Introduction. Contents  Network Management Overview Sample Scenario where NM is Applied 5 Management Functions Importance to Business Processes  Network.

Slides:



Advertisements
Similar presentations
Encrypting Wireless Data with VPN Techniques
Advertisements

Network Security.
Cryptography and Network Security 2 nd Edition by William Stallings Note: Lecture slides by Lawrie Brown and Henric Johnson, Modified by Andrew Yang.
CMSC 414 Computer and Network Security Lecture 26 Jonathan Katz.
BASIC CRYPTOGRAPHY CONCEPT. Secure Socket Layer (SSL)  SSL was first used by Netscape.  To ensure security of data sent through HTTP, LDAP or POP3.
CHAPTER 8: SECURITY IN COMPUTER NETWORKS Encryption Encryption Authentication Authentication Security Security Secure Sockets Layer Secure.
Computer and Network Security Mini Lecture by Milica Barjaktarovic.
Issues of Security and Privacy in Networking in the CBA Karen Sollins Laboratory for Computer Science July 17, 2002.
Cryptography and Authentication Lab ECE4112 Group4 Joel Davis Scott Allen Quinn.
1 © NOKIA Presentation_Name.PPT / DD-MM-YYYY / Initials Company Confidential The Internet offers no inherent security services to its users; the data transmitted.
1 Cryptography and Network Security Third Edition by William Stallings Lecturer: Dr. Saleem Al_Zoubi.
TCP/IP Protocol Suite 1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 30 Internet Security.
Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
Applied Cryptography for Network Security
Cryptography and Network Security Chapter 1. Chapter 1 – Introduction The art of war teaches us to rely not on the likelihood of the enemy's not coming,
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Cryptography and Network Security Chapter 1 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
Seguridad en Sistemas de Información Francisco Rodríguez Henríquez SSL/TLS: An Introduction.
 An electrical device that sends or receives radio or television signals through electromagnetic waves.
Dr. Lo’ai Tawalbeh 2007 INCS 741: Cryptography Chapter 1:Introduction Dr. Lo’ai Tawalbeh New York Institute of Technology (NYIT) Jordan’s Campus
32.1 Chapter 32 Security in the Internet: IPSec, SSL/TLS, PGP, VPN, and Firewalls Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction.
Cryptography and Network Security
Eng. Wafaa Kanakri Second Semester 1435 CRYPTOGRAPHY & NETWORK SECURITY Chapter 1:Introduction Eng. Wafaa Kanakri UMM AL-QURA UNIVERSITY
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
Lesson 20-Wireless Security. Overview Introduction to wireless networks. Understanding current wireless technology. Understanding wireless security issues.
Network protocols
Network Security by Behzad Akbari Spring 2012 In the Name of the Most High.
SECURING Presented by: Digvijay Singh Dudi Graduate Student Old Dominion University.
Module 11: Remote Access Fundamentals
©The McGraw-Hill Companies, Inc., 2000© Adapted for use at JMU by Mohamed Aboutabl, 2003Mohamed Aboutabl1 1 Chapter 29 Internet Security.
McGraw-Hill © ©The McGraw-Hill Companies, Inc., 2004 Chapter 31 Security Protocols in the Internet.
NETWORK SECURITY USING IPTABLES. TOPICS OF DISCUSSION NETWORK TRAFFIC IN PRESENT SCENARIO !! WHY WE NEED SECURITY ? T TYPE OF ATTACKS & WAYS TO TACKLE.
Internet Security. 2 PGP is a security technology which allows us to send that is authenticated and/or encrypted. Authentication confirms the identity.
Cryptography and Network Security (CS435) Part One (Introduction)
Doc.: IEEE /063 Submission May 2000 Y. Kuchiki, M. Ikeda Seiko Epson Corp. Slide 1 Yutaku Kuchiki, Masayuki Ikeda Seiko Epson Corporation May.
IP Security. P R E S E N T E D B Y ::: Semester : 8 ::: Year : 2009 Naeem Riaz Maria Shakeel Aqsa Nizam.
McLean HIGHER COMPUTER NETWORKING Lesson 8 E-Commerce Explanation of ISP Description of E-commerce Description of E-sales.
SmartReport Backend Reporting Tool © 2003 ITC Software
1 Chapter 1 – Background Computer Security T/ Tyseer Alsamany - Computer Security.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 Chapter 29 Internet Security.
Topic 1 – Introduction Huiqun Yu Information Security Principles & Applications.
Virtual Private Network. VPN In the most basic definition, VPN is a connection which allows 2 computers or networks to communicate with each other across.
ICC Module 3 Lesson 5 – IT Security 1 / 4 © 2015 Ph. Janson Information, Computing & Communication Security – Clip 0 – Introduction School of Computer.
1 CDA 4527 Computer Networking Prof. Cliff Zou School of Computer Science University of Central Florida Fall 2005.
INFORMATION SECURITY MANAGEMENT P ROTECTION M ECHANISMS - C RYPTOGRAPHY.
Security in many layers  Application Layer –  Transport Layer - Secure Socket Layer  Network Layer – IPsec (VPN)  Link Layer – Wireless Communication.
Understand Internet Security LESSON Security Fundamentals.
Network management Network management refers to the activities, methods, procedures, and tools that pertain to the operation, administration, maintenance,
Cryptography and Network Security Chapter 1. Background  Information Security requirements have changed in recent times  traditionally provided by physical.
1 Network Security: Introduction Behzad Akbari Fall 2009 In the Name of the Most High.
Privacy and Security Topics From Greenlaw/Hepp, In-line/On-line: Fundamentals of the Internet and the World Wide Web 1 Introduction Known Information Software.
INFORMATION SECURITY MANAGEMENT P ROTECTION M ECHANISMS - C RYPTOGRAPHY.
By Marwan Al-Namari & Hafezah Ben Othman Author: William Stallings College of Computer Science at Al-Qunfudah Umm Al-Qura University, KSA, Makkah 1.
Securing Access to Data Using IPsec Josh Jones Cosc352.
IP Security (IPSec) Matt Hermanson. What is IPSec? It is an extension to the Internet Protocol (IP) suite that creates an encrypted and secure conversation.
Encryption and Security Tools for IA Management Nick Hornick COSC 481 Spring 2007.
1 Network Security Maaz bin ahmad.. 2 Outline Attacks, services and mechanisms Security attacks Security services Security Mechanisms A model for Internetwork.
TECHNOLOGY GUIDE THREE
IT 242 PAPER Success Secrets/ it242paper.com
IT443 – Network Security Administration Instructor: Bo Sheng
Securing the Network Perimeter with ISA 2004
Virtual Private Networks (VPN)
Algorithms for Big Data Delivery over the Internet of Things
Security Protocols in the Internet
Introduction to the course
Security in the Internet: IPSec, SSL/TLS, PGP, VPN, and Firewalls
CT 1306 Communication Networks Management Lab
Unit 8 Network Security.
Cryptography and Network Security
Presentation transcript:

Introduction

Contents  Network Management Overview Sample Scenario where NM is Applied 5 Management Functions Importance to Business Processes  Network Security Overview Some Secure Systems

Network Management Overview  Network Management refers to the activities, methods, procedures, and tools that pertain to the operation, administration, maintenance, and provisioning of networked systems. Operation - keeping the network up and running smoothly. It includes monitoring the network to spot problems as soon as possible, ideally before users are affected. Administration - keeping track of resources in the network and how they are assigned. Maintenance - performing repairs and upgrades Provisioning - is concerned with configuring resources in the network to support a given service. For example, this might include setting up the network so that a new customer can receive voice service.

Network Management Sample Scenario : Distributed Data Storage (DDS)

Network Management 5 OSI Network Management Functions  1. Fault management  2. Configuration management  3. Accounting management  4. Performance management  5. Security management

Network Management Importance to Business Processes  They relate to the levels of network, system, and application management. More and more importance is being attached to network systems and their management because competition is increasingly being based on the processing and exchange of information—often in place of real values or things (e.g., the stock market, money transfer, ordering goods, along with simulation and virtual reality) Many companies are in the process of using “business engineering” to adapt their business processes to this information-based competition.

Network Security Overview  Computer networks are typically a shared resource used by many applications representing different interests. The Internet is particularly widely shared, being used by competing businesses, mutually antagonistic governments, and opportunistic criminals. Unless security measures are taken, a network conversation or a distributed application may be compromised by an adversary.  The Main tools for Network Security are Cryptography and Firewalls.

Network Security Secure Systems  Pretty Good Privacy (PGP)  Secure Shell (SSH)  Transport Layer Security (TLS, SSL, HTTPS)  IP Security (IPsec)  Wireless Security (802.11i) Most, if not all, of these Systems use Cryptographic Algorithms, Key Pre-Distribution Mechanisms, and Authentication Protocols.

Assignment  ½ Yellow Paper Why (in your own opinion) is Network Management and Security important to Businesses? What are the 7 OSI Layers? Give a brief description of Each What is the average salary range of Network/System Administrators in USD?