Networking and Security Issues in Digital Library Dr. R. Radhakrishna Pillai IIM Kozhikode.

Slides:



Advertisements
Similar presentations
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 1: Exploring the Network Network Basics.
Advertisements

Principles of Information Systems, Sixth Edition The Internet, Intranets, and Extranets Chapter 7.
Fundamentals of Information Systems, Second Edition 1 Telecommunications, the Internet, Intranets, and Extranets Chapter 4.
Internet, Intranet and Extranets
2 An Overview of Telecommunications and Networks Telecommunications: the _________ transmission of signals for communications (home net) (home net)
Client/Server Computing Model of computing in which very powerful personal computers (clients) are connected in a network with one or more server computers.
IS Network and Telecommunications Risks
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Mgt 20600: IT Management & Applications Telecommuncations and Networks Tuesday March 28, 2006.
Communications and Networks
1 Pertemuan 11 & 12 The Internet and the New Information Technology Infrastructure Matakuliah: J0454 / Sistem Informasi Manajemen Tahun: 2006 Versi: 1.
Security Awareness: Applying Practical Security in Your World
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
Chapter 9 The Internet: Information Technology Infrastructure for the Digital Firm.
NETWORKS Lauren Hickman Patrick McCamy Morgan Pace Noah Ryder.
All Organizations Need to Share and Communicate Information...
1 MODULE 8 : Understanding Internetworking Infrastructure Matakuliah: J0422 / Manajemen E-Corporation Tahun: 2005 Versi: 1 / 2.
Lecture 11 Reliability and Security in IT infrastructure.
SESSION 9 THE INTERNET AND THE NEW INFORMATION NEW INFORMATIONTECHNOLOGYINFRASTRUCTURE.
1© Copyright 2015 EMC Corporation. All rights reserved. SDN INTELLIGENT NETWORKING IMPLICATIONS FOR END-TO-END INTERNETWORKING Simone Mangiante Senior.
MSIS 110: Introduction to Computers; Instructor: S. Mathiyalakan1 The Internet, Intranets, and Extranets Chapter 7.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 1: Exploring the Network Introduction to Networks.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 1: Exploring the Network Introduction to Networks.
Faten Yahya Ismael.  It is technology creates a network that is physically public, but virtually it’s private.  A virtual private network (VPN) is a.
Lecture slides prepared for “Business Data Communications”, 7/e, by William Stallings and Tom Case, Chapter 8 “TCP/IP”.
A global, public network of computer networks. The largest computer network in the world. Computer Network A collection of computing devices connected.
11 SECURING INTERNET MESSAGING Chapter 9. Chapter 9: SECURING INTERNET MESSAGING2 CHAPTER OBJECTIVES  Explain basic concepts of Internet messaging. 
1 Telecommunications, the Internet, Intranets, and Extranets CSC101 SECTIONS 01 & 02.
Business Computing 550 Lesson 4. Fundamentals of Information Systems, Fifth Edition Chapter 4 Telecommunications, the Internet, Intranets, and Extranets.
Basic Data Communication
Basic Technology for Electronic Commerce Fan Fan address: GUANGXI UNIVERSITY BUSINESS SCHOOL 2005.
Principles of Information Systems, Sixth Edition The Internet, Intranets, and Extranets Chapter 7.
1 Deployment of Computer Security in an Organization CE-408 Sir Syed University of Engineering & Technology 99-CE-282, 257 & 260.
1 IS 8950 Managing Network Infrastructure and Operations.
The Internet, Intranets, & Extranets Chapter 7. IS for Management2 The Internet (1) A collection of networks that pass data around in packets, each of.
COMP 6005 An Introduction To Computing Session Four: Internetworking and the World Wide Web.
1 10 THE INTERNET AND THE NEW INFORMATION TECHNOLOGY INFRASTRUCTURE.
“Assuring Reliable and Secure IT Services”. IT Redundancy: Its Value How much reliability to buy? Customer Service impacted as a result of 15 minutes.
Introduction to Information Technology, 2 nd Edition Turban, Rainer & Potter © 2003 John Wiley & Sons, Inc. 7-1 Introduction to Information Technology.
Exploring Business 2.0 © 2012 Flat World Knowledge Chapter 15: Managing Information And Technology.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 1: Exploring the Network Introduction to Networks.
1.Too many users 2.Technical factors 3.Organizational factors 4.Environmental factors 5.Poor management decisions Which of the following is not a source.
Exploring the Network.
JANUARY 16, 2010 LECTURER: HENRY CHRISTIANTO, ST., MTI.
ITEC 1010 Introduction to Information Technologies Introduction to Information Technology The Internet, Intranets, and Extranets.
1 An Overview of Telecommunications Telecommunications: the electronic transmission of signals for communications Telecommunications medium: anything that.
Fundamentals of Information Systems, Second Edition 1 Telecommunications, the Internet, Intranets, and Extranets.
Introduction to Information Technology, 2 nd Edition Turban, Rainer & Potter © 2003 John Wiley & Sons, Inc. 7-1 Introduction to Information Technology.
IS Network and Telecommunications Risks Chapter Six.
Introduction to Information Systems Lecture 06 Telecommunications and Networks Business Value of Networks Jaeki Song.
ACM 511 Introduction to Computer Networks. Computer Networks.
Principles of Information Systems, Sixth Edition 1 The Internet, Intranets, and Extranets Chapter 7.
CHAPTER 7 THE INTERNET AND INTRANETS 1/11. What is the Internet? 2/11 Large computer network ARPANET (Dept of Defense) It is international and growing.
Security and Assurance in IT organization Name: Mai Hoang Nguyen Class: INFO 609 Professor: T. Rohm.
Fundamentals of Information Systems, Second Edition 1 Telecommunications, the Internet, Intranets, and Extranets.
TELECOMMUNICATIONS AND NETWORKS
Communications and Networks Chapter 9 9-1Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved.
GRID ANATOMY Advanced Computing Concepts – Dr. Emmanuel Pilli.
Information systems and management in business Chapter 2 Electronic Business and Business Mobility.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Understanding IT Infrastructure Lecture 9. 2 Announcements Business Case due Thursday Business Analysis teams have been formed Business Analysis Proposals.
Communications and Networks Chapter 9 McGraw-HillCopyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved.
Introduction to Information Technology, 2 nd Edition Turban, Rainer & Potter © 2003 John Wiley & Sons, Inc. 7-1 Introduction to Information Technology.
Network Processing Systems Design
E-Business Infrastructure PRESENTED BY IKA NOVITA DEWI, MCS.
Chapter 1: Explore the Network
Securing Information Systems
Networking and Security Issues in Digital Library
Introduction to Information Technology
Presentation transcript:

Networking and Security Issues in Digital Library Dr. R. Radhakrishna Pillai IIM Kozhikode

What is the Internet? The largest computer network in the world (a network of networks) Information exchange is seamless using open, non- proprietary standards and protocols, within interconnected networks Spirit of information sharing and open access underlies the Internet.

Hosts (end Systems) Server Packet Switch/Router Modem Mobile Base Station Satellite link Networking Components

The rule for exchanging information between two computers Networking Protocol

The communication always takes place between two end systems (hosts) End-to-end Communication

The network core comprises of switches or routers Network Core

In Circuit Switching the network resources (e.g., capacity/bandwidth) are reserved for communication Circuit Switching

In Circuit Switching the network resources (e.g., capacity/bandwidth) are reserved for communication Circuit Switching

In Packet Switching the network resources (e.g., capacity/bandwidth) are NOT reserved for communication. Packets between various hosts share common resources Packet Switching

Packet switched networks have “Efficient” utilization of resources (e.g. The Internet) compared to circuit switched networks (e.g., The Telephone Network) Classification of Networks

Access networks connect the end-systems to the core network. Different technologies are used for access Access Networks

Access networks connect the end-systems to the core network. Different technologies are used for access (e.g. Hybrid fiber- coaxial access) Access Networks

Access networks connect the end-systems to the core network. Different technologies are used for access (e.g. Home Network) Access Networks

Various components of packet delay include –Nodal processing delay –Queueing delay –Transmission delay –Propagation delay Delays in Networks

Dependence of Queueing delay on traffic intensity Delays in Networks

Smaller sized packets result in smaller end-to-end delays Delays in Networks

Layers of functions with standardised interface between them Protocol Stack

Layers of functions with standardised interface between them Protocol Stack

Storage Area Networks (SAN) Storage use is growing explosivelyStorage use is growing explosively Managing locally attached storage is difficultManaging locally attached storage is difficult –Backup –Access by multiple servers Combines the best of storage and networking technologies to provide low latency, high bandwidth, high availability interconnectCombines the best of storage and networking technologies to provide low latency, high bandwidth, high availability interconnect ComponentsComponents –Servers –Storage Fabric

Storage Area Networks (SAN) SAN enables storage resources and server resources to grow independentlySAN enables storage resources and server resources to grow independently Storage on a given server can be increased or decreased as needed without complex reconfiguring or re-cabling of devices. Enforcing security policies for access rights to a given device is a core part of the infrastructure Data can be transferred directly from device to device without server intervention The primary technology used in storage area networks today is Fibre Channel.

Fibre Channel Technologies Arbitrated LoopArbitrated Loop

The Infrastructure of the Internet

An application that uses the Internet transport functions A system with universally accepted standards for storing, retrieving, formatting, and displaying information via a client/server architecture Based on HTML - standard hypertext language used in Web Handles text, hypermedia, graphics, and sound Internet Services – World Wide Web

Internet Challenges Internet Regulation –Technical organizations (e.g., World Wide Web Consortium) develop standards governing the Internet’s functionality –These organizations are not formally charged in any legal or operational sense with responsibility for the Internet –How to control controversial content on the Web?

Internet Challenges (continued) Internet Expansion –Tremendous Internet traffic growth has strained some elements of the network Slower retrieval times Unreliable data transmission Denial of service by overloaded servers –Approaches to overcoming this congestion include Improved hardware technology Improved Web management software

Internet Challenges (continued) Internet Privacy - Web sites collect information with and without consumers’ knowledge –Cookie - small data file placed on users’ hard drives when a site is first visited. Collects data on pages visited and content viewed. –Three potential approaches to the privacy issue Government lets groups develop voluntary privacy standards; does not take any action now unless real problems arise Government recommends privacy standards for the Internet; does not pass laws at this time Government passes laws now for how personal information can be collected and used on the Internet –Financial transaction security also a concern

Intranets A private network that uses Internet software and TCP/IP protocols –Provide employees with easy access to corporate information –Used to deploy corporate applications Examples – policies and procedures manuals; human resource forms; product catalogs –Security is a concern Security measures include – public key security, encryption, digital certificates, firewalls

Extranets An extension of an intranet to selected outside business partners, such as suppliers, distributors, and key customers –Provide business partners with easy access to corporate information and easy collaboration Security –Critical to prevent unwanted entry into internal systems –Virtual private networks (VPNs) are often used to add security to Internet communication

Operational Characteristics of Internet Internetworking technologies are based on open standards Internetworking technologies operate asynchronously Internet communications have inherent latency Naturally decentralised Scalable

The rise of Internetworking: Business Implications Network becomes a computer Quicker realization of economic value Emergence of real-time infrastructure: Better data better decisions, improved process visibility, Improved process efficiency, From make-to-sell to sense-and-respond Broader exposure to operational threats New models of service delivery Managing legacies

Future Internet Initiatives Internet2 –A collaboration among more than 180 U.S. universities to develop leading-edge networking and advanced applications for learning and research. –A group of very high bandwidth networks on the Internet. –Partnership between universities, industry, and government. Next Generation Internet (NGI) –Federal government led initiative to advance Internet technology and applications.

Securing Infrastructure against Malicious Threats Threats: –External attacks – DoS attacks, DDoS, Spoofing –Intrusion –Viruses and Worms

DoS/DDoS Easy to execute, difficult to defend against Abrupt termination of conversation Attack from different sites – monitoring difficult Degradation of service attack

Intrusion Get access to company’s internal IT infrastructure –User name, password –Sniffer software –Vulnerabilities left in the software Difficult to figure out what intruders might have done inside

Viruses and Worms Replicate and spread themselves (worms) Virus needs assistance to replicate The Code Red Worm (2001)

Securing Infrastructure against Malicious Threats Defensive Measures –Security Policies –Firewalls –Authentication –Encryption –Patching and Change management –Intrusion detection and network monitoring

Securing Infrastructure against Malicious Threats A HOLISTIC APPROACH IS THE NEED OF THE DAY

Thank You