Chapter 1 B: Exploring the Network

Similar documents
31270 Networking Essentials Focus, Pre-Quiz, and Sample Exam Answers

Chapter 11: Networks

Chapter 11: It s a Network. Introduction to Networking

Future-ready security for small and mid-size enterprises

Communications and Networks The McGraw-Hill Companies, Inc. All rights reserved.

Cisco Self Defending Network

Data Communication. Chapter # 5: Networking Threats. By: William Stalling

MIS 300 Exam 2 Spring 2011

Secure Network Design Document

Unit 2 Assignment 2. Software Utilities?

Cyber Criminal Methods & Prevention Techniques. By

NETWORK THREATS DEMAN

Technology in Action. Chapter 12 Behind the Scenes: Networking and Security. Copyright 2010 Pearson Education, Inc. Publishing as Prentice Hall

CtrlS Datacenters Placement Questions And Answers

A Review Paper on Network Security Attacks and Defences

Management of IT Infrastructure Security by Establishing Separate Functional Area with Spiral Security Model

Wireless LAN Security (RM12/2002)

16/06/56. Communications and Networks. Communications and Networks. Communications and Networks

Security Assessment Checklist

Exam: : VPN/Security. Ver :

NEN The Education Network

Multi-Layered Security Framework for Metro-Scale Wi-Fi Networks

CyberP3i Course Module Series

Chapter 10: Security and Ethical Challenges of E-Business

Semester 1. Cisco I. Introduction to Networks JEOPADY. Chapter 11

E-Commerce. Infrastructure I: Computer Networks

Data Center Network Infrastructure

SteelGate Overview. Manage perimeter security and network traffic to ensure operational efficiency, and optimal Quality of Service (QoS)

Symantec Client Security. Integrated protection for network and remote clients.

Securing the Converged Enterprise, Part I

Securing Information Systems

n Learn about the Security+ exam n Learn basic terminology and the basic approaches n Implement security configuration parameters on network

Data and Computer Communications Chapter 1 Data Communications, Data Networks, and the Internet

USG2110 Unified Security Gateways

Technology in Action

DoD UC Framework 2013, Section 13 Table of Contents TABLE OF CONTENTS

Chapter 1. Cisco SONA and the Cisco Enterprise Architecture

CompTIA Security+ (Exam SY0-401)

Overview. Computer Network Lab, SS Security. Type of attacks. Firewalls. Protocols. Packet filter

TestOut Network Pro - English 4.1.x COURSE OUTLINE. Modified

Hardening the Education. with NGFW. Narongveth Yutithammanurak Business Development Manager 23 Feb 2012

Training UNIFIED SECURITY. Signature based packet analysis

Cisco Cisco Sales Expert. Practice Test. Version

ENDPOINT SECURITY WHITE PAPER. Endpoint Security and the Case For Automated Sandboxing

PRODUCT GUIDE Wireless Intrusion Prevention Systems

IS Today: Managing in a Digital World 9/17/12

Broadband Internet Access Disclosure

CCNA Discovery 4.0 Designing and Supporting Computer Networks

Finding and Supporting Collaboration Needs and Opportunities

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

It is the process of sharing data, programs, and information between two or more computers.

Networks and Communications MS216 - Course Outline -

Data center interconnect for the enterprise hybrid cloud

CTS2134 Introduction to Networking. Module 08: Network Security

Chapter 12. Information Security Management

B.Y.O.D Bring Your Own Device

Activating Intrusion Prevention Service

SDN, SD-WAN, NFV, VNF I m confused!

Never Drop a Call With TecInfo SIP Proxy White Paper

SECURITY ON AWS 8/3/17. AWS Security Standards MORE. By Max Ellsberry

Venusense UTM Introduction

Ethics and Information Security. 10 주차 - 경영정보론 Spring 2014

Securing Information Systems

Kerio Control. Unified Threat Management without Complexity. Presenters name. Presented by

# ROLE DESCRIPTION / BENEFIT ISSUES / RISKS

Evolution of Data Center Security Automated Security for Today s Dynamic Data Centers

TOP 10 IT SECURITY ACTIONS TO PROTECT INTERNET-CONNECTED NETWORKS AND INFORMATION

Perimeter Defenses T R U E N E T W O R K S E C U R I T Y DEPENDS ON MORE THAN

Wireless and Network Security Integration Solution Overview

Wireless Network Security Fundamentals and Technologies

Lecture 1 Overview - Data Communications, Data Networks, and the Internet

Mobility, Security Concerns, and Avoidance

SD-WAN Transform Your Agency

2. INTRUDER DETECTION SYSTEMS

Chapter 10: Security. 2. What are the two types of general threats to computer security? Give examples of each.

School of Computer Sciences Universiti Sains Malaysia Pulau Pinang

TestOut Network Pro - English 5.0.x COURSE OUTLINE. Modified

ON-LINE EXPERT SUPPORT THROUGH VPN ACCESS

Virtual private networks

Chapter 4: Networking and the Internet. Network Classifications. Network topologies. Network topologies (continued) Connecting Networks.

Princess Nora Bint Abdulrahman University College of computer and information sciences Networks department Networks Security (NET 536)

Intel PRO/1000 PT and PF Quad Port Bypass Server Adapters for In-line Server Appliances

Introducing Campus Networks

FIREWALL PROTECTION AND WHY DOES MY BUSINESS NEED IT?

SIP security and the great fun with Firewall / NAT Bernie Höneisen SURA / ViDe, , Atlanta, GA (USA)

Chapter 4. Network Security. Part I

Introduction. Controlling Information Systems. Threats to Computerised Information System. Why System are Vulnerable?

CND Exam Blueprint v2.0

Required Textbook and Materials. Course Objectives. Course Outline

Campus Network Design

Solution Architecture

EXECUTIVE REPORT 20 / 12 / 2006

PASS4TEST. IT Certification Guaranteed, The Easy Way! We offer free update service for one year

Cisco SR 520-T1 Secure Router

2.4. Target Audience This document is intended to be read by technical staff involved in the procurement of externally hosted solutions for Diageo.

NETWORK AND SD-VPN. Meshing legacy and Cloud Service Providers

PrepAwayExam. High-efficient Exam Materials are the best high pass-rate Exam Dumps

University of San Francisco Course Syllabus and Outline

Logical Network Design (Part II)

ClearPath OS 2200 System LAN Security Overview. White paper

Transcription:

Chapter 1 B: Exploring the Network

Types of Networks The two most common types of network infrastructures are: Local Area Network (LAN) Wide Area Network (WAN). Other types of networks include: Metropolitan Area Network (MAN) Wireless LAN (WLAN) Storage Area Network (SAN)

LANs and WANs Local Area Networks (LAN)

LANs and WANs Wide Area Networks (WAN)

The Internet

Intranet and Extranet

Connecting Users to the Internet

Connecting to the Internet Connecting Businesses to the Internet

The Multiple Network Computer networks, telephone networks and broadcast networks can operate on their own.

The Converged Network Multiple networks can be combined into converged networks.

Reliable Network Supporting Network Architecture There are four basic characteristics that the underlying architectures need to address in order to meet user expectations: Fault Tolerance - Fault tolerance is the property that enables a system to continue operating properly in the event of the failure. Scalability network able to expand as needed Quality of Service (QoS) - the overall performance of a telephony or computer network. Security the ability of a system to protect against hacking and security threats.

Reliable Network Fault Tolerance in Circuit Switched Network

Reliable Network Packet-Switched Networks

Scalable (Expandable) Networks

Reliable Network Providing QoS (Quality of Service) Examples of priority decisions for an organization might include: Time-sensitive communication - increase priority for services like telephony or video distribution. Non time-sensitive communication - decrease priority for web page retrieval or email. High importance to organization - increase priority for production control or business transaction data. Undesirable communication - decrease priority or block unwanted activity, like peer-to-peer file sharing or live entertainment.

Reliable Network Providing Network Security

Network Trends New trends Some of the top trends include: Bring Your Own Device (BYOD) Online collaboration Video Cloud computing

Network Trends Bring Your Own Device (BYOD) The concept of any device, to any content, in anyway is a major global trend. This trend is known as Bring Your Own Device (BYOD).

Online Collaboration - meetings

Network Trends Cloud Computing Cloud computing offers the following potential benefits: Organizational flexibility Agility and rapid deployment Reduced cost of infrastructure Refocus of IT resources Creation of new business models

Network Trends Data Centers A data center is a facility used to house computer systems and associated components including: Redundant data communications connections High-speed virtual servers Redundant storage systems Redundant or backup power supplies Environmental controls (e.g., air conditioning, fire suppression) Security devices

Networking Technologies for the Home Powerline Networking

Networking Technologies for the Home Wireless Broadband

Future of Networking Network Security

Network Security Security Threats The most common external threats to networks include: 1. Viruses, worms, and Trojan horses softwares that replicate themselves 2. Spyware and adware 3. Zero-day attacks/zero-hour attacks A zero day vulnerability refers to a hole in software that is unknown to the vendor. This security hole is then exploited by hackers before the vendor becomes aware and hurries to fix it this exploit is called a zero day attack.

Network Security Security Threats The most common external threats to networks include: 4. Hacker attacks 5. Denial of service (DoS) attacks - an attempt to make a machine or network resource unavailable to its intended users 6. Data interception and theft 7. Identity theft

Network Security Security Solutions Network security components often include: Antivirus and anti-spyware Firewall filtering - a firewall is a network security system that monitors and controls the incoming and outgoing network traffic based on predetermined security rules. Dedicated firewall systems Access control lists (ACL) - a list of access control entries that identify a trustee and specifies the access rights allowed, denied, or audited for that trustee.

Network Security Security Solutions Network security components often include: Intrusion prevention systems (IPS) - a network security/threat prevention technology that detects and prevents vulnerability exploits. Virtual Private Networks (VPNs) - extends a private network across a public network or internet. It enables users to send and receive data across shared or public networks as if their computing devices were directly connected to the private network.

END OF CHAPTER 1

CHAPTER 1 B REVIEW 21 Questions

1. What does LAN stand for?

1. What does LAN stand for? Ans : Local Area Network

2. What does WAN stand for? Wide Area Network

3. How are LANs and WANs related?

3. How are LANs and WANs related?

4. What is the difference between Intranet, Extranet and Internet?

4. What is the difference between Intranet, Extranet and Internet? Intranet can only be accessed by authorized users who are employees in an organization. Extranet can only be accessed by authorized users, including employees and nonemployees of an organization.

5. How do people in a country get access to the Internet?

5. How do people in a country get access to the Internet? They can only do so via Internet Service Providers.

6. What are the 3 networks used over the Internet?

6. What are the 3 networks used over the Internet? Computer network Telephone network broadcast network

7. What is the difference between Multiple Networks and Converged Network?

7. What is the difference between Multiple Networks and Converged Networks? Multiple Networks each network operates on its own. Converged Networks all networks are run as one system.

8. What are the four characteristics of underlying network architectures?

8. What are the four characteristics of underlying network architectures? Fault Tolerance - the property that enables a system to continue operating properly in the event of the failure of (or one or more faults within) some of its components. Scalability network able to expand as needed Quality of Service (QoS) - the overall performance of a telephony or computer network, particularly the performance seen by the users of the network. Security the ability of a system to protect against hacking and security threats.

9. What is Fault Tolerance in Circuit Switched Network

9. What is Fault Tolerance in Circuit Switched Network If the number of calls exceed the limit, additional calls will may not get through.

10. What is fault tolerance in Packet-Switched Networks

10. What is fault tolerance in Packet-Switched Networks When traffic is high, communication may be delayed, but will not be denied.

11. What are Scalable Networks

11. What are Scalable Networks Scalable networks are networks that can be expanded.

12. What does providing QoS (Quality of Service) mean?

12. What does providing QoS (Quality of Service) mean? It means providing priority decisions for an organization. Time-sensitive communication - increase priority for services like telephony or video distribution. Non time-sensitive communication - decrease priority for web page retrieval or email. High importance to organization - increase priority for production control or business transaction data. Undesirable communication - decrease priority or block unwanted activity, like peer-to-peer file sharing or live entertainment.

13. Who must networks be protected from?

13. Who must networks be protected from?

14. What are 4 new network trends?

14. What are 4 new network trends? Bring Your Own Device (BYOD) Online collaboration Video Cloud computing

Network Trends Online Collaboration

15. What are some potential benefits of Cloud Computing

15. What are some potential benefits of Cloud Computing Cloud computing offers the following potential benefits: Organizational flexibility Agility and rapid deployment Reduced cost of infrastructure Refocus of IT resources Creation of new business models

16. What are Data Centers

16. What are Data Centers A data center is a facility used to house computer systems and associated components.

17. What devices are found at Data Centers?

17. What devices are found at Data Centers? Redundant data communications connections High-speed virtual servers Redundant storage systems Redundant or backup power supplies Environmental control devices (e.g., air conditioning, fire suppression) Security devices

18. What are 2 trends in home technology?

18. What are 2 trends in home technology? Power Line Networking Wireless Broadband

19. What are the 2 categories of Network Security threats?

19. What are the 2 categories of Network Security threats? Internal threats (employees in organisation) and external threats (people outside organisation)

20. Name 7 external Security Threats

20. Name 7 external Security Threats 1. Viruses, worms, and Trojan horses softwares that replicate themselves 2. Spyware and adware 3. Zero-day attacks/zero-hour attacks. Hacker attacks 5. Denial of service (DoS) attacks - an attempt to make a machine or network resource unavailable to its intended users 6. Data interception and theft 7. Identity theft

21. What are Security Solutions available for use against threats?

21. What are Security Solutions available for use against threats? Network security solutions include: Antivirus and anti-spyware Firewall filtering Dedicated firewall systems Access control lists (ACL) Intrusion prevention systems (IPS) Virtual Private Networks (VPNs)