NETWORK INFRASTRUCTURE SECURITY Domain 5. Computer Security “in short, the average computer is about as secure as a wet paper bag, and it is one of the.

Slides:



Advertisements
Similar presentations
Basic Concepts of a Computer Network
Advertisements

Introduction to Computers Section 7A. home Network A group of connected computers that communicate, exchange information and share resources.
Networking Basics lesson 17. This lesson includes the following sections: The Uses of a Network How Networks are Structured Network Topologies for LANs.
Network Security Topologies Chapter 11. Learning Objectives Explain network perimeter’s importance to an organization’s security policies Identify place.
2 An Overview of Telecommunications and Networks Telecommunications: the _________ transmission of signals for communications (home net) (home net)
Network Security Philadelphia UniversityAhmad Al-Ghoul Module 11 Exploring Secure Topologies  MModified by :Ahmad Al Ghoul  PPhiladelphia.
IS Network and Telecommunications Risks
Networks Adapting Computers to Telecommunications Media.
Group Presentation Design and Implementation of a company- wide networking & communication technologies strategy 9 th December 2003 Prepared By: …………
INTRANET SECURITY Catherine Alexis CMPT 585 Computer and Data Security Dr Stefan Robila.
Lesson 3 – UNDERSTANDING NETWORKING. Network relationship types Network features OSI Networking model Network hardware components OVERVIEW.
1 Chapter 19 Networks. 2 What’s Inside and on the CD? In this chapter you’ll learn: –Basic network terminology –To identify network components –About.
Professor Michael J. Losacco CIS 1150 – Introduction to Computer Information Systems Communications and Networks Chapter 8.
NETWORKS Lauren Hickman Patrick McCamy Morgan Pace Noah Ryder.
Telecommunications and Networks Business value of networks Network components Chapter 6 McGraw-Hill/Irwin Copyright © 2007 by The McGraw-Hill Companies,
7.1 © 2007 by Prentice Hall 7 Chapter Telecommunications, the Internet, and Wireless Technology.
McGraw-Hill/Irwin Copyright © 2008 by The McGraw-Hill Companies, Inc. All rights reserved. Chapter 9 Communications and Networks.
Computer Networks & Security
Computer Networks Eyad Husni Elshami. Computer Network A computer network is a group of interconnected computers to share data resources ( printer, data.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Communications and Networks
Hardware & Software Needed For LAN and WAN
Computer Networks IGCSE ICT Section 4.
Network and WiFi By: Clara-Hannah S., Amelia H., and Margot d’I.
PowerPoint Presentation to Accompany Chapter 9 Networks & Communications Visualizing TechnologyCopyright © 2014 Pearson Education, Inc. Publishing as Prentice.
LAN Dr. Yan Quan Liu ILS SCSU
CN. Computer NEtwork ► A computer network, often simply referred to as a network, is a collection of computers.
Chapter Overview Network Communications.
Networks What are they and how do they work? What is a Network?  Hardware and software data communication system  Two or more devices connected for.
Networks A network is a collection of computers and devices connected together via communications devices and transmission media Advantages of a network.
NETWORK.
Networks LANS,. FastPoll True Questions Answer A for True and B for False A wireless infrastructure network uses a centralized broadcasting device, such.
By Julia Nguyen B2. What is it?  Networking is two or more computers linked together  Two common types are Local Area Network (LAN) and Wide Area Network.
Introductionto Networking Basics By Avinash Kulkarni.
IT Infrastructure for Business
NETWORKS.
Environment for Information Security n Distributed computing n Decentralization of IS function n Outsourcing.
1 Technology in Action Chapter 12 Behind the Scenes: Networking and Security Copyright © 2010 Pearson Education, Inc. Publishing as Prentice Hall.
Technology Strategies for the Hospitality Industry© 2005 Pearson Education, Inc Nyheim, McFadden, & Connolly Upper Saddle River, New Jersey Networks.
Chapter 5: Networks, Internet & Ecommerce IT Auditing & Assurance, 2e, Hall & Singleton.
Review 2 Chapters 7, 8, 9. 2  Define a network and its purpose.  Explain how communications technologies are used in our every day lives.  Understand.
IS Network and Telecommunications Risks Chapter Six.
3/5/2002e-business and Information Systems1 Computer Networking Computer System Computer Hardware Computer Software Computer Networking.
5 SECTION A 1 Network Building Blocks  Network Classifications  LAN Standards  Network Devices  Clients, Servers, and Peers  Physical Topology  Network.
Week Four Rouda’s Sections.  LAN - Local Area Network ◦ small area (e.g. a building) ◦ small number of machines  WAN - Wide Area Network ◦ large area.
NETWORKING FUNDAMENTALS. Network+ Guide to Networks, 4e2.
Security fundamentals Topic 10 Securing the network perimeter.
TELECOMMUNICATIONS AND NETWORKS
Communications and Networks Chapter 9 9-1Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved.
Data Communication and Networks Chapter 5. What’s a Network? a network consists of two or more computers that are connected together to share information.
Networks The Big Picture. Three Great Leaps of Civilization.
Lesson 7 Networks Unit 1—Computer Basics. Computer Concepts BASICS - 2 Objectives Describe the benefits and disadvantages of networks. List and describe.
Copyright © 2010 Pearson Education, Inc. Publishing as Prentice Hall 1.
1 Lesson 24 Network Fundamentals Computer Literacy BASICS: A Comprehensive Guide to IC 3, 3 rd Edition Morrison / Wells.
Elements of an ICT networks COMMUNICATION DEVICES: 1.Network interface card 2.Hub 3.Switch 4.Router STANDARDS AND PROCEDURES: 1.Enable devices to communicate.
Copyright © 2006 Heathkit Company, Inc. All Rights Reserved Introduction to Networking Technologies Introduction to Networking.
Communications and Networks Chapter 9 McGraw-HillCopyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved.
 client  client/server network  communication hardware  extranet  firewall  hacker  Internet  intranet  local area network (LAN)  Network 
Securing Interconnect Networks By: Bryan Roberts.
Class Notes CS403- Internet Technology Prepared by: Gulrez Alam Khan.
Chapter5 TELECOMMUNICATIONS AND NETWORKS. Content Networking the Enterprise Trends in Telecommunications The Business Value of Telecommunications Networks.
Security fundamentals
Chapter Objectives In this chapter, you will learn:
Chapter 7. Identifying Assets and Activities to Be Protected
Networks and Communication
Internet Communication Engineering Mr. Zeeshan Ali, Asst. Professor
السلام عليكم.
IS4550 Security Policies and Implementation
Unit 27: Network Operating Systems
NETWORK.
Presentation transcript:

NETWORK INFRASTRUCTURE SECURITY Domain 5

Computer Security “in short, the average computer is about as secure as a wet paper bag, and it is one of the last places where you would want to hide valuable data or use to communicate secret or sensitive information” - Rick Maybury

Sanmi Fakiyesi Network  Network means the joining or linking of two or more computers in order to: 1.Communicate 2.Share resources such as files, folders, printers, etc

Sanmi Fakiyesi

Good Network A good Network must be able to:  Connect  Communicate  Provide services or resources.

Sanmi Fakiyesi Types of Network  LAN  WAN  PAN  SAN  MAN  WLAN  WWAN

Sanmi Fakiyesi Network topology  Bus  Star  Ring  Mesh

NETWORK TOPOLOGY Sanmi Fakiyesi

Network relationship  Peer to Peer  Client/Server  Workgroup  Domain

Sanmi Fakiyesi Network Security Architecture Before undertaking the Design or Implementation of an enterprise Network and it Components, a Security Architecture should be developed.

Sanmi Fakiyesi Concept of security architecture Top-down security model: 1.Security policy 2.Security Strategy 3.Procedure and Standards

Sanmi Fakiyesi (1)Security policy  It should conform to relevant standards.  Define security responsibilities within the organization.  Identification of key information assets using security risk analysis.  Set out guiding security principles to be in use in the organization.

Sanmi Fakiyesi (2)Security strategy It is more detailed than the policy. It shows how to implement the policy to get result.  Should support business needs.  Comply with the company’s security policy.

Sanmi Fakiyesi (3)Procedure and Standards These cover areas such as:  Performing system monitoring  Configuring a system  Configuring web server/firewall  Steps to take when there is security breach.

Sanmi Fakiyesi Trust / Security Zones Trust/Security zones are key aspect of security perimeter. A common classification for connection is: 1.Untrusted zone or Demilitarized zone 2.Hostile zone or internet 3.Semitrusted zone or extranets 4.Trusted zone or intranets

Sanmi Fakiyesi Information Assets issues  What are information assets?  Are people part of the information assets that need to be protected?  What are the implications of not protecting these assets?  Who should be responsible for the protection of these assets?  How should these assets be protected?

Sanmi Fakiyesi What should be protected?  Data  Application software (test and production)  Web applications (public or private intranet based)  Domain name servers  Operating systems for network routers and switches  System utilities  Telecommunication lines  Libraries and directories  Passwords

Sanmi Fakiyesi What should be protected? contd.  Temporary disk files  Tape files  System software  Access control software  System procedure libraries  Logging files  Bypass label process feature  Operator system exits  Dial-up lines  Data dictionary/directory  Spool queues

Network Infrastructure Security Sanmi Fakiyesi

Communication networks  Components: Devices, Software/programs, and files supporting the network operations  Controls:  Network control terminal (WAN) or Server (LAN)  Communications software

Sanmi Fakiyesi Components of Network Hardware/Devices  Hub or Switch  Cables (CAT5)  Connector(DB-9, RJ-45)  Modem (wired and wireless)  Network Interface Card  WAP for wireless connection  Wireless Network Interface Card  Router (wired and wireless)  Computers, Printers  servers

Router and Switch Sanmi Fakiyesi

Network Infrastructure Security  Control over the network is accomplished through a network control terminal and specialized communication software  The following are the controls over communication networks: Control functions should be performed by technically qualified operators Control functions should be separated and duties should be rotated on a regular basis, where possible Control software must restrict operator access from performing certain functions (e.g. ability to amend/delete logs) Control software should maintain an audit trail of all operator activities Audit trails should be reviewed by [network] operations management to detect any unauthorized network operations activities

Network Infrastructure Security (cont’d) Network operation standards and protocols should be documented and made available to the operators and should be periodically reviewed to ensure compliance. Network access by the system engineers should be closely monitored and reviewed to detect unauthorized access. Workload balance, fast response time and system efficiency should be ensured through analysis. Terminals should be authenticated through the use of a terminal identification file. Data encryption should be used to protect messages during transmission Sanmi Fakiyesi

Types of Network Software Novell Netware Unix Microsoft Windows 2000/NT, Window XP, Window vista, Window 7, Microsoft window server 2003, Microsoft window server ETC

Examples of Network security software /tools  Anti-virus  UTM-Unified Threat Management (e.g ISA)  Firewall  VPN (Virtual Private Network)  IDS/IPS  Honey pots  Honey net  Network Penetration tests Sanmi Fakiyesi

Examples of Network security software  Port based security  Identity based security  Network Admission Control Sanmi Fakiyesi