LECTURE14 NET 301 12/3/2015Lect14 NET301 1. HOW TO SET UP A SECURE LOCAL NETWORK Step 1: Identify Your Networking Needs This is a very important step.the.

Slides:



Advertisements
Similar presentations
Hub A hub is a device that connects PCs together All hubs Contain multiple access ports the hub simply forwards the packets to all the other devices connected.
Advertisements

IST IT Services Intern Program Quiz Lessons Summary Links Home How to Make Network Cables In this lesson you will: –Determine what length cable is needed.
Networks By the end of this session, you will:
Mr C Johnston ICT Teacher
Security strategy. What is security strategy? How an organisation plans to protect and respond to security attacks on their information technology assets.
Designing and Installing a Network Peer to Peer or Server –Number of workstations vs. Cost –Administration, distributed or centralized –Security considerations.
TDC 461 Basic Communications Systems Local Area Networks 29 May, 2001.
ROYAL PALM NETWORK PROJECT John Healy Tom Jamieson
Pertemuan 20 Matakuliah: A0214/Audit Sistem Informasi Tahun: 2007.
Computer Networking By Brian Bogue. Internet Service Provider [ISP] Satellite, Wireless, Cable and Dial-up Direcway Satellite is our ISP with a connection.
LECTURE16 NET 301. HOW TO SET UP A SECURE LOCAL NETWORK Step 1: Identify Your Networking Needs This is a very important step.the key considerations are:
 All of you should be able to describe how a network works.  Most of you will be able to identify the main devices necessary for a network.  Some of.
Network Done by: Athra sultan.
Network Infrastructure Security. LAN Security Local area networks facilitate the storage and retrieval of programs and data used by a group of people.
What is a Computer Network? Two or more computers which are connected together.
Privilege Levels Cisco IOS provides for 16 different privilege levels ranging from 0 to 15. Cisco IOS comes with 2 predefined user levels. User mode.
Presented by Manager, MIS.  GRIDCo’s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to GRIDCo’s.
And how they are used. Hubs send data to all of the devices that are plugged into them. They have no ability to send packets to the correct ports. Cost~$35.
Local and Wide Area Networks: Understanding the Pieces John H. Porter University of Virginia Coastal Research Center.
Computer Networks All you need to know. What is a computer network? Two or more computers connected together so that they can communicate with each other.
NETWORK Topologies An Introduction.
Networking and Operating Systems. Networking What is it? Things that are hooked together. Computer Network- Computers that are connected together.
Networks LANS,. FastPoll True Questions Answer A for True and B for False A wireless infrastructure network uses a centralized broadcasting device, such.
Networks and Hackers Copyright © Texas Education Agency, All rights reserved. 1.
By Kyle Slinger.  A network is where you can send information to and from different PCs.
0 If you have set-up the equipment and are unable to access your service, call 1(888)ONE-ATT0/1(888) or for
NETWORK TOPOLOGIES There are three basic configurations used to connect computers they are the  Bus  Ring  Star.
©G. Millbery 2001Communications and Networked SystemsSlide 1 Purpose of Network Components  Switches A device that controls routing and operation of a.
Computer Concepts 2014 Chapter 5 Local Area Networks.
INTRODUCTION. The security system is used as in various fields, particularly the internet, communications data storage, identification and authentication.
INTERNET ACCESS VIA CABLE TV NETWORK By B.SURESH (09511A1202)
Chapter 7 Networks and the Internet Networks Sharing resources among multiple computers (workstations) Local Area Networks Wide Area Networks.
Objectives  To define network  To identify use of network  To differentiate major types of network  To identify basic networking terminologies  To.
Networking Components By: Timothy O’Grady. Ethernet Hub Ethernet hubs link PC’s and peripherals and allow them to communicate over networks. Data transferring.
Networks.
Chapter 2 Securing Network Server and User Workstations.
Connectivity Devices. Network Interface Card (NIC) Allow user to connect to networks via Ethernet cable or Wi-Fi Nowadays integrally fitted into the.
0 If you have set-up the equipment and are unable to access your service, call 1(888)ONE-ATT0/1(888) or for
Network Anatomy By: Roland J. Boutte. Ethernet Cable cable used to connect computing devices together directly. two hosts or two switches to each other.
1 Networks: A group of two or more computer systems linked together. There are many types of computer networks, including: local-area networks (LANs) :
NETWORK INFRASTRUCTURE SECURITY Domain 5. Computer Security “in short, the average computer is about as secure as a wet paper bag, and it is one of the.
NETWORKING FUNDAMENTALS. Network+ Guide to Networks, 4e2.
Network Components David Blakeley LTEC HUB A common connection point for devices in a network. Hubs are commonly used to connect segments of a LAN.
Network Devices Mr Conti Year 9 Lesson 5. Every computer on a network needs a network interface card (NIC) which is connected to the motherboard inside.
FIT03.05 Explain features of network maintenance.
Network Components Basics!. Network HUB  Used to connect multiple Ethernet devices together  Layer 1 of the OSI model  Not used much today.
FIREWALLS What Is A Firewall? A computer firewall protects networked computers from intentional hostile intrusion that could compromise confidentiality.
NETWORKING & SYSTEM UPDATES
WHAT IS E-COMMERCE? E-COMMERCE is a online service that helps the seller/buyer complete their transaction through a secure server. Throughout the past.
Introduction TO Network Administration
NETWORKING COMPONENTS lLTEC 4550 JGuadalupe. HUB -THIS IS A HARDWARE DEVICE THAT IS USED TO NETWORK MULTIPLE COMPUTERS TOGETHER. IT IS A CENTRAL CONNECTION.
Physical Security Concerns for LAN Management By: Derek McQuillen.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Planning a Network Upgrade Working at a Small-to-Medium Business or.
PCs ENVIRONMENT and PERIPHERALS Lecture 1. Software The series of instructions that tells the hardware how to perform tasks Software The series of instructions.
GFI LANguard Matt Norris Dave Hone Chris Gould. GFI LANguard: Description Through the performances of the three (3) cornerstones of vulnerability management:
 client  client/server network  communication hardware  extranet  firewall  hacker  Internet  intranet  local area network (LAN)  Network 
An Introduction to Local Area Networks An Overview of Peer-to-Peer and Server-Based Models.
© ExplorNet’s Centers for Quality Teaching and Learning 1 Use appropriate tools for network cabling and connections. Objective – 2%
Jeff Warnock COSC 352 Indiana University of Pennsylvania Spring 2010.
Learning to read Installing a wired modem router.
Networks and Communication
WHAT IS A NETWORK TYPES OF NETWORK NETWORK HARDWARE
Net 301 LECTURE14 12/3/2015 Lect14 NET301.
Installing an Xbox 360.
Networking Devices.
Net 301 LECTURE12 12/3/2015 Lect14 NET301.
IT Vocab IT = information technology Server Client or host
Networks By the end of this session, you will:
Principles of Information Technology
Presentation transcript:

LECTURE14 NET /3/2015Lect14 NET301 1

HOW TO SET UP A SECURE LOCAL NETWORK Step 1: Identify Your Networking Needs This is a very important step.the key considerations are: How many wired Ethernet ports, if any, will you need? Where will these Ethernet ports need to be located? (In other words, where will the PCs and other equipment that will be plugged into these Ethernet ports be located?) Where will the router and high-speed modems be located? Answering these questions will help you understand what types of equipment you need, as well as how much cable you’ll need. 12/3/2015Lect14 NET3012

HOW TO SET UP A SECURE LOCAL NETWORK Step 2: Determine Where To Put Your Equipment Before you begin any installation, commit to the location for each piece of equipment in your network. This is critical if you’re going to run a cable beneath drywall or over a ceiling, because you won’t be able to change the cable lengths if something goes wrong. 12/3/2015Lect14 NET3013

HOW TO SET UP A SECURE LOCAL NETWORK Step 3: Gather Your Tools And Supplies Ethernet Cable.. Cable Connectors.. Crimper.. Cable/DSL Modem. Wired/Wi-Fi Router Ethernet Hub 12/3/2015Lect14 NET3014

HOW TO SET UP A SECURE LOCAL NETWORK Step 4: Run The Cables In this step, we’ll create the “cable runs” that will establish wired connections between the Ethernet ports on the ground floor and the router and cable modem upstairs. 12/3/2015Lect14 NET3015

HOW TO SET UP A SECURE LOCAL NETWORK Step 4: Run The Cables Run cable from the router and cable/DSL modem location to the area where each Ethernet port will be located. As you run the cable to these locations, make sure you temporarily affix the cable to the wall or floor so that you have a realistic idea of how much cable you’ll need. Also: Leave yourself five or 10 extra feet at the end of the cable, just in case. 12/3/2015Lect14 NET3016

HOW TO SET UP A SECURE LOCAL NETWORK Step 5: Crimp The Cables Step 6: Connect All The Cables Together Step 7: Test Your Network Connection Step 8: Set Up Your Router 12/3/2015Lect14 NET3017

APPLICATIONS Applications on a LAN can range from word processing to data base management systems. The most universally used application is . An important security note is that on some systems it is also possible to restrict mail users from attaching files as a part of an antivirus program. 12/3/2015Lect14 NET3018

APPLICATIONS Many application systems have their own set of security features, in addition to the protection provided by the network operating system. Data base management systems, in particular, have comprehensive security controls built in to limit access to authorized users. 12/3/2015Lect14 NET3019

ACCESS CONTROL MECHANISMS  Network operating systems have access control mechanisms that are crucial for LAN security.  For example, access controls can limit: who can log on, what resources will be available, what each user can do with these resources, and when and from where access is available. Management, LAN, security, and key user personnel should cooperate closely to implement access controls. 12/3/2015Lect14 NET30110

THREATS TO LAN SECURITY People Threats.. Costly System administration error Software/programming error (bugs) Unauthorized use Modification of data Theft of computer assets Hardware failure ( or any physical ) 12/3/2015Lect14 NET30111

admin.org/secshelf/book001/16.pdf 12/3/2015Lect14 NET30112