* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
Download Chapter One - Indiana University
Net neutrality law wikipedia , lookup
Computer security wikipedia , lookup
Wireless security wikipedia , lookup
Zero-configuration networking wikipedia , lookup
Wake-on-LAN wikipedia , lookup
Deep packet inspection wikipedia , lookup
Computer network wikipedia , lookup
Internet protocol suite wikipedia , lookup
Distributed firewall wikipedia , lookup
Cracking of wireless networks wikipedia , lookup
Piggybacking (Internet access) wikipedia , lookup
Network tap wikipedia , lookup
Airborne Networking wikipedia , lookup
Recursive InterNetwork Architecture (RINA) wikipedia , lookup
Chapter Six IS Network and Telecommunications Risks 1 Topics  Network and Telecommunication Technologies  Risks to IT Network and Telecommunication Systems  IT Network and Telecommunication Security  Auditing Network Security 2 Network Types  By Scale – Local Area Network (LAN) – Backbone Networks (BN) » for linking together organizational LANs at various locations. – Metropolitan Area Network (MAN) » connects LANs and BNs across different locations (usually leased lines) – Wide Area Network (WAN)  By Ownership – Internet, intranet, extranet – Virtual private networks (VPN) 3 Network Types  By Topology – – – –  Star-shaped – centralized Ring – decentralized Bus – decentralized Mesh By Distribution of Functionality – Client Server, Thin Client, Fat Client 4 Network Components (Users and Applications) Computers and terminals  Network Operating System  Telecommunications processors (network interface cards and modems) Clients/Servers  Telecommunications channels – physical and wireless (media)  Devices (Routers, switching, hubs, etc.)  5 Network Infrastructure Network Protocols and Software  Network and telecommunications software – application software (web browsers, e-mail software, etc.), – network OS, – networks management software, – middleware 6 Multi-layer Network Models  Network models – standard architecture that allows different HW and SW to communicate across networks  Open Systems Interconnection Model (7 layer) – Created by International Standards Organization (ISO) in 1984  Internet Model (5 layer) – Created by DARPA originally in early 70’s – Based on Transmission Control Protocol/ Internet Protocol (TCP/IP) suite – Combines the “top” three layers of the OSI model into a single layer. 7 5-Layer Internet Model  Application Layer – set of utilities used by application programs  Application Software Transport Layer – deals with end-to-end issues such as segmenting the message for network transport, and maintaining the logical connections between sender and receiver  Network Layer – responsible for making routing decisions  System Software Data Link Layer – deals with message delineation, error control and network medium access control  Physical Layer – defines how individual bits are formatted to be transmitted through the network Computer Hardware 8 Data Communication Standards Layer Common Standards 5. Application layer HTTP, HTML (Web) IMAP, POP (e-mail) 4. Transport layer TCP (Internet) SPX (Novell LANs) 3. Network layer IP (Internet) IPX (Novell LANs) 2. Data link layer Ethernet (LAN) PPP (dial-up via modem for MAN) 1. Physical layer Category 5 twisted pair (LAN) Fiber optic cable (WAN) 1-9 Message Transmission Example 10 Message Moving Through Layers 5 - 11 IS Network and Telecommunications Risks  Social Engineering, Software Vulnerabilities (Unauthorized Access)  Physical Infrastructure Threats – the elements, natural disasters, power supply, intentional human attacks (disaster)  Programmed Threats – viruses, worms, Trojan horses, hoaxes, blended threats (destruction)  Denial of Service Attacks (disruption) 12 IS Network and Telecommunications Security  Network security administration  Authentication and Access Control  Encryption – secret key and public key  Firewalls – packet filtering and stateful inspection  Intrusion Detection Systems  Penetration Testing – war dialing, port scanning, sniffers, password crackers 13 Internal, Perimeter, and External Networks 14 Auditing Network Security Risk assessment and best practices  Benchmark tools  IT audit programs for network security  15
 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
                                             
                                             
                                             
                                             
                                             
                                             
                                             
                                             
                                             
                                             
                                            