Teaching material accompanying chapter 2.1, 2.2 and 2.3 of Enterprise Knowledge Infrastructures Networking and security.

Slides:



Advertisements
Similar presentations
Introduction to TCP/IP
Advertisements

Topic 8: Secure communication in mobile devices. Choice of secure communication protocols, leveraging SSL for remote authentication and using HTTPS for.
BASIC CRYPTOGRAPHY CONCEPT. Secure Socket Layer (SSL)  SSL was first used by Netscape.  To ensure security of data sent through HTTP, LDAP or POP3.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Communicating over the Network Network Fundamentals – Chapter 2.
IS Network and Telecommunications Risks
Linux+ Guide to Linux Certification, Second Edition Chapter 14 Network Configuration.
Shalini Bhavanam. Key words: Basic Definitions Classification of Networks Types of networks Network Topologies Network Models.
99 CHAPTER COMMUNICATIONS AND NETWORKS. © 2005 The McGraw-Hill Companies, Inc. All Rights Reserved. 9-2 Competencies Discuss connectivity, the wireless.
Lesson 7 – THE BUSINESS OF NETWORKING. TCP/IP and UDP Other Internet protocols Important Internet protocols OVERVIEW.
04/26/2004CSCI 315 Operating Systems Design1 Computer Networks.
Bob Baker Communications Bob Baker September 1999.
Review on Networking Technologies Linda Wu (CMPT )
Telecommunication and Networks
Defining Network Protocols Application Protocols –Application Layer –Presentation Layer –Session Layer Transport Protocols –Transport Layer Network Protocols.
1 Networking A computer network is a collection of computing devices that are connected in various ways in order to communicate and share resources. The.
15-1 Networking Computer network A collection of computing devices that are connected in various ways in order to communicate and share resources Usually,
Lecture slides prepared for “Business Data Communications”, 7/e, by William Stallings and Tom Case, Chapter 8 “TCP/IP”.
1 Protocol Interaction (ISO’s Open Systems Interconnection (OSI model)) the 7 layers.
Overview, Circuit & Packet Switching, Addressing
OSI Model Routing Connection-oriented/Connectionless Network Services.
LAN Review. What is a Network? A group of computers and devices connected together for the purpose of sharing resources and services.
Module 4 - Networking MIS5122: Enterprise Architecture for the IT Auditor.
Forensic and Investigative Accounting
SYSTEM ADMINISTRATION Chapter 13 Security Protocols.
Chapter 5 Networks Communicating and Sharing Resources
© Paradigm Publishing Inc. 6-1 Chapter 6 Telecommunications and Networks.
Networks and Telecommunications
CHAPTER 2 PCs on the Internet Suraya Alias. The TCP/IP Suite of Protocols Internet applications – client/server applications The client requested data.
Lesson 24. Protocols and the OSI Model. Objectives At the end of this Presentation, you will be able to:
Networks A network is a collection of computers and devices connected together via communications devices and transmission media Advantages of a network.
Networks LANS,. FastPoll True Questions Answer A for True and B for False A wireless infrastructure network uses a centralized broadcasting device, such.
Networking Computer network A collection of computing devices that are connected in various ways in order to communicate and share resources Usually,
Network Protocols. Why Protocols?  Rules and procedures to govern communication Some for transferring data Some for transferring data Some for route.
Securing Data at the Application Layer Planning Authenticity and Integrity of Transmitted Data Planning Encryption of Transmitted Data.
Chapter 4 Computer Networks – Part 1
Networked Information Systems 1 Advantages of and classified by their size & architecture or design.
E-Commerce Security Technologies : Theft of credit card numbers Denial of service attacks (System not availability ) Consumer privacy (Confidentiality.
Chapter 4 Networking and the Internet © 2007 Pearson Addison-Wesley. All rights reserved.
NETWORKS.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Network Services Networking for Home and Small Businesses – Chapter 6.
Forensic and Investigative Accounting Chapter 14 Internet Forensics Analysis: Profiling the Cybercriminal © 2005, CCH INCORPORATED 4025 W. Peterson Ave.
Component 9 – Networking and Health Information Exchange Unit 1-1 ISO Open Systems Interconnection (OSI) This material was developed by Duke University,
Linux+ Guide to Linux Certification, Second Edition Chapter 14 Network Configuration.
The Internet Just the Facts. Protocols TCP/IP are the TRANSPORT protocols of the Internet Services use TCP/IP to connect to other computers on Internet.
CHAPTER 2 PCs on the Internet Suraya Alias. The TCP/IP Suite of Protocols Internet applications – client/server applications ◦The client requested data.
1 CHAPTER 8 TELECOMMUNICATIONSANDNETWORKS. 2 TELECOMMUNICATIONS Telecommunications: Communication of all types of information, including digital data,
Internet Security. 2 PGP is a security technology which allows us to send that is authenticated and/or encrypted. Authentication confirms the identity.
NSH0503/01/11041 Overview Computer Network Technology By Diyurman Gea.
1 Security Protocols in the Internet Source: Chapter 31 Data Communications & Networking Forouzan Third Edition.
OS Services And Networking Support Juan Wang Qi Pan Department of Computer Science Southeastern University August 1999.
William Stallings Data and Computer Communications
TCP/IP (Transmission Control Protocol / Internet Protocol)
1 Chapter Overview Network Communications The OSI Reference Model.
1 Chapter Overview Network Communications The OSI Reference Model.
Group 9 Chapter 8.3 – 8.6. Public Key Algorithms  Symmetric Key Algorithms face an inherent problem  Keys must be distributed to all parties but kept.
Communications and Networks Chapter 9 9-1Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved.
Lecture 6 Networked Systems Network Operating Systems Introduction to Sockets HTTP – FTP – TCP - UDP Client-Server Model.
ISDS 4120 Project 1 DWAYNE CARRAL JR 3/27/15. There are seven layers which make up the OSI (Open Systems Interconnection Model) which is the model for.
Mr C Johnston ICT Teacher G055 - Lecture 10 Network Protocols.
Lesson 7 Networks Unit 1—Computer Basics. Computer Concepts BASICS - 2 Objectives Describe the benefits and disadvantages of networks. List and describe.
The OSI Model. Understanding the OSI Model In early 1980s, manufacturers began to standardize networking so that networks from different manufacturers.
Win Phillips, Ph.D Win Phillips, Ph.D. Clinical Assistant Professor University of Missouri Columbia, MO.
Chapter Objectives In this chapter, you will learn:
Networking Using the OSI Model.
Chapter 5 Network Security Protocols in Practice Part I
Level 2 Diploma Unit 10 Setting up an IT Network
Computing Over Distance
Slides for Chapter 3: Networking and Internetworking
Objectives: 1.Identify different internet protocol (IP) 2.Configure sample of IP address 3.Appreciate and relate protocol in our life.
Presentation transcript:

Teaching material accompanying chapter 2.1, 2.2 and 2.3 of Enterprise Knowledge Infrastructures Networking and security

Ronald Maier, Thomas Hädrich, René Peinl Martin-Luther-University Halle-Wittenberg Classification of networks physical – according to the medium used (fiber, copper, radio, light) structural - according to the topology (ring, bus, star) geographic - according to the reach (PAN, LAN, MAN, WAN) organizational - according to the network owner: public vs. private (Internet, company networks, value added networks) user driven - according to the user group: Intranet, Extranet, Internet conceptual - according to the transmission algorithms (ATM, Token Ring, Ethernet) functional - according to the function/target group: end-user - front-end, server - back-end, network – backbone performance – according to bandwidth: low (e.g., up to 1 MBit/s), medium (e.g., up to 1 GBit/s), high speed (e.g., > 1 GBit/s) source: Maier, Hädrich, Peinl: Enterprise Knowledge Infrastructures, p. 84

Ronald Maier, Thomas Hädrich, René Peinl Martin-Luther-University Halle-Wittenberg Network topologies I Peer-to-peer networks: there are separate transmission ways between data stations; single network nodes receive messages and forward them in case that they are not the final recipient –star network –loop network –tree network –mesh network source: Maier, Hädrich, Peinl: Enterprise Knowledge Infrastructures, p. 87

Ronald Maier, Thomas Hädrich, René Peinl Martin-Luther-University Halle-Wittenberg Network topologies II Broadcast networks: all nodes are connected to the same physical transmission medium. Each node has access to every message –bus network –ring network source: Maier, Hädrich, Peinl: Enterprise Knowledge Infrastructures, p. 86

Ronald Maier, Thomas Hädrich, René Peinl Martin-Luther-University Halle-Wittenberg Network classes interprocessor distance location examples, network for 1mwork place 10 mconference room 100 mcompany building 1 kmuniversity campus 10 kmcity 100 kmcountry kmcontinent kmplanet personal area network (PAN) local area network (LAN) metropolitan area network (MAN) wide area network (WAN) the Internet source: Maier, Hädrich, Peinl: Enterprise Knowledge Infrastructures, p. 87

Ronald Maier, Thomas Hädrich, René Peinl Martin-Luther-University Halle-Wittenberg ISO OSI layered architecture source: Maier, Hädrich, Peinl: Enterprise Knowledge Infrastructures, p. 89

Ronald Maier, Thomas Hädrich, René Peinl Martin-Luther-University Halle-Wittenberg Overview of network standards cable-boundwireless PANUSB, FirewireIrDA, Bluetooth LANEthernet, Token RingWLAN, DECT WANATM, FDDI, X25 FrameRelay, Sonet/SDH GSM, GPRS, EDGE, HSCSD, UMTS source: Maier, Hädrich, Peinl: Enterprise Knowledge Infrastructures, p. 91

Ronald Maier, Thomas Hädrich, René Peinl Martin-Luther-University Halle-Wittenberg Classification of transmission protocols source: Maier, Hädrich, Peinl: Enterprise Knowledge Infrastructures, p. 99

Ronald Maier, Thomas Hädrich, René Peinl Martin-Luther-University Halle-Wittenberg Concrete network protocols and the OSI model source: Maier, Hädrich, Peinl: Enterprise Knowledge Infrastructures, p. 120

Ronald Maier, Thomas Hädrich, René Peinl Martin-Luther-University Halle-Wittenberg Network packets A Packet consists of payload and header Every layer adds an additional header A packet on a higher layer becomes the payload on the next lower layer source: Maier, Hädrich, Peinl: Enterprise Knowledge Infrastructures, p. 104

Ronald Maier, Thomas Hädrich, René Peinl Martin-Luther-University Halle-Wittenberg IP protocol (IPv4) –IP address = world-wide unique address to identify a network participant (at least unique for public IP addresses) –Length: 32 Bit (4 octets) –Network classes –finer partition with a subnet mask possible since 1985 –reserved addresses for private use: (10 class A network ranges) (16 class B network ranges) (256 class C network ranges) –localhost Internet layer Class A Class B Class C network addresshost address network mask possible hosts 16,7 million binary decimal

Ronald Maier, Thomas Hädrich, René Peinl Martin-Luther-University Halle-Wittenberg Address translation logical address (DNS): e.g., Internet address (IP): e.g., physical address (MAC): e.g., C-46-C9 ARP DNS MAC = Media Access Control, unique identification of a network card consists of 24 Bit manufacturer number and 24 Bit serial number e.g., AE-FD-7E (or AEFD7E)

Ronald Maier, Thomas Hädrich, René Peinl Martin-Luther-University Halle-Wittenberg Demarcation between Internet, Intranet and Extranet DMZ = DeMilitarized Zone PSTN = Public Switched Telephone Network source: Maier, Hädrich, Peinl: Enterprise Knowledge Infrastructures, p. 120

Ronald Maier, Thomas Hädrich, René Peinl Martin-Luther-University Halle-Wittenberg Requirements for secure communication confidentiality Message is not accessible for third persons authenticity Sender of a message is uniquely identifiable integrity Message has not been changed on its way to the receiver liability Sender cannot deny authorship of the message, receiver cannot deny receipt of the message

Ronald Maier, Thomas Hädrich, René Peinl Martin-Luther-University Halle-Wittenberg Potential security threats Data loss: important data was intentionally deleted or lost by accident Data manipulation: intentionally falsifying documents, e.g., balance sheets or software code Unauthorized access: business secrets get into the hands of third parties Abuse of ressources: hard- or software of a company gets used for improper purposes, e.g., using the company Internet access to download private music files Downtime: infrastructural services that are needed permanently are not available so that financial (e.g., by loosing productive work time) or image damage occurs (e.g., through unavailability of the Web site) Concrete attacks: e.g., denial-of-service, viruses, spam source: Maier, Hädrich, Peinl: Enterprise Knowledge Infrastructures, p. 127ff

Ronald Maier, Thomas Hädrich, René Peinl Martin-Luther-University Halle-Wittenberg Conceptual comparison of PPTP and IP Sec source: Maier, Hädrich, Peinl: Enterprise Knowledge Infrastructures, p. 133ff

Ronald Maier, Thomas Hädrich, René Peinl Martin-Luther-University Halle-Wittenberg Example of asymmetric encryption message public key Bob private key Alice private key Bob public key Alice encryption message signature transmission insecure transmission channel 0&§(1§/=1 message comparison message decryption Alice (sender) Bob (receiver) message is unchanged and sent by Alice

Ronald Maier, Thomas Hädrich, René Peinl Martin-Luther-University Halle-Wittenberg 5 send message HP Example: tasks of a certification authority (CA) Alice (sender) Bob (receiver) 1 apply for a certificate 2 issue certificate 4 write and sign the message 7 verify signature 8 verify certificate 6 download certificate revocation list - …………. 3b put public key on home page 3a put private key into a safe place (key store) certification authority message is unchanged and sent by Alice certificate is valid and not revoked

Ronald Maier, Thomas Hädrich, René Peinl Martin-Luther-University Halle-Wittenberg Message- and channel-encryption To guarantee secure transmission of a message either the message itself or the transmission channel can be encrypted Message encryption with PGP: –Pretty Good Privacy (PGP) is a software program used to encrypt s –Since s are transmitted over several relay stations without establishing an end-to-end connection from sender to receiver only message encryption is applicable –An asymmetric encryption algorithm is used Channel encryption with SSL: –Secure Sockets Layer (SSL) is used to encrypt e.g., HTTP connections (HTTP + SSL = HTTPS) –HTTPS is used widely in the Internet to secure transaction for online banking and online shopping

Ronald Maier, Thomas Hädrich, René Peinl Martin-Luther-University Halle-Wittenberg Abbreviations A-H AES:Advanced Encryption Standard ARP:Address Resolution Protocol ATM:Asynchronous Transfer Mode BAN:Body Area Network DES:Data Encryption Standard DHCP:Dynamic Host Configuration Protocol DNS:Domain Name System DSL:Digital Subscriber Line (symmetric SDSL or asymmetric ADSL) FDDI:Fiber Distributed Data Interface FTP:File Transport Protocol HTML:Hypertext Markup Language Transport Protocol

Ronald Maier, Thomas Hädrich, René Peinl Martin-Luther-University Halle-Wittenberg Abbreviations I-N IMAP: Interactive Mail Access Protocol IP: Internet Protocol IPX: Internetwork Packet Exchange IrDA: Infrared Data Association ISDN: Integrated Service Digital Network ISO: International Standardization Organization LDAP: Lightweight Directory Access Protocol LPD:Line Printer Demon (UNIX) MAC:Media Access Control (-Address) NAT:Network Address Translation NetBEUI: NetBIOS Extended User Interface NetBIOS:Network Basic Input/Output System NIC: Network Interface Card NLSP: NetWare Link Services Protocol (NW Link) NNTP: Network News Transfer Protocol

Ronald Maier, Thomas Hädrich, René Peinl Martin-Luther-University Halle-Wittenberg Abbreviations O-S OSI: Open Systems Interconnection OSPF:Open Shortest Path First Protocol PAN:Personal Area Network POP3: Post Office Protocol version 3 PPP: Point-to-Point Protocol PPTP: Point-to-Point Tunneling Protocol RIP:Routing Information Protocol RSA:Encryption developed by Rivest, Shamir and Adleman SGML: Standard Generalized Markup Language (s)sh: (secure) shell SMB: Server Message Blocks SMTP: Simple Mail Transport Protocol SNMP: Simple Network Management Protocol SPX: Sequenced Packet Exchange SSL:Secure Socket Layer

Ronald Maier, Thomas Hädrich, René Peinl Martin-Luther-University Halle-Wittenberg Abbreviations T-Z TCP: Transport Control Protocol UDP: User Datagram Protocol USB:Universal Serial Bus URL: Uniform Resource Locator WEP:Wireless Encryption Protocol (for WLAN) WPA:Wi-Fi Protected Access WLAN:Wireless LAN WML: Wireless Markup Language XML: eXtensible Markup Language