ACM 511 Introduction to Computer Networks. Computer Networks.

Slides:



Advertisements
Similar presentations
Security by Design A Prequel for COMPSCI 702. Perspective “Any fool can know. The point is to understand.” - Albert Einstein “Sometimes it's not enough.
Advertisements

© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 1: Exploring the Network Network Basics.
Internet, Intranet and Extranets
2 An Overview of Telecommunications and Networks Telecommunications: the _________ transmission of signals for communications (home net) (home net)
Security+ Guide to Network Security Fundamentals
Client/Server Computing Model of computing in which very powerful personal computers (clients) are connected in a network with one or more server computers.
Introduction to Computer Network and Data Communication Widyawan.
Network Fundamentals Chapter 1 Modified by Profs. Chen and Cappellino
Living in a Network-Centric World
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 1: Exploring the Network Introduction to Networks.
Security Overview. 2 Objectives Understand network security Understand security threat trends and their ramifications Understand the goals of network.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 1: Exploring the Network Introduction to Networks.
Faten Yahya Ismael.  It is technology creates a network that is physically public, but virtually it’s private.  A virtual private network (VPN) is a.
Virtual Private Network
Alter – Information Systems 4th ed. © 2002 Prentice Hall 1 E-Business Security.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 1: Exploring the Network Introduction to Networks.
Networks and Security. Types of Attacks/Security Issues  Malware  Viruses  Worms  Trojan Horse  Rootkit  Phishing  Spyware  Denial of Service.
ISNE101 Dr. Ken Cosh Week 14. This Week  Challenges (still) facing Modern IS  Reliability  Security.
The generation, storage, and movement of information are central to managing an enterprise’s business processes As a result, businesses must ensure.
The Internet, Intranets, & Extranets Chapter 7. IS for Management2 The Internet (1) A collection of networks that pass data around in packets, each of.
Chapter 4 Computer Networks – Part 1
COMP 6005 An Introduction To Computing Session Four: Internetworking and the World Wide Web.
Version 4.0. Objectives Describe how networks impact our daily lives. Describe the role of data networking in the human network. Identify the key components.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 1: Exploring the Network Introduction to Networks.
CH2 System models.
Exploring the Network.
Center of Excellence for IT at Bellevue College. Cyber security and information assurance refer to measures for protecting computer systems, networks,
Protecting Internet Communications: Encryption  Encryption: Process of transforming plain text or data into cipher text that cannot be read by anyone.
Types of Electronic Infection
Network Security Introduction Light stuff – examples with Alice, Bob and Trudy Serious stuff - Security attacks, mechanisms and services.
1 Overview Remember, we are just beginning to herd the cats. Much of this will become clearer LATER! The more we learn, the more all of this will come.
思科网络技术学院理事会. 1 Living in a Network Centric World Network Fundamentals – Chapter 1.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Living in a Network Centric World Network Fundamentals – Chapter 1.
1 Network and E-commerce Security Nungky Awang Chandra Fasilkom Mercu Buana University.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Living in a Network Centric World Network Fundamentals – Chapter 1.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Living in a Network Centric World Network Fundamentals – Chapter 1.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Living in a Network Centric World Network Fundamentals – Chapter 1.
IClicker Questions CNIT 201E Last revised
Chapter 1. Ch 1 Goals In this chapter, you will learn to: Describe how networks impact our daily lives. Describe the role of data networking in the human.
Network Security Introduction
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Living in a Network Centric World Network Fundamentals – Chapter 1.
Network Security Celia Li Computer Science and Engineering York University.
Version 4.0 Living in a Network Centric World Network Fundamentals – Chapter 1.
1 Network Security Maaz bin ahmad.. 2 Outline Attacks, services and mechanisms Security attacks Security services Security Mechanisms A model for Internetwork.
1 © 2007 Cisco Systems, Inc. All rights reserved.Cisco Public Network Architecture Characteristics  Explain four characteristics that are addressed by.
CCNA Exploration v4.0 Network fundamentals CCNA Exploration v4.0 Network fundamentals.
Introduction to Information Security Module 1. Objectives Definitions of information technology and information security Fundamental Security Concepts.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 1: Exploring the Network Introduction to Networks.
LESSON 12 Business Internet. Electronic business, or e-business, is the application of information and communication technologies (ICT) in support of.
CCNA Exploration v4.0 Network fundamentals CCNA Exploration v4.0 Network fundamentals.
Chapter 1: Explore the Network
Computer Roles in a Network
NETWORK SECURITY Cryptography By: Abdulmalik Kohaji.
Controlling Computer-Based Information Systems, Part II
Chapter 5 Electronic Commerce | Security
Living in a Network Centric World
Living in a Network Centric World
Virtual Private Networks (VPN)
Chapter 1: Exploring the Network
Living in a Network Centric World
Living in a Network Centric World
Living in a Network Centric World
Living in a Network Centric World
ONLINE SECURE DATA SERVICE
Living in a Network Centric World
Living in a Network Centric World
Living in a Network Centric World
Topic 12: Virtual Private Networks
Living in a Network Centric World
Presentation transcript:

ACM 511 Introduction to Computer Networks

Computer Networks

Intranet / Extranet Intranets, private networks in use by just one company, enable businesses to communicate and perform transactions among global employee and branch locations. Companies develop extranets, or extended internetworks, to provide suppliers, vendors, and customers limited access to corporate data to check order status, inventory, and parts lists.

Communication Before beginning to communicate with each other, we establish rules or agreements to govern the conversation. These rules, or protocols, must be followed in order for the message to be successfully delivered and understood. Among the protocols that govern successful human communication are: Before beginning to communicate with each other, we establish rules or agreements to govern the conversation. These rules, or protocols, must be followed in order for the message to be successfully delivered and understood. Among the protocols that govern successful human communication are: An identified sender and receiver An identified sender and receiver Agreed upon method of communicating (face-to-face, telephone, letter, photograph) Agreed upon method of communicating (face-to-face, telephone, letter, photograph) Common language and grammar Common language and grammar Speed and timing of delivery Speed and timing of delivery Confirmation or acknowledgement requirements Confirmation or acknowledgement requirements

Communication

External Factors The external factors affecting communication are related to the complexity of the network and the number of devices a message must pass through on its route to its final destination. External factors affecting the success of communication include: The external factors affecting communication are related to the complexity of the network and the number of devices a message must pass through on its route to its final destination. External factors affecting the success of communication include: The quality of the pathway between the sender and the recipient The number of times the message has to change form The number of times the message has to be redirected or readdressed The number of other messages being transmitted simultaneously on the communication network The amount of time allotted for successful communication

Common Data Network Symbols

Internal Factors Internal factors affecting the successful communication across the network include: Internal factors affecting the successful communication across the network include: The size of the message The complexity of the message The importance of the message Three important terms: Three important terms:BandwidthCongestionDelay

Network Connections

Service/Protocol

Transferring Data

Multiple Networks

Converged Networks

Fault Tolerance

Scalability

Quality of Service

Security

Circuit Switching

Packet Switching

Internet Structure

Convergence

Queues

Quality of Service

Time-sensitive communication - increase priority for services like telephony or video distribution. Non time-sensitive communication - decrease priority for web page retrieval or . High importance to organization - increase priority for production control or business transaction data. Undesirable communication - decrease priority or block unwanted activity, like peer-to-peer file sharing or live entertainment.

Confidentiality Ensuring Confidentiality Ensuring Confidentiality Data privacy is maintained by allowing only the intended and authorized recipients - individuals, processes, or devices - to read the data. Data privacy is maintained by allowing only the intended and authorized recipients - individuals, processes, or devices - to read the data. Having a strong system for user authentication, enforcing passwords that are difficult to guess, and requiring users to change them frequently helps restrict access to communications and to data stored on network attached devices. Where appropriate, encrypting content ensures confidentiality and minimizes unauthorized disclosure or theft of information. Having a strong system for user authentication, enforcing passwords that are difficult to guess, and requiring users to change them frequently helps restrict access to communications and to data stored on network attached devices. Where appropriate, encrypting content ensures confidentiality and minimizes unauthorized disclosure or theft of information.

Communication Integrity Maintaining Communication Integrity Maintaining Communication Integrity Data integrity means having the assurance that the information has not been altered in transmission, from origin to destination. Data integrity can be compromised when information has been corrupted - wilfully or accidentally - before the intended recipient receives it. Data integrity means having the assurance that the information has not been altered in transmission, from origin to destination. Data integrity can be compromised when information has been corrupted - wilfully or accidentally - before the intended recipient receives it. Source integrity is the assurance that the identity of the sender has been validated. Source integrity is compromised when a user or device fakes its identity and supplies incorrect information. Source integrity is the assurance that the identity of the sender has been validated. Source integrity is compromised when a user or device fakes its identity and supplies incorrect information. The use of digital signatures, hashing algorithms and checksum mechanisms are ways to provide source and data integrity across a network to prevent unauthorized modification of information.

Availability Ensuring Availability Ensuring Availability Ensuring confidentiality and integrity are irrelevant if network resources become over burdened, or not available at all. Availability means having the assurance of timely and reliable access to data services for authorized users. Resources can be unavailable during a Denial of Service (DoS) attack or due to the spread of a computer virus. Network firewall devices, along with desktop and server anti-virus software can ensure system reliability and the robustness to detect, repel, and cope with such attacks. Building fully redundant network infrastructures, with few single points of failure, can reduce the impact of these threats.

Book

Contents