The Tech that supports the Net Net Tech for CBIS.

Slides:



Advertisements
Similar presentations
Computer networks Fundamentals of Information Technology Session 6.
Advertisements

Securing Remote PC Access to UNIX/Linux Hosts with VPN or SSH Charles T. Moetului WRQ, Inc. (206)
1 Objectives Configure Network Access Services in Windows Server 2008 RADIUS 1.
IS Network and Telecommunications Risks
Computers © 2005 Prentice-Hall, Inc.Slide 1. Computers Chapter 6 Networks and Networking © 2005 Prentice-Hall, Inc.Slide 2.
Lecture 1 Overview: roadmap 1.1 What is computer network? the Internet? 1.2 Network edge  end systems, access networks, links 1.3 Network core  network.
Remote Networking Architectures
1 © J. Liebeherr, All rights reserved Virtual Private Networks.
Module 11: Supporting Remote Users. Overview Establishing Remote Access Connections Connecting to Virtual Private Networks Configuring Authentication.
Network+ Guide to Networks 6 th Edition Chapter 10 Virtual Networks and Remote Access.
ITGS Networks Based on the textbook “Information Technology in a Global Society for the IB Diploma” by Stuart Gray.
NetComm Wireless VPN Functionality Feature Spotlight.
Understanding VPN Concepts Virtual Private Network (VPN) enables computers to –Communicate securely over insecure channels –Exchange private encrypted.
Microsoft Windows Server 2003 TCP/IP Protocols and Services Technical Reference Slide: 1 Lesson 23 Virtual Private Networks (VPNs)
Network+ Guide to Networks 6 th Edition Chapter 10 Virtual Networks and Remote Access.
Virtual Private Network (VPN) SCSC 455. VPN A virtual private network that is established over, in general, the Internet – It is virtual because it exists.
CHAPTER 2 PCs on the Internet Suraya Alias. The TCP/IP Suite of Protocols Internet applications – client/server applications The client requested data.
Chapter Overview Network Communications.
Chapter 3 Hardware, Software, and Networks Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall 3-1.
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
Protecting Internet Communications: Encryption  Encryption: Process of transforming plain text or data into cipher text that cannot be read by anyone.
15-1 Networking Computer network A collection of computing devices that are connected in various ways in order to communicate and share resources.
CHAPTER 2 PCs on the Internet Suraya Alias. The TCP/IP Suite of Protocols Internet applications – client/server applications ◦The client requested data.
Module 5: Configuring Access for Remote Clients and Networks.
Class 6 Agenda Midterm Review Midterm Review –Questions –Toyota Case Computer Security Basics Computer Security Basics –Identification & Authentication.
BZUPAGES.COM. What is a VPN VPN is an acronym for Virtual Private Network. A VPN provides an encrypted and secure connection "tunnel" path from a user's.
C3 confidentiality classificationIntegrated M2M Terminals Introduction Vodafone MachineLink 3G v1.0 1 Vodafone MachineLink 3G VPN functionality Feature.
IT 347 Final Review Winter 2011 J.J. Ekstrom. IT 347 Course Topics Network Models Protocols and Encapsulation Reliable Delivery / Sliding Window Clients,
A Study of Wireless Virtual Network Computing Kiran Erra.
VPN Security Policy By: Fred Cicilioni. VPN, or Virtual Private Network, is a protocol that allows remote access, allowing the user to connect to all.
Computers Are Your Future Eleventh Edition
Internet A simple introduction 黃韻文 申逸慈.
Chapter 6 Data Communications. Network Collection of computers Communicate with one another over transmission line Major types of network topologies What.
A machine that acts as the central relay between computers on a network Low cost, low function machine usually operating at Layer 1 Ties together the.
Configuring AAA requires four basic steps: 1.Enable AAA (new-model). 2.Configure security server network parameters. 3.Define one or more method lists.
Network Components David Blakeley LTEC HUB A common connection point for devices in a network. Hubs are commonly used to connect segments of a LAN.
Module 10: Providing Secure Access to Remote Offices.
INFORMATION SECURITY MANAGEMENT P ROTECTION M ECHANISMS - C RYPTOGRAPHY.
IT 210: Web-based IT Fall 2012 Lecture: Network Basics, OSI, & Internet Architecture.
Protocols Monil Adhikari. Agenda Introduction Port Numbers Non Secure Protocols FTP HTTP Telnet POP3, SMTP Secure Protocols HTTPS.
science/internet-intro
Networks The Big Picture. Three Great Leaps of Civilization.
Also known as hardware/physi cal address Customer Computer (Client) Internet Service Provider (ISP) MAC Address Each Computer has: Given by NIC card.
Encryption and Security Tools for IA Management Nick Hornick COSC 481 Spring 2007.
Application Layer instructors at St. Clair College in Windsor, Ontario for their slides. Special thanks to instructors at St. Clair College in Windsor,
VPN’s Andrew Stormer COSC 356 Fall What is a VPN? Acronym – Virtual Private Network Acronym – Virtual Private Network Connects two or more private.
أمن المعلومات لـ أ. عبدالرحمن محجوب حمد mtc.edu.sd أمن المعلومات Information Security أمن المعلومات Information Security  أ. عبدالرحمن محجوب  Lec (5)
Networks – Network Fundamentals
Virtual Private Networks and IPSec
Virtual Private Networks (VPN)
Virtual Private Networks
Virtual Private Network (VPN)
Virtual Private Networks
Remote Access Lecture 2.
CS 1308 Exam I Review.
A Study of Wireless Virtual Network Computing
IPSec VPN Chapter 13 of Malik.
CIT 480: Securing Computer Systems
Ken Gunnells, Ph.D. - Networking Paul Crigler - Programming
Network+ Guide to Networks 6th Edition
Virtual Private Network (VPN)
PPPoE Internet Point to Point Protocol over Ethernet
Remote Access Services RAS Routing and Remote Access Services RRAS Remote Desktop Terminal Services Virtual Private Networking VPN.
VPN: Virtual Private Network
09/12/2018 Virtual Networks.
Protocols 2 Key Revision Points.
Cengage Learning: Computer Networking from LANs to WANs
Connecting to the Network
Computer Networks Protocols
Chapter 8 – Data switching and routing
Presentation transcript:

The Tech that supports the Net Net Tech for CBIS

Review of Basics Computer Models Von Neumann Input/Process/Output/Store Basic Data Formats Bits/Bytes/Hex Pixels, ADC/DAC, file formats Software Categories OS/Utilities Apps/Clients S13 2 MIS

Net Architecture Device Level TCP / IP over Ethernet Bitstream Level packet switching / Routers Last Mile ISP Backbone ISP Last Mile Service Level Client / Server Peer to Peer S13 3 MIS

Client Server Net Services Client is half of Service resides on local machine requires a net connection for other half 3 examples of client app Server is half of Service resides on remote machine requires a service protocol with Client 3 examples of Net Services S13 4 MIS

Software Apps Operating System – examples (4) Manages hardware/software Resources Kernel (anchors to hardware) / Shell (UI) model Thin vs Thick Clients – what is GDocs? Open Source vs Licensed – example of each S13 5 MIS

Encryption Net Packets are generally plain text Packet Sniffing allows reading message https – encrypts packet data to and from server. Requires "trust" that you are who you say you are. this is only as secure as the Certificate Authorities are, hack one get many certificates S13 6 MIS

Virtual Private Networks Using Net, create a private "tunnel" for services Uses Client / Server, but Use a Thick client with strong authentication (may not use certificates) (what you know, what you have, what you are) specialized encryption Server has specialized encryption Once you are connected, appears as a "private" network S13 7 MIS