1 IS 8950 Managing Network Infrastructure and Operations.

Slides:



Advertisements
Similar presentations
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 1: Exploring the Network Network Basics.
Advertisements

Assignment 3 LTEC 4550 Cason Parker. Network Hub A Network Hub is a device that connects other devices together using Ethernet cables. Hubs are unintelligent.
1 MODULE 10 : Assuring Reliable and Secure IT Services Matakuliah: J0422 / Manajemen E-Corporation Tahun: 2005 Versi: 1 / 2.
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
Security Controls – What Works
IS Network and Telecommunications Risks
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Security Awareness: Applying Practical Security in Your World, Second Edition Chapter 5 Network Security.
NETWORKS Lauren Hickman Patrick McCamy Morgan Pace Noah Ryder.
All Organizations Need to Share and Communicate Information...
1 MODULE 8 : Understanding Internetworking Infrastructure Matakuliah: J0422 / Manajemen E-Corporation Tahun: 2005 Versi: 1 / 2.
Understanding Internetworking Infrastructure. 2 Announcements Business Analysis Paper proposal due today Business Plan Project given today.
Understanding Internetworking Infrastructure. 2 Announcements Business Analysis Proposal due Tuesday next week Business Plan explained today.
Lecture 11 Reliability and Security in IT infrastructure.
MIS 5241 Chapter 5 Understanding Internetworking Infrastructure.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 1: Exploring the Network Introduction to Networks.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 1: Exploring the Network Introduction to Networks.
Network Security. Trust Relationships (Trust Zones) High trust (internal) = f c (once you gain access); g p Low trust ( ) = more controls; fewer privileges.
Lecture slides prepared for “Business Data Communications”, 7/e, by William Stallings and Tom Case, Chapter 8 “TCP/IP”.
Lecture 11 Reliability and Security in IT infrastructure.
Computerized Networking of HIV Providers Networking Fundamentals Presented by: Tom Lang – LCG Technologies Corp. May 8, 2003.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.1 ISP Responsibility Working at a Small-to-Medium Business or ISP – Chapter 8.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 1: Exploring the Network Introduction to Networks.
Understanding IT Infrastructure
Managing Diverse IT Infrastructures
Chapter 7: Managing Diverse IT Infrastructures Before 1990s, companies used proprietary technologies to achieve what they have achieved now by using the.
Assuring Reliable and Secure IT Services Chapter 6.
“Assuring Reliable and Secure IT Services”. IT Redundancy: Its Value How much reliability to buy? Customer Service impacted as a result of 15 minutes.
Current Job Components Information Technology Department Network Systems Administration Telecommunications Database Design and Administration.
The Virtualized Enterprise MORE FUNCTIONALITY AND REDUCED IT SPEND Speaker: Frank Grillo EVP of Marketing CYPRESS COMMUNICATIONS.
Networking Basics Lesson 1 Introduction to Networks.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 1: Exploring the Network Introduction to Networks.
IT Infrastructure Chap 1: Definition
Exploring the Network.
JANUARY 16, 2010 LECTURER: HENRY CHRISTIANTO, ST., MTI.
The Beneficent the MERCIFUL In the NAME of. “ASSURING RELIABLE AND SECURE IT SERVICES”
NETWORKING COMPONENTS AN OVERVIEW OF COMMONLY USED HARDWARE Christopher Johnson LTEC 4550.
Networking and Security Issues in Digital Library Dr. R. Radhakrishna Pillai IIM Kozhikode.
Applegate, L.M., Austin, R.D, and Soule, D.L., Corporate Information Strategy and Management, 8 th edition, Burr Ridge, IL: McGraw-Hill/Irwin, 2009 Instructor’s.
Computer Emergency Notification System (CENS)
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
IS Network and Telecommunications Risks Chapter Six.
Introduction to Information Systems Lecture 06 Telecommunications and Networks Business Value of Networks Jaeki Song.
Module 11: Designing Security for Network Perimeters.
MIS 7003 MIS Core Course The MBA Program The University of Tulsa Professor: Akhilesh Bajaj Security: Personal & Business © Akhilesh Bajaj 2004,2005, 2007,
NETWORKING FUNDAMENTALS. Network+ Guide to Networks, 4e2.
Security and Assurance in IT organization Name: Mai Hoang Nguyen Class: INFO 609 Professor: T. Rohm.
Assuring Reliable and Secure IT Services Chapter 6.
Introduction to Networking. What is a Network? Discuss in groups.
Understanding IT Infrastructure Lecture 9. 2 Announcements Business Case due Thursday Business Analysis teams have been formed Business Analysis Proposals.
TIM158 Business Information Strategy Instructor: Safwan Shah Teaching Assistant: TBD To maintain consistency. Lectures throughout TIM158 adapted or borrowed.
INTRODUCTION TO INFORMATION SYSTEMS LECTURE 10: NETWORK, COMMUNICATION AND ITS APPLICATION أ/ غدير عاشور 1.
Securing Interconnect Networks By: Bryan Roberts.
SemiCorp Inc. Presented by Danu Hunskunatai GGU ID #
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 1: Exploring the Network Introduction to Networks.
IT Audit for non-IT auditors Cornell Dover Assistant Auditor General 31 March 2013.
Securing Information Systems
Chapter 1: Explore the Network
Fourth Dimension Technologies
Instructor Materials Chapter 1: Explore the Network
Chapter 1: Exploring the Network
Working at a Small-to-Medium Business or ISP – Chapter 8
CONNECTING TO THE INTERNET
Chapter 1: Explore the Network
Securing Information Systems
Networking and Security Issues in Digital Library
IS4680 Security Auditing for Compliance
Presentation transcript:

1 IS 8950 Managing Network Infrastructure and Operations

2 Understanding Internetworking Infrastructure

3 Background 75% of all IT dollars go to infrastructure IT infrastructure lies at the heart of most companies’ operating capabilities IT infrastructure is vital; no longer is it nice to have or just value-adding. Internetworking technologies provide a low-cost way to connect virtually everyone on the same network The rise of internetworking technologies offers new possibilities for addressing business computing needs

4

5

6 The Drivers of Change: Better Chips, Bigger Pipes PCs made computing available to a wide variety of non-technical users Web made network resources (such as distant databases) and capabilities (such as over-the-Net collaboration) accessible Metcalfe’s law: “The usefulness of a network increases with the square of the number of users connected to the network” Powerful chips and large communication “pipes”, both at low cost, fueled a process that would lead to qualitatively different computing infrastructure

7

8

9 Basic components of internetworking infrastructure Network –The medium and supporting technologies (hardware and software) Processing systems –HW and SW that provides an organization’s ability to handle business transactions Facilities –The physical systems that house and protect computing and network devices

10

11

12 Technological elements of networks Local Area Networks (LANs) Hubs, Switches, and Network Adapters Wide Area Networks (WANs) Routers, the means by which messages are relayed across large distances Firewalls and other security systems and devices Caching, content acceleration, and other specialized network devices

13

14 Technological elements of processing systems Client devices and systems: PCs, handheld devices, cell phones, and even automotive components Server devices and systems Mainframe devices and systems Middleware: enabling utilities, message handling and queuing systems, protocols, standards, software tool kits, etc. Infrastructure management system Business applications

15

16 Technological elements of facilities Buildings and physical spaces Network conduits and connections Power: UPSs, backup generators, etc. Environmental controls Security

17

18 Operational characteristics of internetworks Internetworking technologies are based on open standards Internetworking technologies operate asynchronously Internetwork communications have inherent latency Internetworking technologies are naturally decentralized Internetworking technologies are scalable

19 Emergence of real-time infrastructure Better data, better decision Improved process visibility Improved process efficiency From make-and-sell to sense-and-respond

20

21 Assuring reliable and secure IT services

22

23

24 High-available facilities Uninterruptible electric power delivery Physical security Climate control and fire suppression Network connectivity Help desk and incident response procedures N+1 and N+N redundancy

25

26

27 Securing infrastructure against malicious threats Classification of threats –External attacks (Denial of service—DoS) –Intrusion: obtaining user names and password –Viruses and worms Defensive measures –Security policies –Firewalls –Authentication –Encryption –Patching and change management –Intrusion detection and network monitoring Security management framework –Make deliberate security decisions –Consider security a moving target –Practice disciplined change management –Educate users –Deploy multilevel technical measures, as many as you can afford

28

29 Managing diverse IT infrastructures

30 New service models Managing the shortage of skilled IT workers Reduced time to market The shift to 24 x 7 operations Favorable cash flow profiles Cost reduction in IT service chains Making applications globally accessible

31

32 Risk through incremental outsourcing Incremental outsourcing example: hosting –Categories of hosting models Colocation hosting Shared hosting Dedicated hosting –Dedicated hosting subcategories Simple dedicated hosting Complex dedicated hosting Custom dedicated hosting

33

34