Current Network Schema Router Internet Switch PC.

Slides:



Advertisements
Similar presentations
Barracuda Link Balancer Link Reliability and Bandwidth Optimization.
Advertisements

Description Competency standards Duration Learning Learning methods Show visual Learning Managemen System on Moodle Offline Show visual Learning Managemen.
By the end of this section, you will know and understand the hardware and software involved in making a LAN!
Network Security Essentials Chapter 11
Firewalls By Tahaei Fall What is a firewall? a choke point of control and monitoring interconnects networks with differing trust imposes restrictions.
Guide to Network Defense and Countermeasures Second Edition
What to expect.  Linux  Windows Server (2008 or 2012)
Access Control Chapter 3 Part 5 Pages 248 to 252.
IT security Are you protected against hackers?. Why are we in danger?  The Internet is worldwide, publicly accessible  More and more companies and institutes.
Group member: WET Xu Peiwen WET Zulifeiya.Julaiti WET Lum Ken Iu WET Wee See Yee.
Presented by C.SARITHA ( 07R91A0568) INTRUSION DETECTION SYSYTEM.
Lecture 1 Overview: roadmap 1.1 What is computer network? the Internet? 1.2 Network edge  end systems, access networks, links 1.3 Network core  network.
Firewalls Presented By Hareesh Pattipati. Outline Introduction Firewall Environments Type of Firewalls Future of Firewalls Conclusion.
Guide to Computer Network Security
Firewall 2 * Essential Network Security Book Slides. IT352 | Network Security |Najwa AlGhamdi 1.
Network Diagram with International Standard
Let’s Get Set Up By Michael Crawford. Situation at Hand Basic Needs ◦ Budget of $25-50,000 ◦ Connection to an ISP to access internet Security ◦ Network.
Faten Yahya Ismael.  It is technology creates a network that is physically public, but virtually it’s private.  A virtual private network (VPN) is a.
Mitsubishi MotorsCebu Corporation Threaded Case Study-Local Area Network.
Presented by INTRUSION DETECTION SYSYTEM. CONTENT Basically this presentation contains, What is TripWire? How does TripWire work? Where is TripWire used?
Firewalls CS158B Don Tran. What is a Firewall? A firewall can be a program or a device that controls access to a network.
And how they are used. Hubs send data to all of the devices that are plugged into them. They have no ability to send packets to the correct ports. Cost~$35.
Internet Service Provisioning Phase - I August 29, 2003 TSPT Web:
Why do we need Firewalls? Internet connectivity is a must for most people and organizations  especially for me But a convenient Internet connectivity.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 ISP Responsibility Working at a Small-to-Medium Business or ISP – Chapter.
ESubnet Enterprises Inc. Richard Danielli, eSubnet Higher sales volumes through high network availability INTIX 2010.
Chapter 6 of the Executive Guide manual Technology.
Module 11: Remote Access Fundamentals
Firewalls Nathan Long Computer Science 481. What is a firewall? A firewall is a system or group of systems that enforces an access control policy between.
All the components of network are connected to the central device called “hub” which may be a hub, a router or a switch. There is no direct traffic between.
Networks.
Internet (THEnet ISP Gateway) Home PC Home Laptop Wireless AP/RouterVPN Concentrator Firewall Hub (running WireShark for Monitoring) Work Server Work PCs.
Cisco 3 - Switch Perrine. J Page 111/6/2015 Chapter 5 At which layer of the 3-layer design component would users with common interests be grouped? 1.Access.
Module 5: Designing Security for Internal Networks.
NETWORKING COMPONENTS Buddy Steele Assignment 3, Part 1 CECS-5460: Summer 2014.
Network Security & Accounting
Lesson 19-E-Commerce Security Needs. Overview Understand e-commerce services. Understand the importance of availability. Implement client-side security.
INTRUSION DETECTION SYSYTEM. CONTENT Basically this presentation contains, What is TripWire? How does TripWire work? Where is TripWire used? Tripwire.
Module 12: Responding to Security Incidents. Overview Introduction to Auditing and Incident Response Designing an Audit Policy Designing an Incident Response.
Business IT Applications- A Simplified Integrated Overview IT For Managers Farhan Mahboob.
Venus Project Brief Description. What It Do What Monitor Log Analyze Block Narrow Report Search Where Single stations Internet Gates Special Devices Web.
Cable Last Update Copyright Kenneth M. Chipps Ph.D. 1.
Networking Components Quick Guide. Hubs Device that splits a network connection into multiple computers Data is transmitted to all devices attached Computers.
Introduction to Networking. What is a Network? Discuss in groups.
Also known as hardware/physi cal address Customer Computer (Client) Internet Service Provider (ISP) MAC Address Each Computer has: Given by NIC card.
Chapter 26: Network Security Dr. Wayne Summers Department of Computer Science Columbus State University
Network and Server Basics. Learning Objectives After viewing this presentation, you will be able to: Understand the benefits of a client/server network.
Lecture 19 Page 1 CS 236 Online 6. Application Software Security Why it’s important: –Security flaws in applications are increasingly the attacker’s entry.
START. A room full of computers Two or more computers connected together in order to communicate A computer that can communicate with every living thing.
WHAT’S A WIRELESS AP? AND WHY DO I NEED ONE? Network Components & How They Work.
Defining Network Infrastructure and Network Security Lesson 8.
Importance of IT security ->protects data ->ensures authentication and confidentiality ->preevents data theft.
أمن المعلومات لـ أ. عبدالرحمن محجوب حمد mtc.edu.sd أمن المعلومات Information Security أمن المعلومات Information Security  أ. عبدالرحمن محجوب  Lec (5)
Top 5 Open Source Firewall Software for Linux User
Port Knocking Benjamin DiYanni.
Network Security Analysis Name : Waleed Al-Rumaih ID :
Network Security Marshall Leitem 11/30/04
Threats to computers Andrew Cormack UKERNA.
Introduction to Computers
Introduction to Networking
Security in Networking
IS4550 Security Policies and Implementation
Guide to Computer Network Security
LAN Network Interactions
Chapter 26: Network Security
Intrusion detection systems?
Firewalls Routers, Switches, Hubs VPNs
Unit 36: Internet Server Management
Assignment 2: Activity 2 Produce a written report to explain how software utilities can improve the performance of Computer Systems. Select 3-4 utilities.
6. Application Software Security
Presentation transcript:

Current Network Schema Router Internet Switch PC

Pros Cons Simpler No control over Traffic Low Security Practical Examples A user can take all the bandwidth Employees can Access anything Intruders have high privilege on the network. Security depends on many machines If something fails it’s simpler to find the problem as there are less layers involved. No way to detect an attacker A virus in a customer computer can endanger the whole network.

Current Network Schema Router Internet PC Switch PC Switch Corporate Network ISP Network to BTC Customers Network

Final result benefits among others Every network can have a group of privileges defined that can only be modified from the server. Every network will be locked on it’s own space but yet with access to what is defined as their right of access. Security policies regarding the internet access and speed of each network can be applied easily. A security problem in one network will not affect any other.

Cost and timing ItemCost (Euros) Server€290 Switch€80 Other network tools€78 DMZ service (Firewall) + RAID€280 (Optional) Samba Server€300 (Optional) Navigation monitoring service; Proxy€260 Total exc VAT€1288 VAT€ Total€ Green-labor Blue-Hardware