANs logically segment switched networks based on the functions, project teams, or applications of the organization regardless.
Computer Security Tran, Van Hoai Department of Systems & Networking Faculty of Computer Science & Engineering HCMC University of Technology.
Network+ Guide to Networks, Fourth Edition Chapter 1 An Introduction to Networking.
9/15/2015© 2008 Raymond P. Jefferis IIILect Application Layer.
Top-Down Network Design Chapter Nine Developing Network Management Strategies Oppenheimer.
Protection & Security Introduction to Operating Systems: Module 16.
Objectives Configure routing in Windows Server 2008 Configure Routing and Remote Access Services in Windows Server 2008 Network Address Translation 1.
Cisco S2 C4 Router Components. Configure a Router You can configure a router from –from the console terminal (a computer connected to the router –through.
11 SECURING YOUR NETWORK PERIMETER Chapter 10. Chapter 10: SECURING YOUR NETWORK PERIMETER2 CHAPTER OBJECTIVES  Establish secure topologies.  Secure.
1 Network Monitoring Mi-Jung Choi Dept. of Computer Science KNU
PRESENTED BY P. PRAVEEN Roll No: 1009 – 11 – NETWORK SECURITY M.C.A III Year II Sem.
1 Introduction to Microsoft Windows 2000 Windows 2000 Overview Windows 2000 Architecture Overview Windows 2000 Directory Services Overview Logging On to.
 Chapter 14 – Security Engineering 1 Chapter 12 Dependability and Security Specification 1.
Network Security. 2 SECURITY REQUIREMENTS Privacy (Confidentiality) Data only be accessible by authorized parties Authenticity A host or service be able.
PRESENTATION ON:- INTER NETWORK Guided by: Presented by:- Prof. Ekta Agrwal Dhananjay Mishra Prafull Jain Vinod Kumawat.
Computer Networking From LANs to WANs: Hardware, Software, and Security Chapter 13 FTP and Telnet.
11 SECURING NETWORK COMMUNICATION Chapter 9. Chapter 9: SECURING NETWORK COMMUNICATION2 OVERVIEW  List the major threats to network communications. 
1 Chapter 1 – Background Computer Security T/ Tyseer Alsamany - Computer Security.
NETWORK CONTROL The Fourth Meeting. 2 Table of Contents  Introduction  Configuration Control  Security Control.
Network Security & Accounting
IT Security. What is Information Security? Information security describes efforts to protect computer and non computer equipment, facilities, data, and.
STORE AND FORWARD & CUT THROUGH FORWARD Switches can use different forwarding techniques— two of these are store-and-forward switching and cut-through.
1 by Behzad Akbari Fall 2008 In the Name of the Most High Network Management Applications.
Chap1: Is there a Security Problem in Computing?.
NETWORKING FUNDAMENTALS. Network+ Guide to Networks, 4e2.
Using Routing and Remote Access Chapter Five. Exam Objectives in this Chapter:  Plan a routing strategy Identify routing protocols to use in a specified.
INTRODUCTION TO COMPUTER & NETWORK SECURITY INSTRUCTOR: DANIA ALOMAR.
Computer threats, Attacks and Assets upasana pandit T.E comp.
C OMPUTER THREATS, ATTACKS AND ASSETS DONE BY NISHANT NARVEKAR TE COMP
 Introduction  Tripwire For Servers  Tripwire Manager  Tripwire For Network Devices  Working Of Tripwire  Advantages  Conclusion.
Distributed Systems Ryan Chris Van Kevin. Kinds of Systems Distributed Operating System –Offers Transparent View of Network –Controls multiprocessors.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
Cisco Exam Questions IMPLEMENTING CISCO IOS NETWORK SECURITY (IINS V2.0) VERSION: Presents: 1.
Keimyung University 1 Network Control Hong Taek Ju College of Information and Communication Keimyung University Tel:
Basic Edge Core switch Training for Summit Communication.
Manajemen Jaringan, Sukiswo ST, MT 1 Network Control Sukiswo
SQL Database Management
Securing Network Servers
Chapter 2: System Structures
Top-Down Network Design Chapter Nine Developing Network Management Strategies Copyright 2010 Cisco Press & Priscilla Oppenheimer.
Virtual LANs.
Chapter 3: Open Systems Interconnection (OSI) Model
An Introduction to Computer Networking
Security network management
Designing IIS Security (IIS – Internet Information Service)
Protection Mechanisms in Security Management
Top-Down Network Design Chapter Nine Developing Network Management Strategies Copyright 2010 Cisco Press & Priscilla Oppenheimer.
Presentation transcript:

1 Kyung Hee University Prof. Choong Seon HONG Network Control

2 Kyung Hee University Introduction  Network control : modifying parameters in and causing actions to be taken by the end systems, intermediate systems and subsystems  Performance, fault and accounting : related to monitoring  Configurations and Security : related to control

3 Kyung Hee University Configuration Management  Concerned with the initialization and maintenance, and shutdown of individual components and logical subsystems Managed resources : including as follows. l Identifiable physical resources (for example, a server or router) l Lower-level logical objects (for example, a transport-layer retransmission timer) Configuration values l Specifying default values for attributes l Possessing proper parameter values  Performance management and configuration management functions If performance management monitoring function detects that response time is degrading due to an imbalance in load, Configuration management may adjust the configuration to achieve load level.

4 Kyung Hee University Configuration Management (cont’d)  Fault management and configuration management If fault management detects and isolates a fault, Configuration management may alter the configuration to by bypass the fault  Functions of configuration management Define configuration information Set and modify attribute values Define and modify relationships Initialize and terminate network operations Distribute software Examine values and relationships (through query-response interaction) Report on configuration status (via an event report)

5 Kyung Hee University Configuration Management (cont’d)  Define Configuration Information Configuration information l including a specification of the resources under management and the attributes of those resources l A simple structured list of data fields l An object-oriented database l A relational database : the structure of the database reflects the relationships among network elements network resources l Physical resources : end systems, routers, bridges, communication facilities, services, communication media, and modems l Logical resources : timers, counters, states, operational characters, software version number, and release level Network control function l Should enable the user to specify the range and type of values l Should be able to define new object type, or data type element types (on- line or off-line)

6 Kyung Hee University Configuration Management (cont’d)  Set and Modify Attribute Values Configuration management function should enable a manager station to remotely set and modify attribute values in agents and proxies l A manger must be authorized l Some attributes reflect the “reality” at a resource and cannot be modified remotely. ( just by a physical action at the router) Three categories of configurable attributes for modification l Database update only – changing contact information l Database update plus resource modification – for example, physical port id set to “disabled” and agent not only updates the state attribute but also disables the port l Database update plus action – if an authorized manger sets a reinitialize parameter to TRUE, the router would go through a reinitialization procedure

7 Kyung Hee University Configuration Management (cont’d)  Define and Modify Relationships Relationship describes an association, connection, or condition that exists between network resources or network components l topology, hierarchy, physical and logical connection, or a management domain l One example of the use of relationship – managing link layer connection between LAN nodes LLC protocol in one node can issue a connection request to another node A network manger station could set up a fixed LLC connection between two nodes; This connection set up would designate the SAP (service access point) in each node

8 Kyung Hee University Configuration Management (cont’d)  Data relationships foo blee bar Devices Vendors Contacts Allan Karen Banzai Hack

9 Kyung Hee University Configuration Management (cont’d)  Initialize and Terminate Network Operations Initialization : including verification that all settable resource attributes and relationships have been properly set, notifying users of any resource, attribute, or relationship still needing to be set, and validating users’ initialization commands. Termination : allowing users to request retrieval of specified statistics, blocks, or status information before the terminal procedures have completed  Distribute Software software loading requests transmitting the specified versions of software updating the configuration tracking systems updating routing tables

10 Kyung Hee University Security control  Security Threats a definition of security requirement l Secrecy : reading by authorized parties l Integrity : can modified only by authorized parties l Availability : available to authorized parties

11 Kyung Hee University Security control (cont’d)  Types of Threats Interruption l destroyed or become unavailable or unusable l a threat to availability Interception l an unauthorized party gains access to an asset l a threat to secrecy Modification l an unauthorized party not only gains access but tampers with an asset l a threat to integrity Fabrication l an unauthorized party inserts counterfeit objects into the system l a threat to integrity

12 Kyung Hee University Security control (cont’d) Information source Information destination Normal Flow Interruption Modification Interception Fabrication

13 Kyung Hee University Security control (cont’d)  Security threats to Network DATA Hardware device Software Communication Lines Modification Interception (capture, analysis) Masquerade Interruption (loss) Interruption (Theft, denial of service) Interception Modification Interruption (deletion) Masquerade Modification Interruption (loss) Interception (capture, analysis)

14 Kyung Hee University Security control (cont’d)  Steps in an example of Security Management (step 1) identifying the sensitive information to be protected (step 2) finding the access points (step 3) securing the access points (step 4) maintaining the secure access points l Note: access points: software services, hardware components, and network media Disk with sensitive information Router Data Network Services: remote login file transfer Monitoring system Console Query (step 4) (step 1) (step3) (step 2)

15 Kyung Hee University Security control (cont’d)  Identifying sensitive information accounting, financial, customer, market, engineering and employment  Finding the access points remote login, file transfer, electronic mail, remote process execution, file and directory servers, name servers  Securing the access points on the data link level: use encryption on the network level: use packet filters on every host level: use host authentication, user authentication and key authentication  Maintaining the secure access points basis for auditing network security: potential network access points and their required security deploy programs to check for commonly known security problems: trying passwords and encryption key offering on the public network cash prizes