Securing Interconnect Networks By: Bryan Roberts.

Slides:



Advertisements
Similar presentations
Encrypting Wireless Data with VPN Techniques
Advertisements

Introduction to Computer Administration. Computer Network - Basic Concepts Computer Networks Computer Networks Communication Model Communication Model.
Information Security 1 Information Security: Security Tools Jeffy Mwakalinga.
2 An Overview of Telecommunications and Networks Telecommunications: the _________ transmission of signals for communications (home net) (home net)
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
Presented by Serge Kpan LTEC Network Systems Administration 1.
IS Network and Telecommunications Risks
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Computer Networks Eyad Husni Elshami. Computer Network A computer network is a group of interconnected computers to share data resources ( printer, data.
NETWORK SECURITY.
NETWORKING Mahesh & Naveen.
Networking DSC340 Mike Pangburn. Networking: Computers on the Internet  1969 – 4  1971 – 15  1984 – 1000  1987 – 10,000  1989 – 100,000  1992 –
COMPUTER NETWORKS.
Networking Components Manuel Palos. HUBS Hubs are inexpensive devices that connect multiple devices t0 a network. Hubs merely pass along network data.
Computer Networks IGCSE ICT Section 4.
Computer Networking Devices Seven Different Networking Components.
CECS 474 Computer Network Interoperability Tracy Bradley Maples, Ph.D. Computer Engineering & Computer Science Cal ifornia State University, Long Beach.
Lecture slides prepared for “Business Data Communications”, 7/e, by William Stallings and Tom Case, Chapter 8 “TCP/IP”.
NETWORKING COMPONENTS La’Trena Barrett CECS
NETWORKING COMPONENTS Zach Avis. Hub A hub is a low cost way to connect two computers. A hub can also act as a repeater. When a signal comes from one.
Basic Networking Components
Networking Components Mike Yardley LTEC 4550 Assignment 3
CECS 5460 – Assignment 3 Stacey VanderHeiden Güney.
1 Chapter Overview Network devices. Hubs Broadcast For star topology Same as a repeater Operate at the physical layer 2.
Shared success Outline What is network security? Why do we need security? Who is vulnerable? Common security attacks and countermeasures. How to secure.
LECTURE 9 CT1303 LAN. LAN DEVICES Network: Nodes: Service units: PC Interface processing Modules: it doesn’t generate data, but just it process it and.
Slide 1 What is a Computer Network? A computer network is a linked set of computer systems capable of sharing computer power and resources such as printers,
COMP 6005 An Introduction To Computing Session Four: Internetworking and the World Wide Web.
Network Components: Assignment Three
 Computer Networking Computer Networking  Networking terminology Networking terminology  Client Server Model Client Server Model  Types of Networks.
Common Devices Used In Computer Networks
ACM 511 Chapter 2. Communication Communicating the Messages The best approach is to divide the data into smaller, more manageable pieces to send over.
Computer Network Basic Concepts. Topics Computer Networks Communication Model Transmission Modes Communication Types Classification Of Computer Networks.
GROUP INVOLVED IN A WEB APPLICATION DEVELOPMENT Continue.
Hub  A hub is a piece of hardware that connects multiple wired devices together on a single network. Hubs work at the physical layer (layer 1) of the.
Chapter 1 Basics of Networking & Designs of Simple Networks powered by DJ.
11 SECURING YOUR NETWORK PERIMETER Chapter 10. Chapter 10: SECURING YOUR NETWORK PERIMETER2 CHAPTER OBJECTIVES  Establish secure topologies.  Secure.
NETWORKING COMPONENTS AN OVERVIEW OF COMMONLY USED HARDWARE Christopher Johnson LTEC 4550.
Company LOGO Networking Components Hysen Tmava LTEC 4550.
HNC COMPUTING - Network Concepts 1 Network Concepts Devices Introduction into Network Devices.
25-Oct-15Network Layer Connecting Devices Networks do not normally operate in isolation.They are connected to one another using connecting devices. The.
3/5/2002e-business and Information Systems1 Computer Networking Computer System Computer Hardware Computer Software Computer Networking.
1 Class 15 System Security. Outline Security Threats (External: malware, spoofing/phishing, sniffing, & data theft: Internal: unauthorized data access,
Networking Components Michelle Vega Network System Administrations LTEC /026 Mr. West.
First, by sending smaller individual pieces from source to destination, many different conversations can be interleaved on the network. The process.
NETWORK HARDWARE CABLES NETWORK INTERFACE CARD (NIC)
NET 324 D Networks and Communication Department Lec1 : Network Devices.
Computer Networks. Internetworking Devices Network Interface Card (NIC) Repeaters HUB Bridge Switch Router.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Connecting Devices CORPORATE INSTITUTE OF SCIENCE & TECHNOLOGY, BHOPAL Department of Electronics and.
Network Components David Blakeley LTEC HUB A common connection point for devices in a network. Hubs are commonly used to connect segments of a LAN.
CSC 116 – Computer Networks Fall 2015 Instructor: Robert Spengler.
Network Components Basics!. Network HUB  Used to connect multiple Ethernet devices together  Layer 1 of the OSI model  Not used much today.
Networks Network Components. Learning Objectives Describe different media for transmitting data and their carrying capabilities. Explain the different.
Networking Components WILLIAM NELSON LTEC HUB  Device that operated on Layer 1 of the OSI stack.  All I/O flows out all other ports besides the.
Networking Components William Isakson LTEC 4550 October 7, 2012 Module 3.
NETWORK DEVICES Department of CE/IT.
Networking Components
Networking Components Quick Guide. Hubs Device that splits a network connection into multiple computers Data is transmitted to all devices attached Computers.
ASSIGNMENT 3 - NETWORKING COMPONENTS BY JONATHAN MESA.
NETWORKING COMPONENTS Jeffery Rice LTEC Assignment 3.
CHAPTER -II NETWORKING COMPONENTS CPIS 371 Computer Network 1 (Updated on 3/11/2013)
COMPUTER NETWORKS COMPUTER ENGINEERING DEPARTMENT COMPUTERS AND COMPUTING CPE 101.
Also known as hardware/physi cal address Customer Computer (Client) Internet Service Provider (ISP) MAC Address Each Computer has: Given by NIC card.
SPRING 2016 Lesson - 4 Networks Communication CSE 101.
Chapter 1: Explore the Network
Computer Networking Devices
Security in Networking
e-business and Information Systems
Introduction to Computer Administration
Firewalls Routers, Switches, Hubs VPNs
Presentation transcript:

Securing Interconnect Networks By: Bryan Roberts

What is an Interconnected Network?  Two or more networks or network segments  Connected among private, public, commercial, industrial or governmental levels  Use internet protocol  3 different types

3 Types of Internetworks  Intranet Set of networks using internet protocol and IP – based tools Single administrative entity Closed to specific users Most commonly internal network of an organization At least one web server to provide information

3 Types of Internetworks  Extranet Network or internetwork limited to a single organization Limited connections to the network Cannot consist of single LAN Must have at least one connection with an external network

3 Types of Internetworks  Internet Most popular Consists of connections to all types of networks Successor of Advanced Research Projects Agency Network (ARPANET) developed by U.S. governmentAdvanced Research Projects Agency Network Communications backbone of World Wide Web

Basic Hardware Components of Networks  Network Interface Card (NIC) Allows computers to communicate over a network Allows users to connect to other users through cable or wireless connections  Repeaters Electronic device that receives a signal and retransmits it at a higher power level Most common is twisted pair which allows up to 100 meters away

Basic Hardware Components of Networks  Hubs Contains multiple ports of connectivity When a packet arrives at one port it copies it to all other ports for transmission Destination address does not change to a broadcast address Copies data to all nodes connected to hub

Basic Hardware Components of Networks  Others Bridges  Connects multiple segments at data link layer Switches  Forwards and filters datagrams between ports based on MAC address in packets Routers  Device that forwards data packets between networks

Why is securing important?  Motivation is driven by contagious threats of internet viruses and worms  Breaching becomes an internal threat to the network if the system is cracked  CSI and FBI report 13 different types of attacks Range from website defacement to financial fraud to internet worms and viruses

Types of protection  Anti-virus software Norton Macafee  Firewalls  Virtual Private Network (VPN), Secure Socket Layer (SSL) and IPSEC Protect against the loss of confidential data

Securing Information Systems  These requirements must be satisfied: Systems must be interconnected Threat must be capable of breaching a system and then being able to attack others One system breach affects another system breach, causing a chain effect

3 Ways to deal with threats  Protection Primary defense, especially against unknown attackers who may not even be traceable  Detection Useful in situations where identity of attackers can be established and legal measures can be taken against them  Reaction Time taken to restore the system back to normal

Cryptographic Measures  Do not protect against availability loss  Do not stop the attackers from breaching the system  Render information unusable unless attackers decrypt the data

Firms  Use both protection countermeasures Firewalls Cryptographic countermeasures  SSL

Accessing Encrypted Confidential Documents  One must perform the following: Breach the information system and obtain access to the document Break the cryptographic security protecting the document to access its contents

Using protection and cryptographic countermeasures  Used in many enterprises  Secure information assets against confidentiality loss  Protection measures Protect against breaching  Cryptographic measures Protect unauthorized users from accessing sensitive data

Conclusion  Types used to secure Anti-virus software Firewalls VPN’s, SSL, and IPSEC  Importance It is important to secure your data in an interconnected network Can cause huge failure if system is breached Hackers and crackers can destroy a whole system if they gain access to information