Manajemen Jaringan, Sukiswo ST, MT 1 Network Control Sukiswo

Slides:



Advertisements
Similar presentations
Cryptography and Network Security 2 nd Edition by William Stallings Note: Lecture slides by Lawrie Brown and Henric Johnson, Modified by Andrew Yang.
Advertisements

30/04/2015Tim S Roberts COIT13152 Operating Systems T1, 2008 Tim S Roberts.
Lecture 1: Overview modified from slides of Lawrie Brown.
Fundamentals of Computer Security Geetika Sharma Fall 2008.
IT 221: Introduction to Information Security Principles Lecture 1: Introduction to IT Security For Educational Purposes Only Revised: August 28, 2002.
Informationsteknologi Thursday, October 11, 2007Computer Systems/Operating Systems - Class 161 Today’s class Security.
6/2/2015B.Ramamurthy1 Security B.Ramamurthy. 6/2/2015B.Ramamurthy2 Computer Security Collection of tools designed to thwart hackers Became necessary with.
CSA 223 network and web security Chapter one
1 Cryptography and Network Security Third Edition by William Stallings Lecturer: Dr. Saleem Al_Zoubi.
Note1 (Intr1) Security Problems in Computing. Overview of Computer Security2 Outline Characteristics of computer intrusions –Terminology, Types Security.
Manajemen Jaringan dan Network Security Pertemuan 26 Matakuliah: H0484/Jaringan Komputer Tahun: 2007.
Evidor: The Evidence Collector Software using for: Software for lawyers, law firms, corporate law and IT security departments, licensed investigators,
CPE 5002 Network security. Look at the surroundings before you leap.
1 Pertemuan 26 Manajemen Jaringan dan Network Security Matakuliah: H0174/Jaringan Komputer Tahun: 2006 Versi: 1/0.
COEN 252: Computer Forensics Router Investigation.
Check Disk. Disk Defragmenter Using Disk Defragmenter Effectively Run Disk Defragmenter when the computer will receive the least usage. Educate users.
Session-based Security Model for SNMPv3 (SNMPv3/SBSM) David T. Perkins Wes Hardaker IETF November 12, 2003.
1 Kyung Hee University Prof. Choong Seon HONG Network Control.
Protection & Security Introduction to Operating Systems: Module 16.
11 SECURING YOUR NETWORK PERIMETER Chapter 10. Chapter 10: SECURING YOUR NETWORK PERIMETER2 CHAPTER OBJECTIVES  Establish secure topologies.  Secure.
Network security Network security. Look at the surroundings before you leap.
Network Security Introduction Light stuff – examples with Alice, Bob and Trudy Serious stuff - Security attacks, mechanisms and services.
Network Security. 2 SECURITY REQUIREMENTS Privacy (Confidentiality) Data only be accessible by authorized parties Authenticity A host or service be able.
Information Security By:-H.M.Patel. Information security There are three aspects of information security Security service Security mechanism Security.
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami 2 nd Semester
What security is about in general? Security is about protection of assets –D. Gollmann, Computer Security, Wiley Prevention –take measures that prevent.
1 Chapter 1 – Background Computer Security T/ Tyseer Alsamany - Computer Security.
Topic 1 – Introduction Huiqun Yu Information Security Principles & Applications.
NETWORK CONTROL The Fourth Meeting. 2 Table of Contents  Introduction  Configuration Control  Security Control.
Programming Logic and Design Fourth Edition, Comprehensive Chapter 16 Using Relational Databases.
IT Security. What is Information Security? Information security describes efforts to protect computer and non computer equipment, facilities, data, and.
Chap1: Is there a Security Problem in Computing?.
Network Security Introduction
INTRODUCTION TO COMPUTER & NETWORK SECURITY INSTRUCTOR: DANIA ALOMAR.
Computer threats, Attacks and Assets upasana pandit T.E comp.
C OMPUTER THREATS, ATTACKS AND ASSETS DONE BY NISHANT NARVEKAR TE COMP
Distributed Systems Ryan Chris Van Kevin. Kinds of Systems Distributed Operating System –Offers Transparent View of Network –Controls multiprocessors.
15.1 Chapter 15 Connecting LANs, Backbone Networks, and Virtual LANs Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or.
Threats, Attacks And Assets… By: Rachael L. Fernandes Roll no:
Unit 2 Personal Cyber Security and Social Engineering Part 2.
1 Network Security Maaz bin ahmad.. 2 Outline Attacks, services and mechanisms Security attacks Security services Security Mechanisms A model for Internetwork.
Keimyung University 1 Network Control Hong Taek Ju College of Information and Communication Keimyung University Tel:
Manajemen Jaringan, Sukiswo ST, MT 1 Network Monitoring Sukiswo
Manajemen Jaringan, Sukiswo ST, MT 1 Remote Network Monitoring (RMON) Sukiswo
Manajemen Jaringan, Sukiswo ST, MT 1 OSI Management Framework: Overview Sukiswo
Basic Edge Core switch Training for Summit Communication.
Jaringan Telekomunikasi, Sukiswo ST, MT Sukiswo
Cryptography and Network Security
OSI Management Information
Simple Network Management Protocol (SNMP)
Chapter 19: Network Management
Network Security Presented by: JAISURYA BANERJEA MBA, 2ND Semester.
Security
By Oscar Suciadi CS 157B Prof. Sin-Min Lee
Security Shmuel Wimer prepared and instructed by
Introduction to Internet Network Management
Top-Down Network Design Chapter Nine Developing Network Management Strategies Copyright 2010 Cisco Press & Priscilla Oppenheimer.
Virtual LANs.
By Oscar Suciadi CS 157B Prof. Sin-Min Lee
– Chapter 3 – Device Security (B)
Chapter 8: Monitoring the Network
Process Description and Control
DATABASE SECURITY For CSCL (BIM).
By Oscar Suciadi CS 157B Prof. Sin-Min Lee
Security network management
Introduction to Cryptography
Cryptography and Network Security
Security Attacks Network Security.
Top-Down Network Design Chapter Nine Developing Network Management Strategies Copyright 2010 Cisco Press & Priscilla Oppenheimer.
Standards, Models and Language
Presentation transcript:

Manajemen Jaringan, Sukiswo ST, MT 1 Network Control Sukiswo

2 Table of Contents  Introduction  Configuration Control  Security Control Manajemen Jaringan, Sukiswo ST, MT

3 Introduction  Network control is concerned with modifying parameters in and causing actions to be taken by the end systems, intermediate systems, and subnetworks that make up the network to be managed  All five functional areas of NM involve monitoring and control but configuration and security are more concerned with control  Issues in network control –what to control? define what is to be controlled –how to control? how to cause actions to be performed Manajemen Jaringan, Sukiswo ST, MT

4 Configuration Management 1. Define Configuration Information 2. Configuration Monitoring –Examine values and relationships –Report on configuration status 3. Configuration Control may be required as a result of monitoring or event reports –Initialize and terminate network operations –Set and modify attribute values –Define and modify relationships Manajemen Jaringan, Sukiswo ST, MT

5 Define Configuration Information  Includes the nature and status of managed resources –specification and attributes of resources  Network Resources –physical resources end systems, routers, bridges, switches, modems, etc. –logical resources TCP connections, timers, counters, virtual circuits, etc.  Attributes –name, address, ID number, states, operational characteristics, # of connections, etc.  Control function should be able to –define new classes and attributes (mostly done off-line) –define the type and range of attribute values Manajemen Jaringan, Sukiswo ST, MT

6 Set and Modify Attribute Values  when requesting agents to perform set and modify –the manager must be authorized –some attributes cannot be modified (e.g., # of physical ports)  Modification categories –MIB update only does not require the agent to perform any other action e.g., update of static configuration information –MIB update plus resource modification requires the agent to modify the resource itself e.g., changing the state of a physical port to “disabled” –MIB update plus action perform actions as a side effect of set operation SNMP takes this approach Manajemen Jaringan, Sukiswo ST, MT

7 Define and Modify Relationships  a relationship describes an association, connection, or condition that exists between network resources –topology –hierarchy –containment –physical or logical connections –management domain  Configuration control should allow on-line modification of resources without taking all or part of network down Manajemen Jaringan, Sukiswo ST, MT

8 Security Management  What should be secured in networks? –information security –computer security –network security  Security Requirements –Secrecy making information accessible to only authorized users includes the hiding of the existence of information –Integrity making information modifiable to only authorized users –Availability making resources available to only authorized users Manajemen Jaringan, Sukiswo ST, MT

9 Security Threats  Interruption –destroyed or becomes unavailable or unusable –threat to “availability”  Interception –an unauthorized party gains access –threat to “secrecy”  Modification –an unauthorized party makes modification –threat to “integrity”  Fabrication –an unauthorized party inserts false information  Masquerade –an entity pretends to be a different entity Manajemen Jaringan, Sukiswo ST, MT

10 Types of Security Threats Information source information destination (a) Normal flow (b) Interruption (c) Interception (d) Modification (e) Fabrication Manajemen Jaringan, Sukiswo ST, MT

11 Security Threats and Network Assets.... Data Communication Lines hardware Software Masquerade Modification Interception (capture, analysis) Interruption (loss) Masquerade Modification Interception (capture, analysis) Interruption (loss) Modification Interception Interruption (deletion) Interruption (theft, denial of service) Manajemen Jaringan, Sukiswo ST, MT

12 Security Management Functions  Maintain Security Information –event logging, monitoring usage of security-related resources –receiving notification and reporting security violations –maintaining and examining security logs –maintaining backup copies of security-related files  Control Resource Access Service –use access control (authentication and authorization) security codes (e.g., passwords) routing tables, accounting tables, etc.  Control the Encryption Process –must be able to encrypt messages between managers & agents –specify encryption algorithms Manajemen Jaringan, Sukiswo ST, MT

13 Summary  Network control is concerned with setting and changing parameters of various parts of network resources as consequences of network monitoring and analysis  Configuration control and security control are two essential aspects of network control  READ Chapter 3 of Textbook Manajemen Jaringan, Sukiswo ST, MT