Chapter 9 Networking & Distributed Security. csci5233 computer security & integrity (Chap. 9) 2 Outline Overview of Networking Threats Wiretapping, impersonation,

Slides:



Advertisements
Similar presentations
Computer Networking (Appendix C) Objectives
Advertisements

IS Network and Telecommunications Risks
Introduction to Networking V.T. Raja, PhD James R. Coakley, PhD BA 572 – Advanced Information Systems.
Shalini Bhavanam. Key words: Basic Definitions Classification of Networks Types of networks Network Topologies Network Models.
1 Chapter 9 Computer Networks. 2 Chapter Topics OSI network layers Network Topology Media access control Addressing and routing Network hardware Network.
Lesson 3 – UNDERSTANDING NETWORKING. Network relationship types Network features OSI Networking model Network hardware components OVERVIEW.
BA 471 – Telecommunications and Networking Dr. V.T. Raja Oregon State University
BA 471 – Telecommunications and Networking Dr. V.T. Raja Oregon State University
04/26/2004CSCI 315 Operating Systems Design1 Computer Networks.
Computer Networks & Security
Computer Networks Eyad Husni Elshami. Computer Network A computer network is a group of interconnected computers to share data resources ( printer, data.
BA Telecommunications and Networking Dr. V.T. Raja Oregon State University
OSI Reference Model An overview. Standards and the internet International Organization for Standardization ISO 70’s.
Network Architecture for Cyberspace
COMPUTER NETWORKS.
Chapter 2 Review of Computer Network Technology
Chapter Threats in Networks Network Security / G. Steffen.
Lecture slides prepared for “Business Data Communications”, 7/e, by William Stallings and Tom Case, Chapter 8 “TCP/IP”.
IP Network Basics. For Internal Use Only ▲ Internal Use Only ▲ Course Objectives Grasp the basic knowledge of network Understand network evolution history.
Laudon & Laudon: Canadian Edition
Telecommunications and Networks Chapter 6 – Understanding Technology (Third Edition)
Networks and Telecommunications Strategies Dr. Robert Chi Chair and Professor, IS department Chief editor, Journal of Electronic Commerce Research.
Chapter 2 The Infrastructure. Copyright © 2003, Addison Wesley Understand the structure & elements As a business student, it is important that you understand.
Chapter 5 Networks Communicating and Sharing Resources
Technology Guide 4 Telecommunication & Internet. Agenda Telecommunication terminology Communication media Network architecture concepts Enterprise networking.
Networks and Telecommunications Strategies Dr. Robert Chi Chair and Professor, IS department Chief editor, Journal of Electronic Commerce Research.
Telecommunications and Networks
NETWORK.
ITED 328 Lecture 4 12 Feb 2004 Loosely covering Chapter 5 Internet and LAN Technology.
Common Devices Used In Computer Networks
Chapter 7 Networking: Computer Connections. Networks n Network - a computer system that uses communications equipment to connect two or more computers.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Connecting to the Network Networking for Home and Small Businesses.
Unit 1—Computer Basics Lesson 7 Networks.
Computers Are Your Future Tenth Edition Chapter 8: Networks: Communicating & Sharing Resources Copyright © 2009 Pearson Education, Inc. Publishing as Prentice.
Communications and Networks Chapter 8. 2 Introduction We live in a truly connected society. Increased connectivity potentially means increased productivity,
By. Shafiq Ahmed Chachar Internet Applications Internet Relay Chat Telnet Search Engines E-Commerce File Transfer Protocol (FTP) Popular Uses of.
NETWORKS.
1 Technology in Action Chapter 12 Behind the Scenes: Networking and Security Copyright © 2010 Pearson Education, Inc. Publishing as Prentice Hall.
Technology Strategies for the Hospitality Industry© 2005 Pearson Education, Inc Nyheim, McFadden, & Connolly Upper Saddle River, New Jersey Networks.
PPTTEST 10/6/ :29 1 IT Ron Williams Business Innovation Through Information Technology Networking.
ICT 6621 : Advanced NetworkingKhaled Mahbub, IICT, BUET, 2008 ICT 6621 Advanced Networking Course Teacher Dr. Khaled Mahbub Assistant Professor, IICT,
7/12: Ch. 6 Telecommunications Business Value of Telecommunications Trends –Industry –Technology –Application Internet applications Network models –WANs,
1 CHAPTER 8 TELECOMMUNICATIONSANDNETWORKS. 2 TELECOMMUNICATIONS Telecommunications: Communication of all types of information, including digital data,
CTC 228 – Computer Networks Fall 2015 Instructor: Robert Spengler.
Telecommunications, the Internet, and Wireless Technology.
Chapter 5 Network Computing. Agenda Functions Feasibility Analysis.
Telecommunications and Networks Chapter 8. Types of Signals Analog – a continuous waveform that passes through a communications medium Digital signal.
First, by sending smaller individual pieces from source to destination, many different conversations can be interleaved on the network. The process.
"Networking 101: Basics" Jim Gogan INLS184. Introduction - Why network? l Communicate with others close by l Communicate with others far away l Gain access.
BA 471 – Telecommunications and Networking Dr. V.T. Raja Oregon State University As presented in Dr. Marshall’s BA471 class, Winter.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Connecting to the Network Introduction to Networking Concepts.
CCNA Guide to Cisco Networking Chapter 2: Network Devices.
Security in Networks Single point of failure Resillence or fault tolerance CS model.
NETWORKING FUNDAMENTALS. Network+ Guide to Networks, 4e2.
3/20: Telecommunications & Networking What is telecommunications? The hardware: physical components of telecommunications, inc. channels Standards: agreements.
CSC 116 – Computer Networks Fall 2015 Instructor: Robert Spengler.
COMPUTER COMMUNICATIONS AND NETWORKS. Networks fundamentals  Basic understanding of networks, its ontology as LAN, WAN, MAN, PAN, WLAN etc with the comprehensive.
CSCE Farkas1 CSCE 522 Network Security. Reading Pfleeger and Pfleeger: Chapter 6 CSCE Farkas2.
Network Programming Chapter 1 Networking Concepts and Protocols.
Networks Network Components. Learning Objectives Describe different media for transmitting data and their carrying capabilities. Explain the different.
Chapter 9 Networking & Distributed Security (Part C)
Chapter 6 Telecommunications and Networking Slide 1 Well, Sort-of.
.  Hubs send data from one computer to all other computers on the network. They are low-cost and low-function and typically operate at Layer 1 of the.
Data Communication and Networks Chapter 5. What’s a Network? a network consists of two or more computers that are connected together to share information.
Lesson 7 Networks Unit 1—Computer Basics. Computer Concepts BASICS - 2 Objectives Describe the benefits and disadvantages of networks. List and describe.
Kevin Harrison LTEC 4550 Assignment 3.  Ethernet Hub  An unsophisticated device that is used for connecting multiple Ethernet devices together.  Typically.
Data Link Protocols Relates to Lab 2.
NETWORK BASICS Network - a communications, data exchange, and resource-sharing system created by linking two or more computers and establishing standards,
Network Architecture for Cyberspace
NETWORK.
Presentation transcript:

Chapter 9 Networking & Distributed Security

csci5233 computer security & integrity (Chap. 9) 2 Outline Overview of Networking Threats Wiretapping, impersonation, message interruption/modification, DoS Controls Encryption, authentication, distributed authentication, traffic control privacy: PEM, PGP Firewalls Multilevel networks

csci5233 computer security & integrity (Chap. 9) 3 Networking and Security Network threats arise at different points based on different technologies. So the controls must also relate to specific technologies. –The incorporation of a new technology may bring new vulnerability into a system. Examples: –Web –wireless networking –wireless Web, …

csci5233 computer security & integrity (Chap. 9) 4 Networking Concepts Communications, networks, distributed systems A simple view of network: Fig. 9-1, 9-2 (p.378) Client Server Host Node Link Terminal Workstation Gateway Router Repeater switch

csci5233 computer security & integrity (Chap. 9) 5 Networking Concepts Digital vs analog communications Communication media Copper wires (coaxial, twisted pair) Optical fiber Airwave (wireless networks) Microwave (see also p.396) Satellite communications (see also p.397) The underlying communication media are usually transparent to the users of a network.

csci5233 computer security & integrity (Chap. 9) 6 Networking Concepts Communication protocols Protocol stack: a layered architecture for communications, composed of both s/w and h/w Example protocol stacks: ISO’s OSI (Open Systems Interconnection) reference model pp : Fig. 9-4, 9-5, 9-6 TCP/IP suite: 4-layer architecture (application, transport, internet, physical), Table 9-1 (p.384) Ubiquitous concepts: encapsulation, multiplexing, de-multiplexing

csci5233 computer security & integrity (Chap. 9) 7 Networking Concepts Addressing schemes MAC addresses IP addresses Port number Types of networks: LAN WAN Internets The Internet Intranet? Extranet? Wireless networks? WLAN? Mobile network?

csci5233 computer security & integrity (Chap. 9) 8 Networking Concepts Network topologies: p.388 Bus topology Star topology Ring topology What kind(s) of topology does Ethernet use? What network uses the ring topology?

csci5233 computer security & integrity (Chap. 9) 9 Networking Concepts Distributed information systems What can be distributed? Processing Data ? Desired features of a distributed information system? Transparency (location, underlying communications, protocols, topology, software, hardware, …) Reliability Anything else?

csci5233 computer security & integrity (Chap. 9) 10 Threats in Networks Unique security issues in networking Shared asset Complexity (interconnections, software, hardware, media) Unknown perimeter Multiple points of vulnerabilities Anonymity Multiple, dynamically selected paths

csci5233 computer security & integrity (Chap. 9) 11 Threats in Networks What a malicious user can do in a network? The answer: A lot! Fig (p.393) See the listing on p.394. Methods of attacks: Wiretapping Impersonation message interruption message modification hacking DoS

csci5233 computer security & integrity (Chap. 9) 12 Methods of Attacks Wiretapping Passive vs active wiretappings Wiretapping on different media –Cables Packet sniffing (Fig. 9-15, p.398) inductance –Airwaves: microwave, WLAN (802.11b) –Satellite communications –Optical fibers The fiber itself is more secure than other media. But there are other vulnerability points. A valid assumption: All communication links can be broken. So?

csci5233 computer security & integrity (Chap. 9) 13 Methods of Attacks Impersonation Stealing of identity Attacks at authentication mechanisms By guessing By eavesdropping By avoidance By using a trusted system An identity that requires no authentication Well-known (default) authentication

csci5233 computer security & integrity (Chap. 9) 14 Methods of Attacks Denial of service (DoS) Flooding by spurious messages Flooding by modifying routing tables Any other DoS attacks?

csci5233 computer security & integrity (Chap. 9) 15 Summary Next: Part B - networking security controls