The Service Oriented Approach How the physical infrastructure can impact service delivery and security?
|
|
- Leon Kennedy
- 6 years ago
- Views:
Transcription
1 The Service Oriented Approach How the physical infrastructure can impact service delivery and security? 6 th BICSI South East Asia Conference 2008, Singapore Guest Speaker: Ronald van Kleunen CEO / Managing Director Globeron Pte Ltd / Globeron Security Certified: CISSP, Wireless#, CWNA, CWSP, CWNT IRCA ISO/IEC ITSMS, ITILv2 and ITILv3 IRCA ISO/IEC ISMS CSOEP (DataCentre, Infrastructure, Process Security, Management) Copyright Globeron 2008 Page - 1 Agenda The Service Oriented Approach How the physical infrastructure can impact service delivery and security? Find out best practices in driving data centre design from service perspective Session ROI Return of Investment: Examples of good and bad data center design Tips on planning data centre physical infrastructure to ensure security, business continuity and effective management How to plan for sustainable growth Copyright Globeron 2008 Page - 2 Printed: 2008 Page - 1
2 Our relationship with Bicsi Bicsi recognition (worldwide) Bicsi recognises the CSOEP 5-day bootcamp (Certified Service Oriented Enterprise Professional) for CEC (Continuing Education Credits) RCDD NTS OSP WD Installer/ Technician RES Certified Trainer Page - 3 CEO Accountability Accountable for & comply to: - Business & IT Governance & regulations - Telecommunications Act - Computer Misuse Act - International Standards - Wireless Service Availability (and Reliability) % - Wireless Service Performance - Wireless Service Security - Wireless Service Integration - Wireless Service Management & Processes Copyright Globeron 2008 Page - 4 Printed: 2008 Page - 2
3 IT is integrated in every Sector to support the Business Industries: IT & Telecommunications Manufacturing Financial / Banking / Legal Energy Transport & Logistics Government Bio / Hospitality / Healthcare Education Media Copyright Globeron 2008 Page - 5 Globeron s Service Oriented Enterprise (Certified Service Oriented Enterprise Professional) YOUR Organization Serving YOUR Customers (Internal and External) Business Processes and Procedures Service Delivery / Service Support Service Management Managed IT Infrastructure Services, Serving the IT Organization, High Available, Reliable Applications, Servers, Network, Storage Managed Data Center Environmentsi Serving the IT Organization,High Available, Reliable, Facilities, Power,Batteries, Generator, Aircon., Temperature, Cabling Service Security Page - 6 Printed: 2008 Page - 3
4 CEO / Customer Service needs Top Down Requirements Planning Organization and Requirements Applications Business Driven Services to a Service Oriented Enterprise (SOE) Heterogeneous Server and Storage Infrastructure Network + Telecom Infrastructure Data Centre Infrastructure Page - 7 Bottom Up IT Services / DataCenter Design Implementation/Migration and Management Organization and Requirements Applications Builders Driven Services to a Service Oriented Enterprise (SOE) Heterogeneous Server and Storage Infrastructure Network + Telecom Infrastructure Data Centre Infrastructure Page - 8 Printed: 2008 Page - 4
5 Typical IT Service Line Conceptual Connectivity Overview 3D View Mapping to the DataCenter MainFrame Webservers Database / Servers Firewall External Router Switch Switch Switch Firewall Firewall Applications Servers Office / Branch Page - 9 IT Service Line Segmentation Service Oriented Network Tier 1 Tier 2 Tier 3 Note: Services are separated and can be Secured separately. Services are managed by Service Managers SERVICE 1 SERVICE 2 SERVICE 3 Access Network Distribution Network Core Network Management Network (sometimes separated Security Management Network) Storage Network (Sometimes called: Back Up Network) Page - 10 Printed: 2008 Page - 5
6 Examples of IT Service lines Financial / Bank Online Internet Banking Service Trade Financial Service Electronic Bill Payment Services Telecommunication Online Payment Service SMS Service Online Voice Over IP Service Content Providers Online Gaming Service Page - 11 Example of a DataCenter Courtesy of Cari.net datacenters.html Page - 12 Printed: 2008 Page - 6
7 Data Center Service Grouping Rack Planning and Assignment Racks for Telco Equipment MDF, PABX Network Equipment Racks for Services, Scalability, etc. Page - 13 Data Center Rack Planning and Security? Rack Planning Patch Panel Planning Top or Bottom Rack! Power Supply Planning Cable Routing (Patch) inside Rack Outside Rack Depends on Cabling Page - 14 Printed: 2008 Page - 7
8 But how to ensure Security in a shared infrastructure? Shared access to Service Lines via the cable or wirelessly DataCentre cabling is pre-cabled by the installer without knowing the business needs (and IT Service Line needs). how to do the Security Architecture for the Service Oriented Solution House? 3-Tier Security Architecture compliance Access Layer Distribution Layer Core Layer What if the centralised switch is used? Does the DataCentre meet the Security needs of the business? Page - 15 IT Service Line flow end-to-end e.g. Layer 7 Application Layer 7 Application Layer 6 Presentation Layer 5 Session Layer 4 Transport Layer 3 Network Layer 2 Data Link Layer 1 Physical Layer 3 Network Layer 2 Data Link Layer 1 Physical Layer 6 Presentation Layer 5 Session Layer 4 Transport Layer 3 Network Layer 2 Data Link Layer 1 Physical Network Webservers Page - 16 Printed: 2008 Page - 8
9 Service Line Security (all layers) ty Ser rvice Line Securi Layer 7 Application Layer 6 Presentation Layer 5 Session Layer 4 Transport Layer 3 Network Layer 2 Data Link Layer 1 Physical All application communication, E mail (SMTP, POP), Telnet, FTP, Web Services, HTTP, HTML, etc. Authentication mechanism > Userids, Passwords and other application information, authentication (application sniffers MSN, Spyware, Virus, etc.) Formats + Encryption to avoid compatibility errors on network layer > Authentication mechanisms Establishes, Manages, Terminates connection setups. > hijacking session, DoS connection setups, buffer overflow Flow Control of the session (Sliding Window Techniques, etc.) > packet injection, Denial Of Services DoS Network Protocols, IPv4, IPv6, Netbios, AppleTalk), Routers, L3 Switches, TCP/UDP, ICMP (Ping) > SYN, ACKs, NACKs, IP addresses, packet headers Ethernet, Token Ring, Hubs, (Wireless) Bridges, L2 Switches > Sniffing: MAC address, VLANs, VTP, STP, CDP, (R)ARP Cabling, Fiber, Coax, Wireless, Telephone lines, etc. > Eavesdropping Page - 17 IT Service & DataCentre Management Web Servers Applications Servers External Router Firewall Switch Firewall Switch Firewall Switch MainFrame Database / Servers Office / Branch Internal Users Media / Cabling Network System Storage Application Security Network + Security Device + System + Storage + Application (EXTERNAL) Monitoring Service (INTERNAL) Oriented Performance Infrastructure Monitoring (SOI) in the DataCenter - Copyright Globeron End User Experience Performance Monitoring 2006 Page - 18 Printed: 2008 Page - 9
10 Service needs in line with international standards (e.g. ISO/IEC 20000, ISO/IEC 27001, ITILv2, ITILv3) - Service Availability - Service Performance & Capacity - Service (Business) Continuity - Service Level Management & Reporting - Service Financial Management - Service & Security Incident Management - Service Problem Management - Service Change Management - Service Release Management - Service Configuration Management Page - 19 ISO/IEC ITSM Service Management Processes and Security Relationships to all other processes Page - 20 Printed: 2008 Page - 10
11 Security as part of the Security Framework ISO/IEC Structure Scope 11 Management Domains, 39 Objectives, 133 Controls Security Policy; Organization of information security; Asset management; Human resources security; Physical and environmental security; Communications and operations management; Access control; Information systems acquisition, development and maintenance; Information security incident management; Business Continuity Management; Compliance. Page - 21 How can Bicsi help your organisation? January 2009 CSOEP 5-Day Bootcamp Bicsi recognises the CSOEP 5-day bootcamp (Certified Service Oriented Enterprise Professional) for CEC (Continuing Education Credits) RCDD NTS OSP WD Installer/ RES Certified Technician Trainer Page - 22 Printed: 2008 Page - 11
12 Contact Details Copyright Globeron 2008 Page - 23 Printed: 2008 Page - 12
This course prepares candidates for the CompTIA Network+ examination (2018 Objectives) N
CompTIA Network+ (Exam N10-007) Course Description: CompTIA Network+ is the first certification IT professionals specializing in network administration and support should earn. Network+ is aimed at IT
More informationDesigning Wireless (WiFi) Networks for Buildings. Ronald van Kleunen CEO Globeron Pte Ltd / Globeron Security
Designing Wireless (WiFi) Networks for Buildings Ronald van Kleunen CEO Globeron Pte Ltd / Globeron Security Synopsis Have you ever wondered: How to design a wireless WiFi network? Why home WiFi networks
More informationWelcome. BICSI And BICSI Standards, An Overview. Presented by: Greg Sherry RCDD/NTS/WD BICSI European Region Director
Welcome BICSI And BICSI Standards, An Overview July 12 th 2007 Presented by: Greg Sherry RCDD/NTS/WD BICSI European Region Director Greg Sherry, Qualitas Ltd 1976 - Started in the IT industry Various roles
More informationCompTIA Network+ Study Guide Table of Contents
CompTIA Network+ Study Guide Table of Contents Course Introduction Table of Contents Getting Started About This Course About CompTIA Certifications Module 1 / Local Area Networks Module 1 / Unit 1 Topologies
More informationIdentify the features of network and client operating systems (Windows, NetWare, Linux, Mac OS)
Course Outline Network+ Duration: 5 days (30 hours) Learning Objectives: Install and configure a network card Define the concepts of network layers Understand and implement the TCP/IP protocol Install
More informationUser-to-Data-Center Access Control Using TrustSec Design Guide
CISCO VALIDATED DESIGN User-to-Data-Center Access Control Using TrustSec Design Guide October 2015 REFERENCE NETWORK ARCHITECTURE Table of Contents About This Document... 1 Cisco TrustSec Overview... 2
More informationTestOut Network Pro - English 5.0.x COURSE OUTLINE. Modified
TestOut Network Pro - English 5.0.x COURSE OUTLINE Modified 2018-03-06 TestOut Network Pro Outline - English 5.0.x Videos: 130 (17:10:31) Demonstrations: 78 (8:46:15) Simulations: 88 Fact Sheets: 136 Exams:
More informationHow difficult can it be to install a Wi-Fi network for a large enterprise? 18th of April pm 5.00pm Dubai, United Arab Emirates (UAE)
How difficult can it be to install a Wi-Fi network for a large enterprise? 18th of April 2017 1.30pm 5.00pm Dubai, United Arab Emirates (UAE) Ronald van Kleunen CEO, Globeron Pte Ltd ronald@globeron.com
More informationEssential Elements of Medical Networks. D. J. McMahon rev cewood
Essential Elements of Medical Networks D. J. McMahon 141004 rev cewood 2018-02-18 Key Points Medical Networks: quick conversion of bits to decimal numbers: 2 10 = 1024 1000 = 10 3 OSI Networking Layers
More informationCompliance. Peter Oosthuizen Partner Service Team Leader
Compliance Peter Oosthuizen Partner Service Team Leader Contents Overview of Compliance. Telecommunications Regulations. Data Protection Act. Payment Card Industry (PCI) Compliance. Financial Conduct Authority
More informationPROTECTING INFORMATION ASSETS NETWORK SECURITY
PROTECTING INFORMATION ASSETS NETWORK SECURITY PAUL SMITH 20 years of IT experience (desktop, servers, networks, firewalls.) 17 years of engineering in enterprise scaled networks 10+ years in Network Security
More informationIngram Micro Cyber Security Portfolio
Ingram Micro Cyber Security Portfolio Ingram Micro Inc. 1 Ingram Micro Cyber Security Portfolio Services Trainings Vendors Technical Assessment General Training Consultancy Service Certification Training
More informationDefining Networks with the OSI Model. Module 2
Defining Networks with the OSI Model Module 2 Objectives Skills Concepts Objective Domain Description Objective Domain Number Understanding OSI Basics Defining the Communications Subnetwork Defining the
More informationTestOut Network Pro - English 4.1.x COURSE OUTLINE. Modified
TestOut Network Pro - English 4.1.x COURSE OUTLINE Modified 2017-07-06 TestOut Network Pro Outline - English 4.1.x Videos: 141 (18:42:14) Demonstrations: 81 (10:38:59) Simulations: 92 Fact Sheets: 145
More informationHands-On Triple Play / IPTV for TeleCommunications
Hands-On for TeleCommunications BICSI CECs This course has been approved for CEC credits by BICSI. Please read below for a breakdown of the credits that we offer for this course. For more information regarding
More informationAssignment - 1 Chap. 1 Wired LAN s
Assignment - 1 Chap. 1 Wired LAN s 1. (1 Mark) 1. Draw the frame format of Ethernet. 2. What is unicast, multicast and broadcast address? 3. State the purpose of CRC field. 2. (5 Marks) 1. Explain how
More informationINTERNET & WORLD WIDE WEB (UNIT-1) MECHANISM OF INTERNET
INTERNET & WORLD WIDE WEB (UNIT-1) MECHANISM OF INTERNET 1. INTRODUCTION Hello friends are topic is Internet and World Wide Web the most popular services of our topic is social networking and online shopping
More informationFundamentals of IP Networking 2017 Webinar Series Part 4 Building a Segmented IP Network Focused On Performance & Security
Fundamentals of IP Networking 2017 Webinar Series Part 4 Building a Segmented IP Network Focused On Performance & Security Wayne M. Pecena, CPBE, CBNE Texas A&M University Educational Broadcast Services
More informationCISSP CEH PKI SECURITY + CEHv9: Certified Ethical Hacker. Upcoming Dates. Course Description. Course Outline
CISSP CEH PKI SECURITY + CEHv9: Certified Ethical Hacker Learn to find security vulnerabilities before the bad guys do! The Certified Ethical Hacker (CEH) class immerses students in an interactive environment
More informationNetwork Security. Thierry Sans
Network Security Thierry Sans HTTP SMTP DNS BGP The Protocol Stack Application TCP UDP Transport IPv4 IPv6 ICMP Network ARP Link Ethernet WiFi The attacker is capable of confidentiality integrity availability
More informationFieldbus Foundation India Marketing Committee. Fieldbus Foundation End Users Council Conference Wireless LANs in Industrial Environments
Fieldbus Foundation India Marketing Committee Fieldbus Foundation End Users Council Conference-2009 Date : 19 th June, 2009 ( Friday ) Time : from 09:00 am to 06:00 pm. Venue : The Maratha, Sahar Road,
More informationREMOTE IT MANAGEMENT SOLUTIONS: MANAGE REMOTE OFFICES WITHOUT LEAVING YOURS
REMOTE IT MANAGEMENT SOLUTIONS: MANAGE REMOTE OFFICES WITHOUT LEAVING YOURS IT Challenges AT THE REMOTE OFFICE Compared to data centers, remote offices and facilities pose unique hardware and IT management
More informationPRACTICAL ROUTERS and SWITCHES for ENGINEERS and TECHNICIANS
PRACTICAL ROUTERS and SWITCHES for ENGINEERS and TECHNICIANS Objectives At the end of this workshop participants will: Be able to configure, maintain and manage routers have a clear practical understanding
More informationNetwork Review TEJ4M. SBrace
Network Review TEJ4M SBrace Example of how the OSI Layers work using an e-mail sent from the computer on the left. Email sent from John: Meet me at Carl s 1:30 John Identify sender and intended receiver;
More informationSecure Network Design Document
Secure Network Design Document May 3, 2007 Authored by: Steven Puzio TABLE OF CONTENTS I. Overview... 3 II. Company Information... 5 III. Wiring Closet Cabling and Design... 6 IV. Network Electronics Selection...
More informationOSI Model. Teran Subasinghe MBCS, Bsc.(Hons) in Computer Science - University of Greenwich, UK
OSI Model Teran Subasinghe MBCS, Bsc.(Hons) in Computer Science - University of Greenwich, UK What is OSI Model? Open Systems Interconnection Reference Model Developed in 1984 by the International Standards
More informationMainframe Networking 101 Share Session 15422
Mainframe Networking 101 Share Session 15422 6 Laura Knapp WW Business Consultant Laurak@aesclever.com ipv6hawaii@outlook.com 06/23/2014 Applied Expert Systems, Inc. 2014 1 Agenda Requirements for Communication
More informationMainframe Networking 101 Share Session. Junie Sanders Kevin Manweiler -
Mainframe Networking 101 Share Session 6 Junie Sanders jrsandler@cisco.com Kevin Manweiler - kmanweil@cisco.com 2 Agenda Requirements for Communication What are Networking Architectures? Networking Architectures
More informationApplication of Cryptographic Systems. Securing Networks. Chapter 3 Part 4 of 4 CA M S Mehta, FCA
Application of Cryptographic Systems Securing Networks Chapter 3 Part 4 of 4 CA M S Mehta, FCA 1 Application of Cryptographic Systems Learning Objectives Task Statements 1.3 Recognise function of Telecommunications
More informationGigabit SSL VPN Security Router
As Internet becomes essential for business, the crucial solution to prevent your Internet connection from failure is to have more than one connection. PLANET is the ideal to help the SMBs increase the
More informationConfiguring Wireless Distribution System (WDS) on the WAP131 and WAP351
Article ID: 5045 Configuring Wireless Distribution System (WDS) on the WAP131 and WAP351 Objective Wireless Distribution System (WDS) allows you to connect multiple access points and have them communicate
More informationITEC 3800 Data Communication and Network. Introducing Networks
ITEC 3800 Data Communication and Network Introducing Networks Introduction to Networking Computer network, or simply network Refers to the connection of two or more computers by some type of medium You
More informationCompTIA Security+ E2C (2011 Edition) Exam.
CompTIA JK0-018 CompTIA Security+ E2C (2011 Edition) Exam TYPE: DEMO http://www.examskey.com/jk0-018.html Examskey CompTIA JK0-018 exam demo product is here for you to test the quality of the product.
More informationNetworking Technologies
Unit 24: Networking Technologies Unit code: M/601/0472 QCF Level 4: BTEC Higher National Credit value: 15 Aim To enable learners to understand computer networking concepts, how they work, how they operate
More informationThe Bank of Zambia Experience
BANK of ZAMBIA Protea Safari Lodge 24 th 28 th August, 2008 The Bank of Zambia Experience Shamambo W Saasa Manager ICT Security & Quality Assurance Bank of Zambia Policies Procedures Standards FOCUS AREAS
More informationLayer 4: UDP, TCP, and others. based on Chapter 9 of CompTIA Network+ Exam Guide, 4th ed., Mike Meyers
Layer 4: UDP, TCP, and others based on Chapter 9 of CompTIA Network+ Exam Guide, 4th ed., Mike Meyers Concepts application set transport set High-level, "Application Set" protocols deal only with how handled
More information1. Which OSI layers offers reliable, connection-oriented data communication services?
CCNA 1 Practice Final Exam Answers v4.0 100% 1. Which OSI layers offers reliable, connection-oriented data communication services? application presentation session transport network 2. Refer to the exhibit.
More informationCertified Ethical Hacker (CEH)
Certified Ethical Hacker (CEH) COURSE OVERVIEW: The most effective cybersecurity professionals are able to predict attacks before they happen. Training in Ethical Hacking provides professionals with the
More informationMeeting 39. Guest Speaker Dr. Williams CEH Networking
Cyber@UC Meeting 39 Guest Speaker Dr. Williams CEH Networking If You re New! Join our Slack ucyber.slack.com Feel free to get involved with one of our committees: Content, Finance, Public Affairs, Outreach,
More informationNETWORK SECURITY ITEC 435
NETWORK SECURITY ITEC 435 Agenda Chapter 2: Introduction to Networking Introduction to Networking Networking Fundamentals Reasons to Network Getting the Message Across Analog Information on an Analog Medium
More informationก ก Information Technology II
ก ก 202103 Information Technology II ก ก ก ก ก (LAN), ก LAN, ก ก (LAN) ก ก ก LAN ก LAN ก LAN Topology Bus LAN Star LAN Ring LAN Wireless LAN Wireless LAN Wireless ก (LAN) ก ก ก LAN ก LAN WAN ก Random Access
More informationData Communication and Network. Introducing Networks
Data Communication and Network Introducing Networks Introduction to Networking Computer network, or simply network Refers to the connection of two or more computers by some type of medium You can connect
More informationHacker Academy Ltd COURSES CATALOGUE. Hacker Academy Ltd. LONDON UK
Hacker Academy Ltd COURSES CATALOGUE Hacker Academy Ltd. LONDON UK TABLE OF CONTENTS Basic Level Courses... 3 1. Information Security Awareness for End Users... 3 2. Information Security Awareness for
More informationOur Roots. Member of HOLCOM Group 200+ companies in 35 countries 5,700+ professionals Operating since 1967 HOLCOM. Midis Group
Corporate Profile Our Roots HOLCOM Member of HOLCOM Group 200+ companies in 35 countries 5,700+ professionals Operating since 1967 ATG Crystal Networks Midis Group GlobalCom ME Europe Africa ITG at a Glance
More informationInternet Security: Firewall
Internet Security: Firewall What is a Firewall firewall = wall to protect against fire propagation More like a moat around a medieval castle restricts entry to carefully controlled points restricts exits
More informationE&CE 358: Tutorial 1. Instructor: Sherman (Xuemin) Shen TA: Miao Wang
E&CE 358: Tutorial 1 Instructor: Sherman (Xuemin) Shen TA: Miao Wang Email: m59wang@uwaterloo.ca 1 About Tutorials TA: Miao Wang Office: EIT 3133; Tutorials: Th 4:30 5:20 pm Topics Supplementary knowledge
More informationHands-On TCP/IP Networking
Hands-On Course Description In this Hands-On TCP/IP course, the student will work on a live TCP/IP network, reinforcing the discussed subject material. TCP/IP is the communications protocol suite on which
More informationCopyleft 2005, Binnur Kurt. Objectives
1 ing Fundamentals Copyleft 2005, Binnur Kurt Objectives Define basic networking terms Describe some commonly used network applications Describe the main purposes and functions of computer networking Describe
More informationPCI DSS Compliance. White Paper Parallels Remote Application Server
PCI DSS Compliance White Paper Parallels Remote Application Server Table of Contents Introduction... 3 What Is PCI DSS?... 3 Why Businesses Need to Be PCI DSS Compliant... 3 What Is Parallels RAS?... 3
More informationWeb Cash Fraud Prevention Best Practices
Web Cash Fraud Prevention Best Practices Tips on what you can do to prevent Online fraud. This document provides best practices to avoid or reduce exposure to fraud. You can use it to educate your Web
More information7.16 INFORMATION TECHNOLOGY SECURITY
7.16 INFORMATION TECHNOLOGY SECURITY The superintendent shall be responsible for ensuring the district has the necessary components in place to meet the district s needs and the state s requirements for
More informationHands-On Ethical Hacking and Network Defense
Hands-On Ethical Hacking and Network Defense Chapter 2 TCP/IP Concepts Review Last modified 1-11-17 Objectives Describe the TCP/IP protocol stack Explain the basic concepts of IP addressing Explain the
More informationInstructor PIERRE A. COLOMBEL II, M.S, CISSP-ISSAP, CEH, CIH, CHFI, LPT, PMP, MCT, Network+ & 30 more
NETWORK+ COURSE DETAILS Instructor PIERRE A. COLOMBEL II, M.S, CISSP-ISSAP, CEH, CIH, CHFI, LPT, PMP, MCT, Network+ & 30 more CASP, Mr. Colombel is an exceptional trainer with a unique ability to assess
More informationCisco CCNA (ICND1, ICND2) Bootcamp
Cisco CCNA (ICND1, ICND2) Bootcamp Course Duration: 5 Days Course Overview This five-day course covers the essential topics of ICND1 and ICND2 in an intensive Bootcamp format. It teaches students the skills
More informationChapter 2. Communicating Over The Network. CCNA1-1 Chapter 2
Chapter 2 Communicating Over The Network CCNA1-1 Chapter 2 Communicating Over the Network The Platform for Communications CCNA1-2 Chapter 2 Elements of Communication People communicate in many different
More informationEducation Network Security
Education Network Security RECOMMENDATIONS CHECKLIST Learn INSTITUTE Education Network Security Recommendations Checklist This checklist is designed to assist in a quick review of your K-12 district or
More informationThe following chart provides the breakdown of exam as to the weight of each section of the exam.
Introduction The CWSP-205 exam, covering the 2015 objectives, will certify that the successful candidate understands the security weaknesses inherent in WLANs, the solutions available to address those
More informationChapter 4 The Internet
Chapter 4 The Internet Dr. Farzana Rahman Assistant Professor Department of Computer Science James Madison University Chapter 4: Networking and the Internet 4.1 Network Fundamentals 4.2 The Internet 4.3
More informationCEH: CERTIFIED ETHICAL HACKER v9
CEH: CERTIFIED ETHICAL HACKER v9 SUMMARY The Certified Ethical Hacker (CEH) program is the core of the most desired information security training system any information security professional will ever
More informationInterconnecting Networks with TCP/IP. 2000, Cisco Systems, Inc. 8-1
Interconnecting Networks with TCP/IP 2000, Cisco Systems, Inc. 8-1 Objectives Upon completion of this chapter you will be able to perform the following tasks: Identify the IP protocol stack, its protocol
More informationPart VI. Appendixes. Appendix A OSI Model and Internet Protocols Appendix B About the CD
Part VI Appendixes Appendix A OSI Model and Internet Protocols Appendix B About the CD OSI Model and Internet Protocols APPENDIX A In this appendix, you will Learn about the OSI model Review the network
More informationCCNA. Murlisona App. Hiralal Lane, Ravivar Karanja, Near Pethe High-School, ,
CCNA Cisco Certified Network Associate (200-125) Exam DescrIPtion: The Cisco Certified Network Associate (CCNA) Routing and Switching composite exam (200-125) is a 90-minute, 50 60 question assessment
More informationIoT and Intelligent Building Challenges in ICT
IoT and Intelligent Building Challenges in ICT Carol E. Oliver, RCDD, ESS Training and Contractor Manager LegrandNorth America Data Communications Division Yesterday Today History Repeats Itself... Yesterday...
More informationThe Pursuit of ISO/IEC 27001:2005 Certification. Joan Ross, CISSP, NSA IEM Moss Adams LLP
The Pursuit of ISO/IEC 27001:2005 Certification Joan Ross, CISSP, NSA IEM Moss Adams LLP When you think of compliance, what comes to mind? The Compliance Paradigm Game...test your knowledge for fun and
More informationControlled Document Page 1 of 6. Effective Date: 6/19/13. Approved by: CAB/F. Approved on: 6/19/13. Version Supersedes:
Page 1 of 6 I. Common Principles and Approaches to Privacy A. A Modern History of Privacy a. Descriptions, definitions and classes b. Historical and social origins B. Types of Information a. Personal information
More informationNETWORK THREATS DEMAN
SELF-DEFENDING NETWORK NETWORK THREATS DEMAN NEW SECURITY: STRATEGIES TECHNOLOGIES Self-Propagating Threats A combination of: self propagating threats Collaborative applications Interconnected environments
More informationGCIH. GIAC Certified Incident Handler.
GIAC GCIH GIAC Certified Incident Handler TYPE: DEMO http://www.examskey.com/gcih.html Examskey GIAC GCIH exam demo product is here for you to test the quality of the product. This GIAC GCIH demo also
More informationMikroTik Certified Network Associate (MTCRE) Training/Exam
MikroTik Certified Network Associate (MTCRE) Training/Exam Trainer: Nawshad Ahmed MikroTik Certified Trainer & Consultant [TR0186] MTCINE, MTCNA, MTCRE, MTCTCE, MTCWE Email: bipubijoy@gmail.com Dhaka,
More informationCourse overview. CompTIA Network+ Certification (Exam N10-007) Study Guide (G525eng v038)
Overview This course is intended for those wishing to qualify with CompTIA Network+ certification. CompTIA's Network+ Certification is a foundation-level certification designed for IT professionals with
More information5105: BHARATHIDASAN ENGINEERING COLLEGE NATTARMPALLI UNIT I FUNDAMENTALS AND LINK LAYER PART A
5105: BHARATHIDASAN ENGINEERING COLLEGE NATTARMPALLI 635 854. NAME OF THE STAFF : R.ANBARASAN DESIGNATION & DEPARTMENT : AP/CSE SUBJECT CODE : CS 6551 SUBJECT NAME : COMPUTER NETWORKS UNIT I FUNDAMENTALS
More informationBest Practices Guide to Electronic Banking
Best Practices Guide to Electronic Banking City Bank & Trust Company offers a variety of services to our customers. As these services have evolved over time, a much higher percentage of customers have
More informationSystems and Principles Unit Syllabus
Systems and Principles Unit Syllabus Level 2 Networking Principles 7540-002 www.cityandguilds.com October 2010 Version 2.0 About City & Guilds City & Guilds is the UK s leading provider of vocational qualifications,
More informationFundamental Questions to Answer About Computer Networking, Jan 2009 Prof. Ying-Dar Lin,
Fundamental Questions to Answer About Computer Networking, Jan 2009 Prof. Ying-Dar Lin, ydlin@cs.nctu.edu.tw Chapter 1: Introduction 1. How does Internet scale to billions of hosts? (Describe what structure
More informationRetail Stores & Restaurant Chains
Use Cases Retail Stores & Restaurant Chains Enterprise INTRODUCTION This document provides a selection of customer use cases applicable for the retail stores sector. Each use case describes an individual
More informationInternet Layers. Physical Layer. Application. Application. Transport. Transport. Network. Network. Network. Network. Link. Link. Link.
Internet Layers Application Application Transport Transport Network Network Network Network Link Link Link Link Ethernet Fiber Optics Physical Layer Wi-Fi ARP requests and responses IP: 192.168.1.1 MAC:
More informationChapter 2 Communicating Over the Network
Chapter 2 Communicating Over the Network Elements of Communication Communicating the Messages Continuous stream of bits 00101010100101010101010101010101010 I have to wait Single communications (e.g. video,
More informationMassimo Nardone, TKK, S Security of Communication Protocols
Network Logging/Auditing of network devices Firewall (types, management, procedures) Remote Access Passive intrusion detection Services/Applications Account authorization Account termination Accounts Lockout
More information31270 Networking Essentials Focus, Pre-Quiz, and Sample Exam Answers
31270 Networking Essentials Focus, Pre-Quiz, and Sample Exam Answers CONTENTS Focus Questions... 2 Chapter 1: Explore the Network... 2 Chapter 2: Configure a Network Operating System... 5 Chapter 3: Network
More informationOverview of TCP/IP Overview of TCP/IP protocol: TCP/IP architectural models TCP protocol layers.
Overview of TCP/IP 3 Overview of TCP/IP protocol: TCP/IP architectural models TCP protocol layers. 4 2 5 6 3 7 8 4 9 10 5 11 12 6 13 14 7 15 16 8 17 18 9 19 20 10 21 Why TCP/IP? Packet based Provides decentralized
More informationSample question paper. Duration: 75 minutes. Candidate s name: Candidate s enrolment number: Centre name: Centre number: Date:
9628-06 Level 3 Certificate in Networking and Architecture (for the Level 3 Infrastructure Technician Apprenticeship) 9628-306 Networking and Architecture Sample question paper Duration: 75 minutes Candidate
More informationSINGLE COURSE. NH9000 Certified Ethical Hacker 104 Total Hours. COURSE TITLE: Certified Ethical Hacker
NH9000 Certified Ethical Hacker 104 Total Hours COURSE TITLE: Certified Ethical Hacker COURSE OVERVIEW: This class will immerse the student into an interactive environment where they will be shown how
More informationitsmf Hong Kong Chapter Annual Conference 2008 The new Era of ITSM Keith Aldis Chief Executive & Company Secretary itsmf International
itsmf Hong Kong Chapter Annual Conference 2008 The new Era of ITSM Keith Aldis Chief Executive & Company Secretary 1 itsmf Hong Kong Chapter There are 2 x parts to my presentation 1. 2. ITIL v 3 2 itsmf
More informationThe ACK and NACK of Programming
NFJS Software Symposium Series 2012 The ACK and NACK of Programming Ken Sipe About Speaker http://kensipe.blogspot.com/ http://del.icio.us/kensipe twitter: @kensipe ken.sipe@gmail.com Developer: Embedded,
More informationMTA_98-366_Vindicator930
MTA_98-366_Vindicator930 Number: 98-366 Passing Score: 700 Time Limit: 45 min File Version: 1.0 http://www.gratisexam.com/ Microsoft Technology Associate Networking Fundamentals MTA 98-366 Exam A QUESTION
More informationQUESTION BANK EVEN SEMESTER
Fatima Michael College of Engineering and Technology DEPARTMENT OF ELECTRONICS AND COMMUNICATION ENGINEERING QUESTION BANK EVEN SEMESTER SUB CODE & NAME: EC2352 COMPUTER NETWORKS YEAR / SEM: III / VI Staff
More informationTECHNICAL INTRODUCTION...2 BRIEF TECHNICAL INTRODUCTION...2 SUPPORTED PROTOCOLS...2 High-Level Protocols...2 Low-Level Protocols...2 REQUIREMENTS...
S n i f f e m 1. 0 1 Whiitepaper TECHNICAL INTRODUCTION...2 BRIEF TECHNICAL INTRODUCTION...2 SUPPORTED PROTOCOLS...2 High-Level Protocols...2 Low-Level Protocols...2 REQUIREMENTS...2 Hardware...2 Software...2
More informationSecuring Access to Network Devices
Securing Access to Network s Data Track Technology October, 2003 A corporate information security strategy will not be effective unless IT administrative services are protected through processes that safeguard
More informationLecture 3 Protocol Stacks and Layering
Lecture 3 Protocol Stacks and ing Hui Zhang School of Computer Science Carnegie Mellon University 15-441 Networking, Fall 2007 http://www.cs.cmu.edu/~srini/15-441/f07/ 1 What is a Communication Network?
More informationRecognised competency courses by the industry leader
TrueNet Recognised competency courses by the industry leader World-Class solutions need world class integrators. The TrueNet certified Integrator course is designed to provide a professional and systematic
More informationChapter 2 Networking Standards and the OSI Model
Network+ Guide to Networks, 6 th Edition 2-1 Chapter 2 Networking Standards and the OSI Model At a Glance Instructor s Manual Table of Contents Overview Objectives s Quick Quizzes Class Discussion Topics
More informationTypical Network Uses
Computer Networks Introduction The next Great Revolution - Computer Networks- computers connected together for exchanging information Our information-oriented society - applications in education, commerce,
More informationChapter 4: Networking and the Internet
Chapter 4: Networking and the Internet 2015 Pearson Education Limited 2015 Chapter 4: Networking and the Internet 4.1 Network Fundamentals 4.2 The Internet 4.3 The World Wide Web 4.4 Internet Protocols
More informationInformation Technology General Control Review
Information Technology General Control Review David L. Shissler, Senior IT Auditor, CPA, CISA, CISSP Office of Internal Audit and Risk Assessment September 15, 2016 Background Presenter Senior IT Auditor
More informationNETWORK INTRUSION. Information Security in Systems & Networks Public Development Program. Sanjay Goel University at Albany, SUNY Fall 2006
NETWORK INTRUSION Information Security in Systems & Networks Public Development Program Sanjay Goel University at Albany, SUNY Fall 2006 1 Learning Objectives Students should be able to: Recognize different
More informationStandards-based Labelling: The Key to Effective Network Cabling Plan. Lin Huanyu Market Development, Regional Manager Brother International Singapore
Standards-based Labelling: The Key to Effective Network Cabling Plan Lin Huanyu Market Development, Regional Manager Brother International Singapore DATA CENTRE LANDSCAPE Digital Economy Datadriven population
More informationQCF Level 3: BTEC Specialist Credit value: 10 Guided learning hours: 60. Aim and purpose. Unit introduction
Unit 42: Computer Networks Unit code: R/601/7320 QCF Level 3: BTEC Specialist Credit value: 10 Guided learning hours: 60 Aim and purpose The aim of this unit is to ensure learners understand the key components
More informationMaximising Energy Efficiency and Validating Decisions with Romonet s Analytics Platform. About Global Switch. Global Switch Sydney East
Maximising Energy Efficiency and Validating Decisions with Romonet s Analytics Platform Case Study - Global Switch Sydney East About Global Switch Global Switch is a leading owner, operator and developer
More informationRead addressing table and network map
Term 1 Grade 12 -Task Sheet 4 Name: SIS No Group: N/A (Not Applicable) Signed Date: Grade Start Time: Finishing Time: Read addressing table and network map Picture 1 Picture 2 OBJECTIVE Read addressing
More informationPreview Test: cis191_chap1_quiz
3/9/2015 Preview Test: cis191_chap1_quiz 20155229528. Sunyata 98 Courses Organizations Need Help? Prevent Sexual Violence Preview Test: cis191_chap1_quiz Test Information Description Instructions Timed
More informationSYSTEMS ADMINISTRATION USING CISCO (315)
Page 1 of 11 Contestant Number: Time: Rank: SYSTEMS ADMINISTRATION USING CISCO (315) REGIONAL 2016 Multiple Choice: Multiple Choice (50 @ 10 points each) TOTAL POINTS (500 points) (500 points) Failure
More information