SlideShare a Scribd company logo
Types of Networks
Week7 Part4-IS
RevisionSu2013
Types of Networks
There are different types of networks. Each type has different
characteristics and
therefore different security needs. Some of the fundamental
differentiating attributes of
the various types of networks are:
the network
ifferent applications supported on the network
Depending on the type of network there may be different
information security
requirements requiring that various protocols, security services,
security mechanisms are
used in a fashion to support that type of network.
While each network environment has some characteristics and
security needs unique to
that environment, there are many security techniques that
should be universally applied to
all environments. For example; sound policies and procedures,
risk assessment of the
assets, user awareness training, encryption technology,
authentication technology, sound
credential (password) selection and protection, malware
protection, firewalls are a few
security techniques that need to be applied in all of the
networks albeit in configurations
that best suits a particular environment.
Local Area Network (LAN)
A LAN network covers a small geographic area that takes
advantage of high speed data
transfers usually implemented through Ethernet or fiber. A LAN
could be a home, office,
group of building with local proximity (university, business).
LANs typically share
resources such as file servers and printers.
Wide Area Network (WAN)
A WAN covers a large geographic area that may require
connection through satellite,
high speed dedicated lines and other means. The internet is a
WAN. WANs can connect
LANs together into a larger organizational structure that can be
used to share resources
such as file, email, dns servers to name a few. Resources can be
shared using slower
connections on geographically separated areas across the WAN.
Wireless Networks and Mobile Networks
The movement to laptop systems at home and workplaces
accelerated the mobility of
computing.
As employees traveled between offices, client sites, home and
various other remote
locations they could remain connected to company servers as
long as the remote site had
connectivity to the companies’ intranet. Initially this
connectivity was provided by
having Ethernet cabling available for remote users to physically
plug their laptops into.
Eventually, companies started installing wireless hotspots that
could be automatically
detected by systems that had wireless cards.
The proliferation of wireless connectivity and internet use
spread from the workplace to
general societal use. Average users demanded access to the
internet and company
intranets. Soon public places such as airports, libraries, train
stations, schools and coffee
shops installed wireless hotspots to allow people internet
access. Some towns and cities
are installing wireless hotspots to allow internet connectivity
for citizens.

Recommended for you

Physical/Network Access Control
Physical/Network Access ControlPhysical/Network Access Control
Physical/Network Access Control

Make presence in a building or area a policy in accessing network resources by integrating physical and network access through the Trusted Computing Group's IF-MAP communications standard.

neywork access controlif-maptrusted computing
Mastering Networking and Cyber Security A Comprehensive Guide.pdf
Mastering Networking and Cyber Security A Comprehensive Guide.pdfMastering Networking and Cyber Security A Comprehensive Guide.pdf
Mastering Networking and Cyber Security A Comprehensive Guide.pdf

Networking and cyber security are deeply intertwined. A well-designed network incorporates security measures at every layer to protect data integrity and availability. Here are ways to integrate networking and cyber security effectively:

networking and cyber securitynetwork security
Network security
Network securityNetwork security
Network security

The biggest threat to network security is underestimating the threat to network security. And as IP networks become the defector standard, ignoring this reality can extract a heavy price down the road.

network security
In addition to wireless hotspots becoming omnipresent the use
of handheld devices is on
the rise. Handheld devices started with cell phones and moved
to higher functionality
devices such as the Blackberry and Palm smart phones which
allowed email access, and
various local applications. The handheld devices have continued
to evolve to higher
functioning devices which provide general internet services as
well as thousands of
applications. Examples of these are the Apple iphone and the
numerous smartphones that
support the Google Android operating system. Of course these
devices still provide
telephone services!
These devices make use of various cellular network
technologies such as GSM (Global
System for Mobile Communications), CDMA (Code Division
Mobile Access) which
conform to 3G and 4G technologies for connectivity.
Types of *NET environments.
The various types of network environments can be deployed
into different types of
interconnected environments. We should not think of all
interconnected computers as the
internet. Depending on the allowable members and systems of
an inter-connected
environment the environment may be termed: “internet”, the
“intranet” or the “extranet”.
Internet
The internet is global network of interconnected computers and
computer networks. The
systems that are members of the internet use the standard
“internet protocol suite” which
is TCP/IP, however not all applications use TCP/IP. The
internet serves billions of users
worldwide.
Intranet
An intranet is a private global network of interconnected
computers and computer
networks that is used by an organization. It uses all the
protocols used in the internet only
the scope of the network is within the organization.
Extranet
An extranet is a private global network of interconnected
computers and computer
networks that is used by an organization. It uses all the
protocols used in the internet. It
differs from an intranet in that it expands connectivity to other
users, suppliers,
organizations through secure protocols to facilitate information
exchange and
communication.
Summary
These networks continue to grow in complexity. These networks
exist in an endless
number of different configurations which all share the same
requirement which is to be
secure. To add to the complexity of the networks, devices are
being deployed into
virtualized environments, some of which are deployed to the
Cloud Computing
environment. The added dimensions of virtualization and cloud
deployments raise the
complexity of securing these environments.
As the network complexity grows the complexity for securing
the environment grows.
The preferred approach to implementing security in these ever
increasing complex
environments is a strategy of security in depth.
Security Architecture for OSI
Week7 Part3-IS
RevisionSu2013
Security Architecture for OSI
The ITU (International Telecommunications Union) is a United
Nations sponsored
agency which develops standards (called recommendations) for
telecommunications and
open systems interconnection (OSI). Recommendation X.800,
Security Architecture for
OSI defines a systematic approach for the manager and
technical professional responsible
for implementing security in a network, communications or
computer environment to

Recommended for you

Module 3.Infrastructure and Network Security:
Module 3.Infrastructure and Network Security:Module 3.Infrastructure and Network Security:
Module 3.Infrastructure and Network Security:

Module 3 Lectures 6 hrs. Infrastructure and Network Security: Introduction to System Security, Server Security, OS Security, Physical Security, Introduction to Networks, Network packet Sniffing, Network Design Simulation. DOS/DDOS attacks. Asset Management and Audits, Vulnerabilities and Attacks. Intrusion detection and Prevention Techniques, Host based Intrusion prevention Systems, Security Information Management, Network Session Analysis, System Integrity Validation. Open Source/ Free/ Trial Tools: DOS Attacks, DDOS attacks, Wireshark, Cain & abel, iptables/ Windows Firewall, snort, suricata, fail2ban

notestechnology
Module 3.pdf
Module 3.pdfModule 3.pdf
Module 3.pdf

This document provides an overview of various topics related to cyber security including infrastructure and network security, system security, server security, operating system (OS) security, physical security, network packet sniffing, network design simulation, denial of service (DOS) and distributed denial of service (DDOS) attacks, asset management and audits, intrusion detection and prevention techniques, host-based intrusion prevention systems, security information management, network session analysis, system integrity validation, and some open-source, free and trial tools that can be used for security purposes like DOS/DDOS attacks, packet sniffing, firewalls, and intrusion detection.

cybersecurity
Cloud technology to ensure the protection of fundamental methods and use of i...
Cloud technology to ensure the protection of fundamental methods and use of i...Cloud technology to ensure the protection of fundamental methods and use of i...
Cloud technology to ensure the protection of fundamental methods and use of i...

A comparative analysis of attacks carried out in cloud technologies, the main methods and methods of information protection, the possibilities of using hardware and software, and methods to combat threats when eliminating them, ensuring data protection were carried out by Mamarajabov Odil Elmurzayevich 2020. Cloud technology to ensure the protection of fundamental methods and use of information. International Journal on Integrated Education. 3, 10 (Oct. 2020), 313-315. DOI:https://doi.org/10.31149/ijie.v3i10.780 https://journals.researchparks.org/index.php/IJIE/article/view/780/750 https://journals.researchparks.org/index.php/IJIE/article/view/780

cloudcloud technologycomputing
systematically define the requirements for security and to
characterize various approaches
to implement functionality that satisfies the requirements.
The framework provided by the architecture categorizes the
elements of security into
security attacks, security services and security mechanisms.
A Security Attack is an action that compromises the information
owned or entrusted to
the organization. The compromise affects some attribute of the
CIA triad.
A Security Service is a collection of functionality (routines,
programs, algorithms,
specifications) that provides support for various aspects of
security: In order to protect a
network from attack, mechanisms need to be implemented that
support each of these
services to the extent they are needed in the target environment.
Security services are
implemented by making use of one or more security
mechanisms.
Security Services:
cating entity is
the one they
claim to be.
resource.
unauthorized disclosure.
a are
available.
sent/received/stored is
exactly as it was sent/received/stored by the authorized entity.
parties in a
communication that they sent or received all or part of it.
observation and
logging of system activity.
The security services enumerated above are categories of
services that are further divided
into specific services that apply to different aspects of a
service. For example; the
authentication service is divided into two specific services peer
entity authentication and
data origin authentication. Peer entity authentication involves
each party in a logical
connection being able to confirm to some degree of confidence
the identity of the other
party. Data origin authentication is used in a connectionless
transfer such that the
recipient of the data can be confident in the identity of the
sender.
RFC 2828 provides the following definition for a security
service:
Definition: Security Service: A processing or communication
service that is
provided by a system to give a specific kind of protection to
system resources;
security services implement security policies by using security
mechanisms.
A Security Mechanism is a particular technique or set of
techniques that are used to
implement a security service.
Security mechanisms are divided into two groups: specific
security mechanisms and
pervasive security mechanisms. A specific security mechanism
is implemented in a
particular protocol layer or layers (e.g. TCP and/or application
layer, etc.) to provide a
security service. For example: encipherment is a specific
security mechanism that could
be implemented at various protocol layers. Encipherment may
be implemented at the
application level using PGP, the transport layer using SSL and
the IP layer using IPsec.
Specific Security Mechanisms:
encrypt and
decrypt
information. Supports authentication, data confidentiality, data
integrity.
value and append
it to a data object such that any recipient of the data can verify
the data's
origin and integrity.
resource
(control, data) from unauthorized use in accordance by the

Recommended for you

Network security model.pptx
Network security model.pptxNetwork security model.pptx
Network security model.pptx

Network security involves protecting networks from unauthorized access and risks. It is important for network administrators to take preventive measures to secure networks used by individuals, businesses, and governments. There are various types of network security devices that fulfill different functions like blocking surplus traffic (active devices), identifying unwanted traffic (passive devices), and scanning for potential problems (preventative devices). Firewalls are a key example of an active device that establishes a barrier between internal and external networks and regulates incoming and outgoing traffic.

Kamal Jyoti V3I5-0161
Kamal Jyoti V3I5-0161Kamal Jyoti V3I5-0161
Kamal Jyoti V3I5-0161

This document discusses security issues in grid computing and proposes an enhanced amalgam encryption approach. It begins with an overview of distributed, cloud, and grid computing. Grid computing involves coordinating shared resources across distributed, heterogeneous environments. Major security issues in grid computing include integration with existing security systems, interoperability across domains, and establishing trust relationships. The document then discusses cryptography approaches used to provide security, including symmetric and asymmetric encryption. It proposes a hybrid encryption solution combining AES and RC4 algorithms to address overhead limitations of previous approaches for large distributed networks like smart grids.

Paper id 27201448
Paper id 27201448Paper id 27201448
Paper id 27201448

This document summarizes a research paper that proposes a security architecture for cloud computing that dynamically configures cryptographic algorithms and keys based on security policies and inputs like network access risk and data sensitivity. The architecture aims to improve security while reducing costs by only using the necessary level of encryption for each situation. It describes using the Blowfish algorithm instead of AES and adjusting the key size from 128 to 448 bits depending on factors like network type and data size. Results show Blowfish has better performance than AES, especially with larger keys on larger amounts of data. The goal is to provide flexible, efficient security tailored to each user's needs.

systems
security policy.
unauthorized changes
to data, both malicious and accidental.
identity of an
entity.
frustrate
analysis of the data stream.
s mechanisms to control the path
data takes
from source to destination to ensure secure transmission of data.
for the
integrity of a data exchange (i.e. Digital Certificates)
Pervasive security mechanisms are not specific to any protocol
layer or security service.
The mechanism is implemented in any protocol layer and for
any service.
Pervasive Security Mechanisms:
g
an action to
be taken.
audit record
of security activity.
recovery from
various events.
ITU-T X.800 Security Architecture for OSI can be found at:
http://www.itu.int/rec/T-
REC-X.800-199103-I/en
http://www.itu.int/rec/T-REC-X.800-199103-I/en
http://www.itu.int/rec/T-REC-X.800-199103-I/en
Layers and Protocols
Week7 Part2-IS
Revision Spring2014
Layers and Protocols
Since the layers of the OSI reference model do not match the
TCP/IP layers exactly we
need to modify how we think about the OSI layers in the context
of TCP/IP. The
terminology of the OSI reference model helps us understand the
functions and divisions
between each layer. As the discussion moves to reference an
actual implementation we
need to learn about the terminology and details of that
implementation, which in this case
is TCP/IP. Numerous protocols have been listed with each layer
to familiarize you with
the layer the protocol operates at and to provide a sense for the
number of protocols there
are. These are a sampling of the protocols.
Credit to TCP/IP Network Administration by O’Reilly for
assistance in organizing thoughts and
some diagrams.
Application Layer: User accessed programs and processes are
accessed from this layer. In
TCP/IP any application that occurs above the transport layer is
an application. Any
program a user directly interacts with, as well as various
services a user may not be aware
of (i.e. daemons, services) is at this layer.
Note – some applications are associated with well-known port
numbers to establish host
to host communications using TCP/IP. The port numbers for
some of the sample
applications are included below.
Examples of application protocols:
- Port 25
– HyperText Transfer Protocol – Port 80
– HyperText Transfer Protocol Secure
– Ports 161 and 162
TP – Ports 20 and 21
– Port 23
- Mail delivery
– Secure shell

Recommended for you

Network security architecture is the planning and design of the camp.pdf
Network security architecture is the planning and design of the camp.pdfNetwork security architecture is the planning and design of the camp.pdf
Network security architecture is the planning and design of the camp.pdf

Network security architecture is the planning and design of the campus network to reduce security risks in accordance with the institution’s risk analysis and security policies. It focuses on reduc-ing security risks and enforcing policy through the design and con-figuration of firewalls, routers, and other network equipment. Network security is important because it is one of the means to enforce the policies and procedures developed by the institution to protect information. It is often referred to as the “front door” in broader discussions of IT security. To the extent that you can block network access to a computer, you “lock” the door and provide bet-ter protection for that computer and its contents. Traditional network design has focused on creating a secure net-work perimeter around the organization and strategically placing a firewall at the point where the network is connected to the Inter-net. For higher education, this traditional design is problematic; our constituents need access from off campus to a large number of machines and services on campus. In addition, because we have many computers on our campus that we cannot implicitly trust, we also must be concerned about security threats from inside the perimeter protected by a traditional firewall. These design issues require a different approach to network security. Although it is impossible to do justice to the topic of network design in a few pages, there are some best practices that I feel universities should focus on in terms of network design. Step 1: Eliminate Network Components That Still UseShared Ethernet Shared Ethernet switches (or hubs) were developed more than a decade ago to interconnect multiple computers and networks. These hubs retransmit all network traffic to all computers connected to that hub. The security implication is that if one computer has its security compromised it can be used to monitor network traffic com-ing from any other computer that shares the same hub. This could expose passwords and other sensitive information. Today, switched Ethernet, which isolates traffic intended for one computer from the view of others on the same switch, is very inexpensive and, hence, it is worth the cost of replacing older hubs. Step 2: Embrace and Implement the Concept of Defense and Use Multiple Firewalls Within Your Network Commercial and Linux-based firewalls are inexpensive enough that you can deploy these in multiple locations as needed. It is still bene-ficial to have a firewall separating your institutional network from the connection to the Internet. This firewall, called a border firewall, will provide a minimal level of protection for all computers on your net-work. The major benefit of this firewall is that it allows your network and security staff to quickly block external access should a threat arise, such as when the “SQL worm” was launched in January 2003 In addition to the border firewall, consider adding internal firewalls to protect areas that requi.

Final ppt ecommerce
Final ppt ecommerceFinal ppt ecommerce
Final ppt ecommerce

The document discusses various aspects of securing e-commerce networks. It describes digital certificates which serve to verify identity and are issued by a certification authority. There are four main types of digital certificates. The document also discusses selecting network security technologies based on principles like defense in depth. Technologies discussed for securing networks and protocols include firewalls, intrusion detection systems, virtual private networks, secure sockets layer (SSL), secure hypertext transfer protocol (HTTPS), and public key infrastructure.

Infrastructure SecurityChapter 10Principles of Compute.docx
Infrastructure SecurityChapter 10Principles of Compute.docxInfrastructure SecurityChapter 10Principles of Compute.docx
Infrastructure SecurityChapter 10Principles of Compute.docx

Infrastructure Security Chapter 10 Principles of Computer Security, Fifth Edition Copyright © 2018 by McGraw-Hill Education. All rights reserved. Objectives (1 of 2) Construct networks using different types of network devices. Enhance security using security devices. Understand virtualization concepts. Enhance security using NAC/NAP methodologies. Identify the different types of media used to carry network signals. Describe the different types of storage media used to store information. Principles of Computer Security, Fifth Edition Copyright © 2018 by McGraw-Hill Education. All rights reserved. 2 Objectives (2 of 2) Use basic terminology associated with network functions related to information security. Describe the different types and uses of cloud computing. Principles of Computer Security, Fifth Edition Copyright © 2018 by McGraw-Hill Education. All rights reserved. 3 Key Terms (1 of 3) Basic packet filtering Bridge Cloud computing Coaxial cable Collision domain Concentrator Data loss prevention (DLP) Firewall Hypervisor Hub Infrastructure as a Service (IaaS) Internet content filters Load balancer Modem Network access control Principles of Computer Security, Fifth Edition Copyright © 2018 by McGraw-Hill Education. All rights reserved. Basic packet filtering – Filtering that looks at each packet entering or leaving the network and then either accepts the packet or rejects the packet based on user-defined rules. Each packet is examined separately. Bridge – A network device that separates traffic into separate collision domains at the data layer of the OSI model. Cloud computing – The automatic provisioning of on demand computational resources across a network. Coaxial cable – A network cable that consists of a solid center core conductor and a physical spacer to the outer conductor which is wrapped around it. Commonly used in video systems. Collision domain – An area of shared traffic in a network where packets from different conversations can collide. Concentrator – A device used to manage multiple similar networking operations, such as provide a VPN endpoint for multiple VPNs. Data loss prevention (DLP) – Technology, processes, and procedures designed to detect when unauthorized removal of data from a system occurs. DLP is typically active, preventing the loss of data, either by blocking the transfer or dropping the connection. Firewall – A network device used to segregate traffic based on rules. Hypervisor - A low-level program that allows multiple operating systems to run concurrently on a single host computer. Hub – A network device used to connect devices at the physical layer of the OSI model. Infrastructure as a Service (IaaS) – The automatic, on-demand provisioning of infrastructure elements, operating as a service; a common element of cloud computing. Internet content filters – A content-filtering system use to protect corporations from employees’ viewing of inappropriate or illegal content at the workplace.

Presentation Layer: How data is represented needs to agreed to
by cooperating
applications. Applications typically take care of this job in
TCP/IP; however there is
standardization around various presentation protocols (i.e.
MIME, TIFF, JPEG).
Examples of presentation protocols:
– American Standard Code for Information
Interchange
– Extended Binary-Coded Decimal Interchange
Mode
FF – Tagged Image File Format
– Joint Photo Experts Group
– Motion Picture Experts Group
– Musical Instrument Digital Interface
– Graphic Interchange Format
Session Layer: There is no separately identifiable session layer
in the TCP/IP protocol
hierarchy. That is not to say session functions do not exist in
TCP/IP as they certainly do.
In TCP/IP session management for the most part occurs at the
TCP/IP layer. The
mechanisms used for session communication in TCP/IP are
called ports and sockets.
Some protocols that are considered session layer protocols are:
– Network File System
– Structured Query Language
– Remote Procedure Call
Transport Layer: Much of the discussion around TCP/IP occurs
at the transport layer. It
is important to note that in TCP there are two transport
services: TCP and UDP. TCP
provides a connection based, reliable, guaranteed data delivery
across the network. UDP
(User Data Protocol) provides an unreliable, connectionless
protocol. UDP has little
protocol overhead so it is very efficient. For sending short
amounts of information very
quickly UDP may be preferred. If information is dropped or lost
during transmission it is
easier to resend the data than to set up a TCP connection.
Between the two protocols there is different terminology used to
describe the data that is
transmitted. Note the differences are at the application and
transport layers.
Examples of Transport layer protocols:
– Transmission Control Protocol. Connection-oriented,
full-duplex,
guaranteed delivery, unit of transmission is called TCP Segment
– User Datagram Protocol. Connectionless, no
guaranteed delivery ,
minimal overhead, unit of transmission is called UDP Packet
Network Layer: This layer manages connections across the
network. It isolates the upper
level protocols from the details of the underlying network. In
TCP/IP this function is
implemented by IP (Internet Protocol), It takes care of IP
addressing and routing the data
from network to network.
Examples of Network Layer Protocols:
– Connectionless, 32-bit/4 byte address
– 128 bit/16 byte address. More security features than
IPv4.
– Internet Control Message Protocol – Used by IP and
other connectionless
protocols to detect and react to transmission errors. ICMP used
to: report
network/routing failures; test node reachability; increase
routing efficiency
(informs routers of better routes; and informs source when
datagram has exceeded
time to exist.
– Routing Information Protocol – Internal routing
protocol within an AS.
Decides based on number of hops, doesn’t consider line
utilization or bandwidth.
– Open Shortest Path First – Internal routing protocol
within an
autonomous system

Recommended for you

Security assignment (copy)
Security assignment (copy)Security assignment (copy)
Security assignment (copy)

The document discusses security measures taken by the ICT directorate of Addis Ababa Science and Technology University. They use a FortiGate 1200D firewall to secure their internal network and servers from threats. They also use Kaspersky antivirus software, implement backup and fault tolerance systems, and take steps to secure their web, database, and mail servers. The staff follow security checklists that include keeping systems updated, implementing firewalls and SSL, encrypting connections, securing user logins and databases, and scanning for malware.

Security Attacks And Solutions On Ubiquitous Computing Networks
Security Attacks And Solutions On Ubiquitous Computing NetworksSecurity Attacks And Solutions On Ubiquitous Computing Networks
Security Attacks And Solutions On Ubiquitous Computing Networks

This document discusses security challenges in ubiquitous computing environments. It begins by defining ubiquitous computing as involving the integration of computing technology into everyday objects and environments. This allows information access from any device at any time, but also increases security risks. The document then outlines some common ubiquitous applications like smart homes. It identifies key security issues like lack of authentication, unauthorized access, and privacy concerns. Finally, it discusses challenges in ubiquitous security including how the expanded computing environment impacts traditional security methods and introduces new privacy and trust issues.

Lecture 07 networking
Lecture 07 networkingLecture 07 networking
Lecture 07 networking

This document discusses network security standards organizations like NIST and ISO, as well as key security concepts like threats, attacks, security services, and security mechanisms. It provides examples of cryptographic techniques like symmetric and public key encryption. It also summarizes standards for wireless security under IEEE 802.11i and the use of firewalls to filter network traffic and protect sites.

c++
– Border Gateway Protocol – Exterior routing protocol
between autonomous
systems
Stream
Segment
Datagram
Frame
Message
Packet
Datagram
Frame
TCP UDP
Application layer
Transport layer
Internet layer
Network Access
layer
– Internet Group Management Protocol – allows hosts
to participate in
multicasting.
– The most secure tunneling protocol. Is an integrated
part of IPv6 and add-
on for IPv4.
– Simple Key Exchange for IP
– Internet Key Exchange
– Internetwork Packet Exchange Protocol
Data Link Layer: The reliable delivery of data across the
physical network is handled by
the data link layer. IP tends to make use of existing data link
protocols.
– MAC Layer
– MAC Layer
– MAC Layer
– Serial Line Internet Protocol
– Point-to-Point Protocol (replaced SLIP) – encapsulates
to go across serial
lines. Not routable over Internet. Has header & data
compression, error
correction, different auth protocols, and encapsulates more than
IP. Uses PAP,
CHAP, or EAP to authenticate to Net Access Server (NAS).
– Address Resolution Protocol - IP passed down from
upper layers, DL
needs to resolve it into a MAC (hardware) address in order to
put into the MAC
address in the header portion of the frame. ARP broadcasts a
frame with the IP in
it, the one with that IP address responds with its MAC.
Addresses are cached in
ARP table. ARP Poisoning – type of masquerade, alter ARP
table to point to
attacker’s own MAC.
– Reverse Address Resolution Protocol. Used by
diskless machines to get
IP address. Booting system broadcasts a RARP with its MAC
address, and RARP
Server responds with an assigned IP.
– Enhancement to RARP. In addition to IP address,
BOOTP server also
provides diskless workstation with its DNS server address, and
default gateway
address.
– Dynamic Host Configuration Protocol
– Layer 2 Forwarding
– Layer 2 Tunneling Protocol (typically services are
combined IPsec)
–
– Integrated Services Digital Network
–
– Synchronous Data Link Control
– Link Access Procedure
– Link-Access Procedure-Balanced
– High-Level Data Link Control, extension of SDLC,
encapsulation used
in X.25
– Password Authentication Protocol
– Challenge Handshake Protocol
- Extensible Authentication Protocol
Physical Layer: This layer defines the physical characteristics
of the equipment needed to

Recommended for you

Internet Protocol Security as the Network Cryptography System
Internet Protocol Security as the Network Cryptography SystemInternet Protocol Security as the Network Cryptography System
Internet Protocol Security as the Network Cryptography System

Internet Protocol Security (IP Security) is a security protocol that serves to secure information in the event of an exchange on the internet. It happens if there is a connection between private IP and public IP. This protocol will exchange packets on the IP layer safely. It provides two types of encryption options, transport, and tunnel. Transport mode will encrypt the data section without changing the packet header. The algorithm used to encrypt data is a symmetric cryptography algorithm. This protocol authenticates and encrypts every packet from a data transmission session. Also, it can generate keys between the sender and the recipient at the first time it is activated and can negotiate the cryptographic keys that will be used during the session. IP Security is an end-to-end cryptosystem that works at the internet layer of the Internet Protocol Suite. The protocol serves to protect the data flow in host-to-host, network-to-network, and network-to-host as well.

computer scienceinformation securitynetwork
Smart Grid Cyber Security
Smart Grid Cyber SecuritySmart Grid Cyber Security
Smart Grid Cyber Security

This document discusses the cyber security risks of smart grids and proposes an integrated security framework to address these risks. Smart grids integrate information infrastructure with electrical infrastructure, improving performance but also increasing vulnerability to cyber attacks. The framework features security agents, managed security switches, and a security manager to provide layered protection, intrusion detection, and access control across the power automation network in a scalable and extensible manner. This integrated approach is needed as power systems have different security needs than traditional IT networks.

scadasmart gridcyber security
Critical Response Rubric Category 0 1 1.5 2 Timelin.docx
Critical Response Rubric Category 0 1 1.5 2 Timelin.docxCritical Response Rubric Category 0 1 1.5 2 Timelin.docx
Critical Response Rubric Category 0 1 1.5 2 Timelin.docx

Critical Response Rubric: Category 0 1 1.5 2 Timeliness late On time Delivery of Critical Response Utilizes poor spelling and grammar; appear “hasty” Errors in spelling and grammar evidenced Few grammatical or spelling errors are noted Consistently uses grammatically correct response with rare misspellings Organization Unorganized. A summary of the chapter. Unorganized in ideas and structure. Some evidence of organization. Unorganized in either ideas or structure. Primarily organized with occasional lack of organization in either ideas or structure. Clear organization. Ideas are clear and follow a logical organization. Structure of the response is easy to follow. Relevance of Response (understanding the chapter) Lacks clear understanding of the chapter Occasionally off topic; short in length and offer no further insight into the topic. Lacking 2 or more of the following: (1) The text assumptions (2) implications of the assumptions (3) what the author is arguing for (4) how the author constructs their argument Related to chapter content; lacks one of the following: (1) The text assumptions (2) implications of the assumptions (3) what the author is arguing for (4) how the author constructs their argument Clear understanding of chapter content and includes all of the following:(1) The text assumptions (2) implications of the assumptions (3) what the author is arguing for (4) how the author constructs their argument Expression within the response (evidence of critical thinking) Does not express opinions or ideas about the topic Unclear connection to topic evidenced in minimal expression of opinions or ideas Opinions and ideas are stated with occasional lack of connection to topic Expresses opinions and ideas in a clear and concise manner with obvious connection to topic Story 2 Naming, walking and magic By Carlos Gonzalez The words you speak become the house you live in.—Hafiz (Ladinsky, 1999, p. 281) Brazilian lyricist and novelist, Paulo Coelho, says that magic is a kind of bridge between the visible and invisible (2014). My work as a teacher and my students’ experiences in the learning spaces I help create sometimes reflect Coelho’s definition. In class, I often make the argument that language is the ultimate form of magic. Without it we don't really understand the world about us. It is that bridge between what is known and what wants to be known or is currently invisible. In our sessions, because most of my students are familiar with and culturally rooted in the Bible, I mention a passage where God tells Adam to name the animals in the Garden of Eden. For me, this story works as a powerful reminder that the impulse to name is an integral part of what it means to be human. The naming of the animals implies that the way we relate to the world has something to do wi.

carry signals across the communications/network system.
Examples of protocols and standards that operate at this layer
are:
– High Speed Serial Interface
Encapsulation of data
As in the OSI reference model data is passed down the stack
when being sent to the
network. When it is received it is passed up the stack. To show
how data is actually
passed we will use the TCP/IP layers since it represents an
actual implementation.
Consider the example where Machine 1 at the application level
creates data. It passes the
data to the layer below it (transport layer). The transport layer
creates its data and
encapsulates the data from the application data and passes it to
the internet layer. This
process continues down the protocol stack on machine 1 by the
internet layer passing the
data down to the network access layer. Once the network access
layer is reached the data
is transmitted on the network to Machine 2.
When Machine 2 receives the data it is at the lowest layer in the
protocol stack. The
lower level deals with the network access protocol data from the
sending machine
(Machine 2) and unwraps (removes the encapsulating protocol)
and passes the remaining
data to the layer above it which is the internet layer. The
internet layer unwraps (removes
the encapsulating protocol) and passes the remaining data to the
layer above it (Transport
layer). This continues up the protocol stack on Machine 2 by the
Transport layer
unwrapping its data and passing the remaining data to the
Application layer.
One of the elegant features of the protocol stack is how the
protocols are nested for
transmission. Each layer has its own independent structures.
Conceptually, a layer is not
aware of the data used in the adjacent layers (layers above or
below it). Each layer has its
own data structures, and there own terminology for describing
the data structure. This is
all described in the RFC standards for each protocol.
Data is encapsulated by the layer by placing a “header” in front
of the data it is
transmitting. The header makes the data understandable to that
layer. For any given layer
the data structure consists of a header and data. As you move
down the stack headers are
added in front of the data. As you move up the stack the header
for a given layer is
“removed” yielding the “data” which is passed back up the
stack. Of course the next layer
in the stack is interpreting that “data” as a “header” followed by
“data”.
Machine 1 Machine 2
Transmitted over
Network
Application
Transport
Internet
Network
Access
Application
Transport
Internet
Network
Access
Encryption at Various Protocol Layers
Encryption can be implemented at various protocol layers in the

Recommended for you

Critical Response Rubric- Please view the videos provided on Asha De.docx
Critical Response Rubric- Please view the videos provided on Asha De.docxCritical Response Rubric- Please view the videos provided on Asha De.docx
Critical Response Rubric- Please view the videos provided on Asha De.docx

Critical Response Rubric- Please view the videos provided on Asha Degree. The first, Trace Evidence, is a descriptive trace of the evidence in the case. The second video is the FBI clip hat includes Asha's parents. The Third clip is an experimental walk of the route Asha is claimed to have took that night. SAY HER NAME EXAMPLE- Simply provide a name an incident where violence was inflicted on a Black Female Body (since we've acknowledged Breonna Taylor, please research and find someone else that the class can be made aware of. One page double space (thoughts)/response . https://www.youtube.com/watch?v=Ih5RUlzJjZI https://www.youtube.com/watch?v=Y-9FtGTRWnk https://www.youtube.com/watch?v=f30w54xfxiI .

Critical Reflective AnalysisIn developing your genogram and learni.docx
Critical Reflective AnalysisIn developing your genogram and learni.docxCritical Reflective AnalysisIn developing your genogram and learni.docx
Critical Reflective AnalysisIn developing your genogram and learni.docx

Critical Reflective Analysis In developing your genogram and learning plan you were required to collect significant personal data that has influenced your lifestyle and consequently your personal health and wellness. Looking at this information and your personal learning plan a meaningful event must have come to mind. This event would have been an incident that probably impacted your lifestyle in a negative fashion; as an example a divorce, an accident or a sudden death of a family member from familial links. How did this affect your overall health using the six dimensions of wellness?  How does the research support the findings?  What does this mean for you?  With the knowledge you have gained how has this changed your perspective? Why? What changes will you make?Using the LEARN headings write a critical analyses highlighting the abstract ideas underlying your reflection.  Use specific details and at least three references to defend your conclusions. Criteria for Evaluation and GradingFormat: 5 pages (excluding title and reference page) 12 font Arial or Times New Roman Double spaced Minimum of 3-4 references APA format (link) Submit in a Word.doc document LEARN HEADINGS Look Back Present a meaningful event Outline event concisely Elaborate Summarize event in detail (what happened, who was involved, where the event occurred, your involvement) Describe personal feelings and perceptions of self and others Analyze Identify one key issue to analyze Use literature as a guide with at least 3 evidence based journal articles Compare and contrast the event with knowledge acquired in reading Discuss the new perspective (view) you have acquired through the literature Revise Refer back to your acquired knowledge and analysis Explain how you would preserve or change your perspective Discuss rationale for considering the change in your life Suggest alternative strategies you are presently using as a result of this analysis New Perspective Identify recommendations for future revision of your lifestyle Guidelines to assist reflective writing: Occasion for reflection: (an experience – seen, read, heard) Presents experience through use of concrete, sensory language, quotations and narrative accounts Shows depth of thought Indicates creativity Reflection ( exploration and analyzes) Reveals feelings and thoughts through presentation of the experience Conveys evidence of a personal response to the experience Enables reader to understand the abstract ideas underlying the reflection through use of specific detail Demonstrates good meta-cognition Writing Strategies Uses convincing language and scenarios to detail reflection Uses comparison and imagery Enhances reflection through contrasting and explaining possibilities Makes inferences Develops new ways of reflecting upon nursing and nursing practice Coherence and style: Demonstrates insight through natural flow of ideas P.

Critical Reflection Projectzzz.docx
Critical Reflection Projectzzz.docxCritical Reflection Projectzzz.docx
Critical Reflection Projectzzz.docx

Critical Reflection Project z z z z Major parts Orient the reader Identify the focus/purpose of the book Outline the scope of your paper Topic sentence 1 Discuses the theme (theme 1) with supporting details Concluding sentence Topic sentence 2 Discuses the theme (theme 2) with supporting details Concluding sentence Conclude by restating the thesis, summarizing the argument, and making application Address the themes from biblical point of view Paragraphs Outline Introduction Body Conclusion z Introduction (Example) I am a White privileged, American, who is loved, and who is attending the college of her dreams. I live with three younger siblings who do not fit that description. We live in the same house; they are American, loved, attending an amazing high school, privileged, but what is missing? The answer is the color of their skin; I am White and they are Black. My three youngest siblings are adopted from various parts of the United States as well as Africa, and their lives are worlds apart from mine; yet, we live feet apart. I am never afraid to walk home from school or get arrested by the cops, and yet I will be walking home with my 6’0, line man sized, African American little brother and people will cross to the other side of the street. Whole families have crossed in the middle of the road to avoid passing next to us. I know for a fact most of my friends do not worry about their little brother coming home safe because he has the build of the boys you hear about on television being beaten to death—because he has the skin color of the boys on television. The New York Times best seller, “The New Jim Crow: Mass Incarceration in the Age of Colorblindness” by Michelle Alexander works to give an explanation for the phenomenon that has been splashed across the news left and right. This movement is known as the “Black Lives Matter” movement that has the purpose of fighting back against the racism in our society: the human rights and dignity many people of color feel they are denied. There is a problem in our society that needs to be addressed because lives are on the line; and, I feel that the Black Lives Matter movement is not effectively or gracefully working to solve this problem as God intended. My purpose for this paper is to argue that our society is not seeing the new racism that is running rampant; that God did not intend for any sort of racism; and, finally conclude with our society should be called into action, especially the believers. For this paper, it will be broken up into three different sections: Michelle Alexander’s book, the corresponding Bible passages, and concluded with the application section. z Body (example) “The New Jim Crow: Mass Incarceration in the Age of Colorblindness” is a book by Michelle Alexander, whose main argument is “that mass incarceration is, metaphorically, the New Jim Crow.” Some background to explain this statement is Jim Crow laws were a set of laws that barred African Americans from ha.

OSI stack. Typical
encryption models are “end to end” encryption and “link level”
encryption. It is
worthwhile to differentiate the implications of encrypting at the
various levels.
Following is a diagram credited to: Encryption in relation to the
protocol layers (Source:
based on King and Newson, 1999, p. 104). This diagram
provides a clear picture of
where encryption occurs in the protocol stack.
Data
Data
Data
Data
Header
Header Header
Header Header Header
Application Layer
Transport Layer
Network Access Layer
Internet Layer
Send Receive
End-to-End Encryption
End-to-end encryption is also known as application layer
encryption. Encryption is
implemented at the highest layer of the OSI stack. A protocol
example of end-to-end
encryption is the sending and receiving of encrypted email
using services such as PGP or
S/MIME. Other examples of end-to-end encryptions are
applications such as: SHTTP
(secure hypertext transfer) or SET (Secure Electronic
Transactions). You could think of
this as encryption occurring between processes. With
application layer encryption the
routing information is not encrypted. Since the encryption
occurs at the highest protocol
layer as the data is passed down the stack to lower layers
routing information is
prepended to support routing between intermediate hosts. The
routing information is not
encrypted and therefore exposed to an attacker. Therefore,
while the data is encrypted,
the traffic pattern is not encrypted and could be captured and
analyzed by an
eavesdropper.
With end-to-end encryption keys must be exchanged by each
pair of application users.
This is in contrast to link layer encryption where encryption
keys are exchanged between
hosts. The number of encryption keys for distribution and
management is an area of
concern.
Transport/Network Encryption
With IPsec encryption occurs at the Network and IP layers of
the stack. With IPsec
security associations can be set up between hosts and devices
with IP addresses and port
numbers. This permits a more granular policy than link layer
encryption. While the end-
points in Transport/Network encryption are not as wide as
Application encryption it is
considered in the above diagram as end-to-end encryption.
Link Layer Encryption
Link layer encryption occurs at both ends (incoming and
outgoing) of each
communications link such as a frame relay switch or a router.
This provides a high level
of security but it does require a lot of encryption devices. Since
the message is decrypted
each time it enters an encryption device there is a window the
data is exposed to
eavesdroppers before the data is re-encrypted for the next hop.
When sending data across
the internet the user has no control over the security
implemented at various hosts (hops)
along the route. For intranets or extranets link layer encryption
may be adequate since the
infra-structure is under the management and control of the
organization but when
information is sent outside an organization link layer encryption
may not be adequate.

Recommended for you

Critical reflection on the reading from Who Speaks for Justice, .docx
Critical reflection on the reading from Who Speaks for Justice, .docxCritical reflection on the reading from Who Speaks for Justice, .docx
Critical reflection on the reading from Who Speaks for Justice, .docx

This document discusses a reading from the book "Who Speaks for Justice, Part 5: Culture" and encourages critical reflection on culture. It prompts students to think about why cultural beliefs and behaviors exist, rather than just what they are or when they occur. Students are asked to consider what culture they practice, where it came from, how it impacts their own actions and thinking, and how it affects others. The reading suggests that cultural and social influences do not provide definite explanations for why societies are a certain way and calls for mindfulness of cultural norms and patterns of behavior.

Critical Reflection ExerciseStudents are expected to have co.docx
Critical Reflection ExerciseStudents are expected to have co.docxCritical Reflection ExerciseStudents are expected to have co.docx
Critical Reflection ExerciseStudents are expected to have co.docx

Critical Reflection Exercise Students are expected to have completed the assigned readings each week and be prepared to comment critically. Rather than providing mere summaries of course readings, students will be asked to analyze and synthesize information from the assigned readings while reflecting on their own lived experiences using personal examples, situations they observe in organizations and within their communities, and current events. Students will submit a three page, double-spaced critical reflection of the assigned readings.  Assigned Readings: * For the Second Reading, just Chapter 1 & 2 .

Critical Reading StrategiesThe University of Minnesota published.docx
Critical Reading StrategiesThe University of Minnesota published.docxCritical Reading StrategiesThe University of Minnesota published.docx
Critical Reading StrategiesThe University of Minnesota published.docx

Critical Reading Strategies The University of Minnesota published a guideline on critical reading, called Critical Reading Strategies.  Click here (Links to an external site.)Links to an external site. for the document. These guidelines suggest reading in an active and engaged way in order to analyze, evaluate, and understand texts. They recommend: 1. Identifying what you're reading for. Answer the following questions: 1. Why am I reading this text? Is it for general content? To complete a written assignment? To research information?  2. Allowing yourself enough time to read. I recommend giving yourself about one hour for every 25 pages of reading.  1. Note: Get comfortable with the feeling of struggling to read. Many of the texts we encounter this semester are very old. These readings may be obscure, difficult to understand, while reflecting cultural values that may be alien to you. I recommend paying attention to these feelings of discomfort as you read, and then using them to investigate the text further.  1. Example: You notice there is a lot of repetition in the Epic of Gilgamesh so you decide to look into it. You find out that the translation history of Epic of Gilgamesh involves a great deal of transcription from fragmented cuneiform tablets into our written text system.  3. Previewing the text. Does the text have any headings or sub-headings? If so, what are they? Does it include an introduction? If so, what does the introduction have to say? What does the text look like on the page? Literally--does it take up a lot of space? Bigger/smaller margins? Use block writing or stanzas?  4. Engaging. I cannot stress it enough: get in the habit of reading with a pen or pencil in hand. Write in the margins. Circle things you find important. Develop a notation system that reflects your thoughts or feelings as you read. 1.  You may draw an angry face next to the section where Gilgamesh insults the goddess Ishtar. You might underline the stanza in which Gilgamesh and Enkidu confront the monster, Humbaba. 2. What the texts says vs what it does. Take time to summarize the text says. What is the main idea? How is the main idea supported? Now ask yourself: how does it do that? Does it use imagery? Metaphor? Repetition? Simple or complicated language?  What is World Literature? David Damrosch is known for his extensive work in world literature and comparative literature. He is also the director of Harvard's The Institute for World Literature (Links to an external site.)Links to an external site.. In "Introduction: Goethe Coins a Phrase," Damrosch provides a brief history of world literature as a literary field, and also defines world literature in terms of translation and circulation. See below for the PDF. Damrosch, David (Introduction--Goethe Coins a Phrase).pdf · The concept of "world literature" as a literary field comes into the Western World through Goethe's term, weltliteratur. It's important to note that Goethe was not the first to use weltlite.

Often, both end-to-end and link layer encryption are combined
for additional protection.
With end-to-end encryption the user data is encrypted with
encryption keys known only
to the sender and receiver at the application layers. Each data
frame is then encrypted
with encryption keys shared by adjacent devices or hosts for
sending to the next
device/host. By implementing both techniques the application
message is never in
plaintext until it reaches its destination. Using both encryption
techniques does provide a
small window of opportunity for an eavesdropper when the
frame header is in decrypted
within the frame switch or router.
Telecommunications, Network and Internet Security
Week7 Part1-IS
RevisionSu2013
Telecommunications, Network and Internet Security
The topics in this lesson cover several areas in the domain of
information security. Much
of material in this lesson is a framework for Information
Security, however presenting it
at this point has afforded us the opportunity to build up a base
of knowledge covering
various topics from a more pragmatic perspective.
This lesson will provide some architectural framework around
the concepts we have
discussed so far and also provide essential concepts for further
learning of Information
Security concepts.
Open Systems Interconnection (OSI) Reference Model
Data communications and network technology is very complex.
They consist of
numerous functions and protocols that describe the actions and
interactions that go on in
a network.
The OSI reference model provides a model that neatly divides
the network into layers.
The OSI reference model provides a universally accepted model
for discussing
communication functions. By dividing the functions into layers
the complexity of the
entire communications/network model is “simplified”
(relatively speaking). Each layer
consists of the functions and protocols implemented at that
layer. Any given layer
implements numerous functions and protocols.
Definition:
Protocol: An agreed upon set of rules for communicating.
The layers functionally build on one another. That is, an upper
layer relies on the services
and protocols of a lower layer. The stacked layers are
commonly referred to as the
protocol stack (general term) or IP stack (example of a specific
stack). There are seven
layers in the OSI reference model. The layers are defined in
descending order from
highest to lowest.
Number Name Description
7 Application Various application programs
6 Presentation Services to present data to applications
5 Session Manages sessions between applications. Establishing
connections and terminating sessions.
4 Transport Provides end to end delivery of data
3 Network Manages data addressing and delivery between
networks
2 Data Link Provides reliable data communication across
physical
link
1 Physical Defines physical characteristics of network media
When two machines communicate with one another the

Recommended for you

Critical Qualitative Research Designpages 70–76Related to un.docx
Critical Qualitative Research Designpages 70–76Related to un.docxCritical Qualitative Research Designpages 70–76Related to un.docx
Critical Qualitative Research Designpages 70–76Related to un.docx

Critical Qualitative Research Design pages 70–76 Related to understanding your goals as a researcher is the development of the rationale of the study. A rationale is the reason or argument for why a study matters and why the approach is appropriate to the study. Rationales can range from improving your practice and the practice of colleagues (as in practitioner research), contributing to formal theory (e.g., where there may be a gap in or lack of research in an area), understanding existing research in a new context or with a new population, and/or contributing to the methodological literature and approach to an existing corpus of research in a specific area or field. Thinking about and answering the questions in Table 3.1 can aid in this process. Considering these kinds of questions is central to developing empirical studies, and it is important to understand that these rationales and goals will also lead you to conduct different types of research, guiding your many choices—from the theories used to frame the study to the selection of various methods to the actual research questions as well as designs chosen and implemented. There are many strategies for engaging in a structured inquiry process and through it an exploration of research goals and the overall rationale of a study. These strategies can include the writing of various kinds of memos, structured dialogic engagement processes, and reflective journaling. Across these strategies, creating the conditions and structures for regular dialogic engagement with a range of interlocutors is an absolutely vital and necessary part of refining your understanding of the goals and rationales for the research. We describe each of these strategies in the subsequent sections. Memos on Study Goals and Rationale Memos are important tools in qualitative research and tend to be written about a variety of different topics throughout the phases of a qualitative study. Memos are a way to capture and process, over time, your ongoing ideas and discoveries, challenges associated with fieldwork and design, and analytic sense-making. Depending on your research questions, memos can also become data sources for a study. There is no “wrong” way of writing memos, as their goal is to foster meaning making and serve as a chronicle of emerging learning and thinking. Memos tend to be informal and can be written in a variety of styles, including prose, bullet points, and/or outline form; they can include poetry, drawings, or other supporting imagery. The goals of memos are to help generate and clarify your thinking as well as to capture the development of your thinking, as a kind of phenomenological note taking that captures the meaning making of the researcher in real time and then provides data to refer back and consider the refinement of your thinking over time (Maxwell, 2013; Nakkula & Ravitch, 1998). While we find writing memos to be a useful and generative exercise, both when we write and share them in our indep.

Critical InfrastructuresThe U.S. Department of Homeland Security h.docx
Critical InfrastructuresThe U.S. Department of Homeland Security h.docxCritical InfrastructuresThe U.S. Department of Homeland Security h.docx
Critical InfrastructuresThe U.S. Department of Homeland Security h.docx

Critical Infrastructures The U.S. Department of Homeland Security has identified what is determined to be critical infrastructure assets that are designated as potentially being of terrorist interest. Although the final responsibility and mission for protecting those assets and sectors of each remains with the DHS, the initial accountability rests with local ownership and authorities. The DHS has formulated a National Infrastructure Protection Plan to explain and describe the national responsibility. A very significant majority of the infrastructure elements are under private or corporate ownership and maintenance and must share the bulk of responsibility for protection and security under their own mission plans for security. Assignment Guidelines Address the following in 3–4 pages: What is the National Infrastructure Protection Plan (NIPP)? When was it created? Who created it? Why was it created? Explain. How important is the private sector with regard to critical infrastructure protection? Why? What types of strategies can be used for critical infrastructure protection (CIP)? What strengths currently exist in the United States with regard to CIP? Explain. What weaknesses still need to be addressed? Why? How can federal agencies effectively cooperate with private sector organizations? Explain. What types of information should be disseminated to private sector organizations that are responsible for key assets? Explain. What types of information, if any, should be withheld from the private sector? Why? ASSIGNMENT DUE TONIGHT 10/20/13 BY 12 CLOCK .

Critical Infrastructure Protection Discussion Questions How.docx
Critical Infrastructure Protection Discussion Questions How.docxCritical Infrastructure Protection Discussion Questions How.docx
Critical Infrastructure Protection Discussion Questions How.docx

Critical Infrastructure Protection  Discussion Questions: How has the federal government responded to possible terrorist attacks (mitigation) where civil liberties have not been endangered? Considering that so much of the nation’s critical infrastructure is privately owned, how has the government-regulated possible civil liberties issues related to private sector employers/employees? Can a balanced policy be implemented regarding critical infrastructure without eroding privacy, freedom of information or other civil liberties? Minimum of 350 words APA Style with quotation and references .

respective layers on each
machine communicate with one another. That is, the same layer
on each machine
understands the protocols for that layer. For example,
application data layers on one
machine can understand application data layers on another
machine since they use the
same protocols. The following is a logical view of how each
machine understands the
protocols from the respective layer on the other machine.
Standards Committees
The OSI reference model is a reference model. In other words it
is used as a reference to
simplify the understanding of what occurs in a network and
communications model. Of
equal importance to the functions that occur at each layer in the
protocol stack is how
each layer in the protocol stack interfaces to the layer above and
below it.
There was a time when manufacturers developed their own
proprietary interfaces.
Allowing a competitor to easily interface to their hardware or
software was not a priority.
7 Application
6 Presentation
5 Session
4 Transport
3 Network
2 Data Link
1 Physical
7 Application
6 Presentation
5 Session
4 Transport
3 Network
2 Data Link
1 Physical
Machine 1 Machine 2
Logical View of Communication between Protocol Layers
In fact, the more difficult it was for a competitor the better
since it meant the customer
would look to a single supplier for a complete solution. This is
no longer acceptable
practice. Customers want systems that adhere to standard
interfaces. They want to be able
to choose between various manufacturers and mix and match
components that are
tailored to their requirements.
Proprietary interfaces are still developed by manufacturers so
that their specialized
hardware and software can be optimized to their environment.
However standard
interfaces must also be provided, and not as an afterthought.
They must be an integral
part of the implementation which is fully documented, tested
and supported.
It should be noted that when a new technology is brought to the
market that first
implementation has a significant advantage in establishing the
standards. Subsequent
implementations by various companies will undoubtedly
influence the standards, but the
first to the market with a good idea usually has a distinct
advantage since they gain
market share (and influence) and they often represent the
leading authority on the
technology.
Discussion: There was a time when many operating systems
were completely
proprietary. To use a third party device required opening up
source code to
understand how a device driver could be written for a “non-
standard device”. I
recall working on problems in the 1960s and 1970s developing
on-line interfaces
to various photo composition machines (fore runners of today’s
laser and inkjet
printers). The interfaces for writing a device driver in the
operating system code
were not cleanly delineated and over time customers demanded
that operating
systems open their source code so third party manufacturers

Recommended for you

Critical InfrastructuresIn terms of critical infrastructure and ke.docx
Critical InfrastructuresIn terms of critical infrastructure and ke.docxCritical InfrastructuresIn terms of critical infrastructure and ke.docx
Critical InfrastructuresIn terms of critical infrastructure and ke.docx

Critical Infrastructures In terms of critical infrastructure and key resources (CIKR), an  asset  is a person, structure, facility, information, material, or a process that has value. For example, in the transportation sector, a bridge would be an asset. A  network  is a group of related components that interact with each other or share information to perform a function. For example, a light rail system that crosses multiple jurisdictions in a large metropolitan area would be considered a network. A  system  is any combination of facilities, personnel, equipment, procedures, and communications integrated for a specific purpose. For example, the U.S. interstate highways comprise a system within the transportation sector. A  sector  consists of a logical collection of interconnected assets, systems, or networks that provide a common function to society, the economy, or the government. For example, the transportation sector consists of vast, open, accessible, interconnected systems, which include the aviation, maritime, pipeline, highway, freight rail, and mass-transit systems. Address the following in 3–4 pages: For each of the 18 CIKR sectors, identify 1 – 2 local examples of critical infrastructure. Briefly describe the examples, and explain how they are operated and utilized. Provide any information that you feel is unique to each sector. In your local community, research the infrastructure, and identify one particular element that may be of particular interest to a terrorist or vulnerable to natural or manmade disaster. Are there any protective measures in place to ensure its safety? .

Critical Infrastructure Case StudyPower plants are an important .docx
Critical Infrastructure Case StudyPower plants are an important .docxCritical Infrastructure Case StudyPower plants are an important .docx
Critical Infrastructure Case StudyPower plants are an important .docx

Critical Infrastructure Case Study Power plants are an important part of critical infrastructures and local, state, and national economies. Therefore, power plants need deep and multilayered access controls due to concerns over physical security. There are a number of sensitive areas that must be secured, and various employees need different levels of access to these locations. At a plant in the upper Midwest, this access is handled with identity badges that include images of the user and an RFID with their access rights. The RFID handles access through multiple levels. There is a security checkpoint at the entrance to the parking lot, and at the entrance. Both points require a badge to enter. From there the badge allows personnel to enter the facilities they are authorized to enter. It also acts as "something you have" for multipoint authentication onto secure systems. These are all standard functions for an RFID badge system. The badges also have an automatic deactivation feature, which is useful for certain personnel. Maintenance personnel, for example, do not have enhanced access and do not require access to secured areas of the site. However, the maintenance team may need access to any area of the facility regardless of its sensitivity, in the case of a breakdown or special project. To allow for this, the badges can be granted access rights that decay over time. This allows for temporary access to secure areas that is then automatically revoked over a number of hours or days. This lowers administrative time, and reduces the risk of human error in rights assignment. .

Critical Infrastructure and a CyberattackPresidential Decisi.docx
Critical Infrastructure and a CyberattackPresidential Decisi.docxCritical Infrastructure and a CyberattackPresidential Decisi.docx
Critical Infrastructure and a CyberattackPresidential Decisi.docx

Critical Infrastructure and a Cyberattack Presidential Decision Directive 21 (PDD-21) identifies 16 critical infrastructures. PDD-21 lays out the national policy to maintain secure, functioning and resilient critical infrastructure. Select a critical infrastructure sector from the list below and discuss the impact that a cyberattack could have on that system or service: Communication Sector (voice communications, digital communications, or navigation) Energy Sector (electric power grid) Water and Wastewater Systems Sector (water supply or sewage) Healthcare and Public Health Sector (hospitals) Transportation Systems Sector (rail or air) Financial Services Sector (banking ) It is the third and fourth order effects from the cyberattack on the chosen critical infrastructure that shows the far reaching and devastating effect of a cyberattack. To demonstrate the interconnectedness of critical infrastructure, explain the cascading effects on other critical infrastructure. Then, discuss the measures DHS has taken to ensure resiliency of the selected infrastructure and the measures that need to be implemented in the future. The Critical Infrastructure and a Cyberattack assignment Must be three to four pages in length (excluding the title and reference pages) and formatted according to APA style as outlined in the Ashford Writing Center (Links to an external site.) . Must include a cover page (Links to an external site.) with the following: Title of paper Student’s name Course name and number Instructor’s name Date submitted Must include an introductory paragraph with a succinct thesis statement. The thesis must be in both the introduction and the conclusion. Must use at least three scholarly sources or official government sources in addition to the course text. Must document all sources in APA style (Links to an external site.) as outlined in the Ashford Writing Center. Must include a separate references page that is formatted according to APA style (Links to an external site.) as outlined in the Ashford Writing Center. Carefully review the Grading Rubric (Links to an external site.) for the criteria that will be used to evaluate your assignment. .

could implement to
various operating system interfaces so devices would work “out
of the box” with
minimal problems.
By having well defined interfaces between the layers different
manufacturers can
implement hardware and software that work together. The well
defined protocols are
published in standards. Standards committees are comprised of
representatives from
various companies throughout the communications, network and
computing industry
worldwide. The protocols are developed and standards
documents are published that
document the protocols. As the protocols are used problems are
found which result in the
protocols being modified in stepwise refinement. As changes
are made revised standards
are issued for review. When approval is reached a new version
of the standard is issued.
The world of network and communications technology has a
huge number of standards
and protocols. The standards committees are made up from
experts in the various
technologies from industry, government and academia. The
representatives are from
throughout the world since communications standards must span
international borders. If
you are thinking of developing anything you need to first check
the body of standards to
see what is already available.
Some of the standards organizations are:
P (Federal Information Processing Standard) from the NIST
(National Institute
of Standards and Technology).
Standardization
Sector (ITU-T)
TCP/IP
The OSI reference model is an idealized model that neatly
breaks down communications
and networks technology into functional layers with sharp well
defined interfaces
between each layer. The model provides useful abstractions to
help to organize your
thinking without being “burdened” by the details of an actual
implementation.
When design moves to implementation the details need to be
considered. There are
several implementations of networks that used the OSI reference
as a model. Digital
Equipment Corporations DECnet and Novell Networks are two
implementations that
made use of OSI reference model.
The dominant networking protocols used today is TCP/IP
(Transmission Control Protocol
– Internet Protocol).
There is not a consensus on how the TCP/IP protocol stack
maps to the OSI reference
model. Following are two different mapping between the OSI
reference model layers and
the layers in the TCP/IP implementation:
Example 1:
OSI
Reference
Model Layer
OSI Layer Equivalent TCP/IP layer
7, 6 , 5 Application, Presentation,
Session,
Application
4 Transport Transport
3 Network Network
2 Data Link Data Link
1 Physical Physical

Recommended for you

Critical Incident Protection (CIP)Plans need to have your name o.docx
Critical Incident Protection (CIP)Plans need to have your name o.docxCritical Incident Protection (CIP)Plans need to have your name o.docx
Critical Incident Protection (CIP)Plans need to have your name o.docx

Critical Incident Protection (CIP) Plans need to have your name on them and need to include at least 2 pages describing:  •The importance of the document •How it pertains to your residency company •How your role in the company can help the plan be successful  Note:ASAP FORMAT  references and citations required .

Critical Evaluation of Qualitative or Quantitative Research Stud.docx
Critical Evaluation of Qualitative or Quantitative Research Stud.docxCritical Evaluation of Qualitative or Quantitative Research Stud.docx
Critical Evaluation of Qualitative or Quantitative Research Stud.docx

Critical Evaluation of Qualitative or Quantitative Research Study  Read:   Stevens, K., (2013)  The impact of evidence-based practice in nursing and the next big ideas .  OJIN: The Online Journal of Issues in Nursing ,  18 ,(2), Manuscript 4. doi: 10.3912/OJIN.Vol18No02Man04  Critically evaluate either Study 3 or Study 4.  Evaluate the credibility of professional citation, research design, and procedures in a research article.  Include a discussion on how this study contributes to evidence-based practice.  Study 3 -  Patients’ and partners’ health-related quality of life before and 4 months after coronary artery bypass grafting surgery Study 4 -  Striving for independence: a qualitative study of women living with vertebral fracture Suggested Reading Schreiber, M. L. (2016). Evidence-Based Practice.  Negative Pressure Wound Therapy .  MEDSURG Nursing, 25 (6), 425-428.  Stevens, K., (2013)  The impact of evidence-based practice in nursing and the next big ideas .  OJIN: The Online Journal of Issues in Nursing ,  18 ,(2), Manuscript 4. doi: 10.3912/OJIN.Vol18No02Man04  Wakefield, A. (2014). Searching and critiquing the research literature.  Nursing Standard ,  28 (39), 49-57. doi:10.7748/ns.28.39.49.e8867 Chapter 6 (pp. 131-153), Chapter 7 (pp. 157-185), Chapter 8 (pp. 189-226) Chapter 12 (pp.323-350)& Chapter 13 (pp. 351-380) In Houser, J. (2018).   Nursing research:  Readings, using & creating evidence  (4th ed.).  Burlington, MA:  Jones & Bartlett Learning Qualitative Specific Resources Houser, J. (2018).   Nursing research:  Readings, using & creating evidence  (4th ed.).  Burlington, MA:  Jones & Bartlett Learning. Chapter 9, p. 229-252 Chapter 14, p. 385-416 Chapter 15, p. 419-442 Additional Instructions: All submissions should have a title page and reference page. Utilize a minimum of two scholarly resources. Adhere to grammar, spelling and punctuation criteria. Adhere to APA compliance guidelines. Adhere to the chosen Submission Option for Delivery of Activity guidelines. Submission Options: Choose One: Instructions: Paper 4 to 6-page paper. Include title and reference pages. .

Critical Analysis of Phillips argument in her essay Zombie Studies.docx
Critical Analysis of Phillips argument in her essay Zombie Studies.docxCritical Analysis of Phillips argument in her essay Zombie Studies.docx
Critical Analysis of Phillips argument in her essay Zombie Studies.docx

Critical Analysis of Phillips' argument in her essay "Zombie Studies Gain Ground on College Campuses" Compose a fully-developed paragraph to critically analyze Phillips' argument. Use the points you learned in the "Reading with a Critical Eye" text for your analysis. (500 words) What are the main points Erica Phillips uses to support her argument that zombies are gaining ground on college campuses?  Who are the authorities that she presents to provide credibility to her argument.  Does she present you with facts or opinions? Is her information current?  Does her background give her any authority on the subject?  What are the strengths and weaknesses of her argument? .

Example 2:
OSI
Reference
Model Layer
OSI Layer Equivalent TCP/IP layer
7, 6 , 5 Application, Presentation,
Session
Application
4 Transport Host to Host Transport
3 Network Internet
2, 1 Data Link, Physical Network Access Layer

More Related Content

Similar to Types of Networks Week7 Part4-IS RevisionSu2013 .docx

Hirsch Identive | White Paper | Securing the Enterprise in a Networked World
Hirsch Identive | White Paper | Securing the Enterprise in a Networked WorldHirsch Identive | White Paper | Securing the Enterprise in a Networked World
Hirsch Identive | White Paper | Securing the Enterprise in a Networked World
Identive
 
Communications Technologies
Communications TechnologiesCommunications Technologies
Communications Technologies
Sarah Jimenez
 
network security.pdf
network security.pdfnetwork security.pdf
network security.pdf
JeganathanJayaran
 
Physical/Network Access Control
Physical/Network Access ControlPhysical/Network Access Control
Physical/Network Access Control
jwpiccininni
 
Mastering Networking and Cyber Security A Comprehensive Guide.pdf
Mastering Networking and Cyber Security A Comprehensive Guide.pdfMastering Networking and Cyber Security A Comprehensive Guide.pdf
Mastering Networking and Cyber Security A Comprehensive Guide.pdf
certbar Security
 
Network security
Network securityNetwork security
Network security
Ravikumar Natarajan
 
Module 3.Infrastructure and Network Security:
Module 3.Infrastructure and Network Security:Module 3.Infrastructure and Network Security:
Module 3.Infrastructure and Network Security:
Sitamarhi Institute of Technology
 
Module 3.pdf
Module 3.pdfModule 3.pdf
Cloud technology to ensure the protection of fundamental methods and use of i...
Cloud technology to ensure the protection of fundamental methods and use of i...Cloud technology to ensure the protection of fundamental methods and use of i...
Cloud technology to ensure the protection of fundamental methods and use of i...
SubmissionResearchpa
 
Network security model.pptx
Network security model.pptxNetwork security model.pptx
Network security model.pptx
ssuserd24233
 
Kamal Jyoti V3I5-0161
Kamal Jyoti V3I5-0161Kamal Jyoti V3I5-0161
Kamal Jyoti V3I5-0161
Kamal Jyoti
 
Paper id 27201448
Paper id 27201448Paper id 27201448
Paper id 27201448
IJRAT
 
Network security architecture is the planning and design of the camp.pdf
Network security architecture is the planning and design of the camp.pdfNetwork security architecture is the planning and design of the camp.pdf
Network security architecture is the planning and design of the camp.pdf
aquazac
 
Final ppt ecommerce
Final ppt ecommerceFinal ppt ecommerce
Final ppt ecommerce
priyanka Garg
 
Infrastructure SecurityChapter 10Principles of Compute.docx
Infrastructure SecurityChapter 10Principles of Compute.docxInfrastructure SecurityChapter 10Principles of Compute.docx
Infrastructure SecurityChapter 10Principles of Compute.docx
annettsparrow
 
Security assignment (copy)
Security assignment (copy)Security assignment (copy)
Security assignment (copy)
Amare Kassa
 
Security Attacks And Solutions On Ubiquitous Computing Networks
Security Attacks And Solutions On Ubiquitous Computing NetworksSecurity Attacks And Solutions On Ubiquitous Computing Networks
Security Attacks And Solutions On Ubiquitous Computing Networks
Ahmad Sharifi
 
Lecture 07 networking
Lecture 07 networkingLecture 07 networking
Lecture 07 networking
HNDE Labuduwa Galle
 
Internet Protocol Security as the Network Cryptography System
Internet Protocol Security as the Network Cryptography SystemInternet Protocol Security as the Network Cryptography System
Internet Protocol Security as the Network Cryptography System
Universitas Pembangunan Panca Budi
 
Smart Grid Cyber Security
Smart Grid Cyber SecuritySmart Grid Cyber Security
Smart Grid Cyber Security
JAZEEL K T
 

Similar to Types of Networks Week7 Part4-IS RevisionSu2013 .docx (20)

Hirsch Identive | White Paper | Securing the Enterprise in a Networked World
Hirsch Identive | White Paper | Securing the Enterprise in a Networked WorldHirsch Identive | White Paper | Securing the Enterprise in a Networked World
Hirsch Identive | White Paper | Securing the Enterprise in a Networked World
 
Communications Technologies
Communications TechnologiesCommunications Technologies
Communications Technologies
 
network security.pdf
network security.pdfnetwork security.pdf
network security.pdf
 
Physical/Network Access Control
Physical/Network Access ControlPhysical/Network Access Control
Physical/Network Access Control
 
Mastering Networking and Cyber Security A Comprehensive Guide.pdf
Mastering Networking and Cyber Security A Comprehensive Guide.pdfMastering Networking and Cyber Security A Comprehensive Guide.pdf
Mastering Networking and Cyber Security A Comprehensive Guide.pdf
 
Network security
Network securityNetwork security
Network security
 
Module 3.Infrastructure and Network Security:
Module 3.Infrastructure and Network Security:Module 3.Infrastructure and Network Security:
Module 3.Infrastructure and Network Security:
 
Module 3.pdf
Module 3.pdfModule 3.pdf
Module 3.pdf
 
Cloud technology to ensure the protection of fundamental methods and use of i...
Cloud technology to ensure the protection of fundamental methods and use of i...Cloud technology to ensure the protection of fundamental methods and use of i...
Cloud technology to ensure the protection of fundamental methods and use of i...
 
Network security model.pptx
Network security model.pptxNetwork security model.pptx
Network security model.pptx
 
Kamal Jyoti V3I5-0161
Kamal Jyoti V3I5-0161Kamal Jyoti V3I5-0161
Kamal Jyoti V3I5-0161
 
Paper id 27201448
Paper id 27201448Paper id 27201448
Paper id 27201448
 
Network security architecture is the planning and design of the camp.pdf
Network security architecture is the planning and design of the camp.pdfNetwork security architecture is the planning and design of the camp.pdf
Network security architecture is the planning and design of the camp.pdf
 
Final ppt ecommerce
Final ppt ecommerceFinal ppt ecommerce
Final ppt ecommerce
 
Infrastructure SecurityChapter 10Principles of Compute.docx
Infrastructure SecurityChapter 10Principles of Compute.docxInfrastructure SecurityChapter 10Principles of Compute.docx
Infrastructure SecurityChapter 10Principles of Compute.docx
 
Security assignment (copy)
Security assignment (copy)Security assignment (copy)
Security assignment (copy)
 
Security Attacks And Solutions On Ubiquitous Computing Networks
Security Attacks And Solutions On Ubiquitous Computing NetworksSecurity Attacks And Solutions On Ubiquitous Computing Networks
Security Attacks And Solutions On Ubiquitous Computing Networks
 
Lecture 07 networking
Lecture 07 networkingLecture 07 networking
Lecture 07 networking
 
Internet Protocol Security as the Network Cryptography System
Internet Protocol Security as the Network Cryptography SystemInternet Protocol Security as the Network Cryptography System
Internet Protocol Security as the Network Cryptography System
 
Smart Grid Cyber Security
Smart Grid Cyber SecuritySmart Grid Cyber Security
Smart Grid Cyber Security
 

More from willcoxjanay

Critical Response Rubric Category 0 1 1.5 2 Timelin.docx
Critical Response Rubric Category 0 1 1.5 2 Timelin.docxCritical Response Rubric Category 0 1 1.5 2 Timelin.docx
Critical Response Rubric Category 0 1 1.5 2 Timelin.docx
willcoxjanay
 
Critical Response Rubric- Please view the videos provided on Asha De.docx
Critical Response Rubric- Please view the videos provided on Asha De.docxCritical Response Rubric- Please view the videos provided on Asha De.docx
Critical Response Rubric- Please view the videos provided on Asha De.docx
willcoxjanay
 
Critical Reflective AnalysisIn developing your genogram and learni.docx
Critical Reflective AnalysisIn developing your genogram and learni.docxCritical Reflective AnalysisIn developing your genogram and learni.docx
Critical Reflective AnalysisIn developing your genogram and learni.docx
willcoxjanay
 
Critical Reflection Projectzzz.docx
Critical Reflection Projectzzz.docxCritical Reflection Projectzzz.docx
Critical Reflection Projectzzz.docx
willcoxjanay
 
Critical reflection on the reading from Who Speaks for Justice, .docx
Critical reflection on the reading from Who Speaks for Justice, .docxCritical reflection on the reading from Who Speaks for Justice, .docx
Critical reflection on the reading from Who Speaks for Justice, .docx
willcoxjanay
 
Critical Reflection ExerciseStudents are expected to have co.docx
Critical Reflection ExerciseStudents are expected to have co.docxCritical Reflection ExerciseStudents are expected to have co.docx
Critical Reflection ExerciseStudents are expected to have co.docx
willcoxjanay
 
Critical Reading StrategiesThe University of Minnesota published.docx
Critical Reading StrategiesThe University of Minnesota published.docxCritical Reading StrategiesThe University of Minnesota published.docx
Critical Reading StrategiesThe University of Minnesota published.docx
willcoxjanay
 
Critical Qualitative Research Designpages 70–76Related to un.docx
Critical Qualitative Research Designpages 70–76Related to un.docxCritical Qualitative Research Designpages 70–76Related to un.docx
Critical Qualitative Research Designpages 70–76Related to un.docx
willcoxjanay
 
Critical InfrastructuresThe U.S. Department of Homeland Security h.docx
Critical InfrastructuresThe U.S. Department of Homeland Security h.docxCritical InfrastructuresThe U.S. Department of Homeland Security h.docx
Critical InfrastructuresThe U.S. Department of Homeland Security h.docx
willcoxjanay
 
Critical Infrastructure Protection Discussion Questions How.docx
Critical Infrastructure Protection Discussion Questions How.docxCritical Infrastructure Protection Discussion Questions How.docx
Critical Infrastructure Protection Discussion Questions How.docx
willcoxjanay
 
Critical InfrastructuresIn terms of critical infrastructure and ke.docx
Critical InfrastructuresIn terms of critical infrastructure and ke.docxCritical InfrastructuresIn terms of critical infrastructure and ke.docx
Critical InfrastructuresIn terms of critical infrastructure and ke.docx
willcoxjanay
 
Critical Infrastructure Case StudyPower plants are an important .docx
Critical Infrastructure Case StudyPower plants are an important .docxCritical Infrastructure Case StudyPower plants are an important .docx
Critical Infrastructure Case StudyPower plants are an important .docx
willcoxjanay
 
Critical Infrastructure and a CyberattackPresidential Decisi.docx
Critical Infrastructure and a CyberattackPresidential Decisi.docxCritical Infrastructure and a CyberattackPresidential Decisi.docx
Critical Infrastructure and a CyberattackPresidential Decisi.docx
willcoxjanay
 
Critical Incident Protection (CIP)Plans need to have your name o.docx
Critical Incident Protection (CIP)Plans need to have your name o.docxCritical Incident Protection (CIP)Plans need to have your name o.docx
Critical Incident Protection (CIP)Plans need to have your name o.docx
willcoxjanay
 
Critical Evaluation of Qualitative or Quantitative Research Stud.docx
Critical Evaluation of Qualitative or Quantitative Research Stud.docxCritical Evaluation of Qualitative or Quantitative Research Stud.docx
Critical Evaluation of Qualitative or Quantitative Research Stud.docx
willcoxjanay
 
Critical Analysis of Phillips argument in her essay Zombie Studies.docx
Critical Analysis of Phillips argument in her essay Zombie Studies.docxCritical Analysis of Phillips argument in her essay Zombie Studies.docx
Critical Analysis of Phillips argument in her essay Zombie Studies.docx
willcoxjanay
 
Critical Appraisal Process for Quantitative ResearchAs you cri.docx
Critical Appraisal Process for Quantitative ResearchAs you cri.docxCritical Appraisal Process for Quantitative ResearchAs you cri.docx
Critical Appraisal Process for Quantitative ResearchAs you cri.docx
willcoxjanay
 
CriteriaExcellentSuperiorGoodWork neededFailingIntrodu.docx
CriteriaExcellentSuperiorGoodWork neededFailingIntrodu.docxCriteriaExcellentSuperiorGoodWork neededFailingIntrodu.docx
CriteriaExcellentSuperiorGoodWork neededFailingIntrodu.docx
willcoxjanay
 
Critical analysis of primary literature - PracticePurposeThis.docx
Critical analysis of primary literature - PracticePurposeThis.docxCritical analysis of primary literature - PracticePurposeThis.docx
Critical analysis of primary literature - PracticePurposeThis.docx
willcoxjanay
 
Critical analysis of one relevant curriculum approach or model..docx
Critical analysis of one relevant curriculum approach or model..docxCritical analysis of one relevant curriculum approach or model..docx
Critical analysis of one relevant curriculum approach or model..docx
willcoxjanay
 

More from willcoxjanay (20)

Critical Response Rubric Category 0 1 1.5 2 Timelin.docx
Critical Response Rubric Category 0 1 1.5 2 Timelin.docxCritical Response Rubric Category 0 1 1.5 2 Timelin.docx
Critical Response Rubric Category 0 1 1.5 2 Timelin.docx
 
Critical Response Rubric- Please view the videos provided on Asha De.docx
Critical Response Rubric- Please view the videos provided on Asha De.docxCritical Response Rubric- Please view the videos provided on Asha De.docx
Critical Response Rubric- Please view the videos provided on Asha De.docx
 
Critical Reflective AnalysisIn developing your genogram and learni.docx
Critical Reflective AnalysisIn developing your genogram and learni.docxCritical Reflective AnalysisIn developing your genogram and learni.docx
Critical Reflective AnalysisIn developing your genogram and learni.docx
 
Critical Reflection Projectzzz.docx
Critical Reflection Projectzzz.docxCritical Reflection Projectzzz.docx
Critical Reflection Projectzzz.docx
 
Critical reflection on the reading from Who Speaks for Justice, .docx
Critical reflection on the reading from Who Speaks for Justice, .docxCritical reflection on the reading from Who Speaks for Justice, .docx
Critical reflection on the reading from Who Speaks for Justice, .docx
 
Critical Reflection ExerciseStudents are expected to have co.docx
Critical Reflection ExerciseStudents are expected to have co.docxCritical Reflection ExerciseStudents are expected to have co.docx
Critical Reflection ExerciseStudents are expected to have co.docx
 
Critical Reading StrategiesThe University of Minnesota published.docx
Critical Reading StrategiesThe University of Minnesota published.docxCritical Reading StrategiesThe University of Minnesota published.docx
Critical Reading StrategiesThe University of Minnesota published.docx
 
Critical Qualitative Research Designpages 70–76Related to un.docx
Critical Qualitative Research Designpages 70–76Related to un.docxCritical Qualitative Research Designpages 70–76Related to un.docx
Critical Qualitative Research Designpages 70–76Related to un.docx
 
Critical InfrastructuresThe U.S. Department of Homeland Security h.docx
Critical InfrastructuresThe U.S. Department of Homeland Security h.docxCritical InfrastructuresThe U.S. Department of Homeland Security h.docx
Critical InfrastructuresThe U.S. Department of Homeland Security h.docx
 
Critical Infrastructure Protection Discussion Questions How.docx
Critical Infrastructure Protection Discussion Questions How.docxCritical Infrastructure Protection Discussion Questions How.docx
Critical Infrastructure Protection Discussion Questions How.docx
 
Critical InfrastructuresIn terms of critical infrastructure and ke.docx
Critical InfrastructuresIn terms of critical infrastructure and ke.docxCritical InfrastructuresIn terms of critical infrastructure and ke.docx
Critical InfrastructuresIn terms of critical infrastructure and ke.docx
 
Critical Infrastructure Case StudyPower plants are an important .docx
Critical Infrastructure Case StudyPower plants are an important .docxCritical Infrastructure Case StudyPower plants are an important .docx
Critical Infrastructure Case StudyPower plants are an important .docx
 
Critical Infrastructure and a CyberattackPresidential Decisi.docx
Critical Infrastructure and a CyberattackPresidential Decisi.docxCritical Infrastructure and a CyberattackPresidential Decisi.docx
Critical Infrastructure and a CyberattackPresidential Decisi.docx
 
Critical Incident Protection (CIP)Plans need to have your name o.docx
Critical Incident Protection (CIP)Plans need to have your name o.docxCritical Incident Protection (CIP)Plans need to have your name o.docx
Critical Incident Protection (CIP)Plans need to have your name o.docx
 
Critical Evaluation of Qualitative or Quantitative Research Stud.docx
Critical Evaluation of Qualitative or Quantitative Research Stud.docxCritical Evaluation of Qualitative or Quantitative Research Stud.docx
Critical Evaluation of Qualitative or Quantitative Research Stud.docx
 
Critical Analysis of Phillips argument in her essay Zombie Studies.docx
Critical Analysis of Phillips argument in her essay Zombie Studies.docxCritical Analysis of Phillips argument in her essay Zombie Studies.docx
Critical Analysis of Phillips argument in her essay Zombie Studies.docx
 
Critical Appraisal Process for Quantitative ResearchAs you cri.docx
Critical Appraisal Process for Quantitative ResearchAs you cri.docxCritical Appraisal Process for Quantitative ResearchAs you cri.docx
Critical Appraisal Process for Quantitative ResearchAs you cri.docx
 
CriteriaExcellentSuperiorGoodWork neededFailingIntrodu.docx
CriteriaExcellentSuperiorGoodWork neededFailingIntrodu.docxCriteriaExcellentSuperiorGoodWork neededFailingIntrodu.docx
CriteriaExcellentSuperiorGoodWork neededFailingIntrodu.docx
 
Critical analysis of primary literature - PracticePurposeThis.docx
Critical analysis of primary literature - PracticePurposeThis.docxCritical analysis of primary literature - PracticePurposeThis.docx
Critical analysis of primary literature - PracticePurposeThis.docx
 
Critical analysis of one relevant curriculum approach or model..docx
Critical analysis of one relevant curriculum approach or model..docxCritical analysis of one relevant curriculum approach or model..docx
Critical analysis of one relevant curriculum approach or model..docx
 

Recently uploaded

The Jewish Trinity : Sabbath,Shekinah and Sanctuary 4.pdf
The Jewish Trinity : Sabbath,Shekinah and Sanctuary 4.pdfThe Jewish Trinity : Sabbath,Shekinah and Sanctuary 4.pdf
The Jewish Trinity : Sabbath,Shekinah and Sanctuary 4.pdf
JackieSparrow3
 
The basics of sentences session 10pptx.pptx
The basics of sentences session 10pptx.pptxThe basics of sentences session 10pptx.pptx
The basics of sentences session 10pptx.pptx
heathfieldcps1
 
eeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeee
eeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeee
eeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeee
siemaillard
 
Unlocking Educational Synergy-DIKSHA & Google Classroom.pptx
Unlocking Educational Synergy-DIKSHA & Google Classroom.pptxUnlocking Educational Synergy-DIKSHA & Google Classroom.pptx
Unlocking Educational Synergy-DIKSHA & Google Classroom.pptx
bipin95
 
BRIGADA ESKWELA OPENING PROGRAM KICK OFF.pptx
BRIGADA ESKWELA OPENING PROGRAM KICK OFF.pptxBRIGADA ESKWELA OPENING PROGRAM KICK OFF.pptx
BRIGADA ESKWELA OPENING PROGRAM KICK OFF.pptx
kambal1234567890
 
Credit limit improvement system in odoo 17
Credit limit improvement system in odoo 17Credit limit improvement system in odoo 17
Credit limit improvement system in odoo 17
Celine George
 
Configuring Single Sign-On (SSO) via Identity Management | MuleSoft Mysore Me...
Configuring Single Sign-On (SSO) via Identity Management | MuleSoft Mysore Me...Configuring Single Sign-On (SSO) via Identity Management | MuleSoft Mysore Me...
Configuring Single Sign-On (SSO) via Identity Management | MuleSoft Mysore Me...
MysoreMuleSoftMeetup
 
"DANH SÁCH THÍ SINH XÉT TUYỂN SỚM ĐỦ ĐIỀU KIỆN TRÚNG TUYỂN ĐẠI HỌC CHÍNH QUY ...
"DANH SÁCH THÍ SINH XÉT TUYỂN SỚM ĐỦ ĐIỀU KIỆN TRÚNG TUYỂN ĐẠI HỌC CHÍNH QUY ..."DANH SÁCH THÍ SINH XÉT TUYỂN SỚM ĐỦ ĐIỀU KIỆN TRÚNG TUYỂN ĐẠI HỌC CHÍNH QUY ...
"DANH SÁCH THÍ SINH XÉT TUYỂN SỚM ĐỦ ĐIỀU KIỆN TRÚNG TUYỂN ĐẠI HỌC CHÍNH QUY ...
thanhluan21
 
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
marianell3076
 
Final_SD_Session3_Ferriols, Ador Dionisio, Fajardo.pptx
Final_SD_Session3_Ferriols, Ador Dionisio, Fajardo.pptxFinal_SD_Session3_Ferriols, Ador Dionisio, Fajardo.pptx
Final_SD_Session3_Ferriols, Ador Dionisio, Fajardo.pptx
shimeathdelrosario1
 
Delegation Inheritance in Odoo 17 and Its Use Cases
Delegation Inheritance in Odoo 17 and Its Use CasesDelegation Inheritance in Odoo 17 and Its Use Cases
Delegation Inheritance in Odoo 17 and Its Use Cases
Celine George
 
No, it's not a robot: prompt writing for investigative journalism
No, it's not a robot: prompt writing for investigative journalismNo, it's not a robot: prompt writing for investigative journalism
No, it's not a robot: prompt writing for investigative journalism
Paul Bradshaw
 
DANH SÁCH THÍ SINH XÉT TUYỂN SỚM ĐỦ ĐIỀU KIỆN TRÚNG TUYỂN ĐẠI HỌC CHÍNH QUY N...
DANH SÁCH THÍ SINH XÉT TUYỂN SỚM ĐỦ ĐIỀU KIỆN TRÚNG TUYỂN ĐẠI HỌC CHÍNH QUY N...DANH SÁCH THÍ SINH XÉT TUYỂN SỚM ĐỦ ĐIỀU KIỆN TRÚNG TUYỂN ĐẠI HỌC CHÍNH QUY N...
DANH SÁCH THÍ SINH XÉT TUYỂN SỚM ĐỦ ĐIỀU KIỆN TRÚNG TUYỂN ĐẠI HỌC CHÍNH QUY N...
thanhluan21
 
Views in Odoo - Advanced Views - Pivot View in Odoo 17
Views in Odoo - Advanced Views - Pivot View in Odoo 17Views in Odoo - Advanced Views - Pivot View in Odoo 17
Views in Odoo - Advanced Views - Pivot View in Odoo 17
Celine George
 
How to Store Data on the Odoo 17 Website
How to Store Data on the Odoo 17 WebsiteHow to Store Data on the Odoo 17 Website
How to Store Data on the Odoo 17 Website
Celine George
 
NLC English 7 Consolidation Lesson plan for teacher
NLC English 7 Consolidation Lesson plan for teacherNLC English 7 Consolidation Lesson plan for teacher
NLC English 7 Consolidation Lesson plan for teacher
AngelicaLubrica
 
How to Configure Time Off Types in Odoo 17
How to Configure Time Off Types in Odoo 17How to Configure Time Off Types in Odoo 17
How to Configure Time Off Types in Odoo 17
Celine George
 
ENGLISH-7-CURRICULUM MAP- MATATAG CURRICULUM
ENGLISH-7-CURRICULUM MAP- MATATAG CURRICULUMENGLISH-7-CURRICULUM MAP- MATATAG CURRICULUM
ENGLISH-7-CURRICULUM MAP- MATATAG CURRICULUM
HappieMontevirgenCas
 
Book Allied Health Sciences kmu MCQs.docx
Book Allied Health Sciences kmu MCQs.docxBook Allied Health Sciences kmu MCQs.docx
Book Allied Health Sciences kmu MCQs.docx
drtech3715
 
AI_in_HR_Presentation Part 1 2024 0703.pdf
AI_in_HR_Presentation Part 1 2024 0703.pdfAI_in_HR_Presentation Part 1 2024 0703.pdf
AI_in_HR_Presentation Part 1 2024 0703.pdf
SrimanigandanMadurai
 

Recently uploaded (20)

The Jewish Trinity : Sabbath,Shekinah and Sanctuary 4.pdf
The Jewish Trinity : Sabbath,Shekinah and Sanctuary 4.pdfThe Jewish Trinity : Sabbath,Shekinah and Sanctuary 4.pdf
The Jewish Trinity : Sabbath,Shekinah and Sanctuary 4.pdf
 
The basics of sentences session 10pptx.pptx
The basics of sentences session 10pptx.pptxThe basics of sentences session 10pptx.pptx
The basics of sentences session 10pptx.pptx
 
eeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeee
eeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeee
eeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeee
 
Unlocking Educational Synergy-DIKSHA & Google Classroom.pptx
Unlocking Educational Synergy-DIKSHA & Google Classroom.pptxUnlocking Educational Synergy-DIKSHA & Google Classroom.pptx
Unlocking Educational Synergy-DIKSHA & Google Classroom.pptx
 
BRIGADA ESKWELA OPENING PROGRAM KICK OFF.pptx
BRIGADA ESKWELA OPENING PROGRAM KICK OFF.pptxBRIGADA ESKWELA OPENING PROGRAM KICK OFF.pptx
BRIGADA ESKWELA OPENING PROGRAM KICK OFF.pptx
 
Credit limit improvement system in odoo 17
Credit limit improvement system in odoo 17Credit limit improvement system in odoo 17
Credit limit improvement system in odoo 17
 
Configuring Single Sign-On (SSO) via Identity Management | MuleSoft Mysore Me...
Configuring Single Sign-On (SSO) via Identity Management | MuleSoft Mysore Me...Configuring Single Sign-On (SSO) via Identity Management | MuleSoft Mysore Me...
Configuring Single Sign-On (SSO) via Identity Management | MuleSoft Mysore Me...
 
"DANH SÁCH THÍ SINH XÉT TUYỂN SỚM ĐỦ ĐIỀU KIỆN TRÚNG TUYỂN ĐẠI HỌC CHÍNH QUY ...
"DANH SÁCH THÍ SINH XÉT TUYỂN SỚM ĐỦ ĐIỀU KIỆN TRÚNG TUYỂN ĐẠI HỌC CHÍNH QUY ..."DANH SÁCH THÍ SINH XÉT TUYỂN SỚM ĐỦ ĐIỀU KIỆN TRÚNG TUYỂN ĐẠI HỌC CHÍNH QUY ...
"DANH SÁCH THÍ SINH XÉT TUYỂN SỚM ĐỦ ĐIỀU KIỆN TRÚNG TUYỂN ĐẠI HỌC CHÍNH QUY ...
 
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
 
Final_SD_Session3_Ferriols, Ador Dionisio, Fajardo.pptx
Final_SD_Session3_Ferriols, Ador Dionisio, Fajardo.pptxFinal_SD_Session3_Ferriols, Ador Dionisio, Fajardo.pptx
Final_SD_Session3_Ferriols, Ador Dionisio, Fajardo.pptx
 
Delegation Inheritance in Odoo 17 and Its Use Cases
Delegation Inheritance in Odoo 17 and Its Use CasesDelegation Inheritance in Odoo 17 and Its Use Cases
Delegation Inheritance in Odoo 17 and Its Use Cases
 
No, it's not a robot: prompt writing for investigative journalism
No, it's not a robot: prompt writing for investigative journalismNo, it's not a robot: prompt writing for investigative journalism
No, it's not a robot: prompt writing for investigative journalism
 
DANH SÁCH THÍ SINH XÉT TUYỂN SỚM ĐỦ ĐIỀU KIỆN TRÚNG TUYỂN ĐẠI HỌC CHÍNH QUY N...
DANH SÁCH THÍ SINH XÉT TUYỂN SỚM ĐỦ ĐIỀU KIỆN TRÚNG TUYỂN ĐẠI HỌC CHÍNH QUY N...DANH SÁCH THÍ SINH XÉT TUYỂN SỚM ĐỦ ĐIỀU KIỆN TRÚNG TUYỂN ĐẠI HỌC CHÍNH QUY N...
DANH SÁCH THÍ SINH XÉT TUYỂN SỚM ĐỦ ĐIỀU KIỆN TRÚNG TUYỂN ĐẠI HỌC CHÍNH QUY N...
 
Views in Odoo - Advanced Views - Pivot View in Odoo 17
Views in Odoo - Advanced Views - Pivot View in Odoo 17Views in Odoo - Advanced Views - Pivot View in Odoo 17
Views in Odoo - Advanced Views - Pivot View in Odoo 17
 
How to Store Data on the Odoo 17 Website
How to Store Data on the Odoo 17 WebsiteHow to Store Data on the Odoo 17 Website
How to Store Data on the Odoo 17 Website
 
NLC English 7 Consolidation Lesson plan for teacher
NLC English 7 Consolidation Lesson plan for teacherNLC English 7 Consolidation Lesson plan for teacher
NLC English 7 Consolidation Lesson plan for teacher
 
How to Configure Time Off Types in Odoo 17
How to Configure Time Off Types in Odoo 17How to Configure Time Off Types in Odoo 17
How to Configure Time Off Types in Odoo 17
 
ENGLISH-7-CURRICULUM MAP- MATATAG CURRICULUM
ENGLISH-7-CURRICULUM MAP- MATATAG CURRICULUMENGLISH-7-CURRICULUM MAP- MATATAG CURRICULUM
ENGLISH-7-CURRICULUM MAP- MATATAG CURRICULUM
 
Book Allied Health Sciences kmu MCQs.docx
Book Allied Health Sciences kmu MCQs.docxBook Allied Health Sciences kmu MCQs.docx
Book Allied Health Sciences kmu MCQs.docx
 
AI_in_HR_Presentation Part 1 2024 0703.pdf
AI_in_HR_Presentation Part 1 2024 0703.pdfAI_in_HR_Presentation Part 1 2024 0703.pdf
AI_in_HR_Presentation Part 1 2024 0703.pdf
 

Types of Networks Week7 Part4-IS RevisionSu2013 .docx

  • 1. Types of Networks Week7 Part4-IS RevisionSu2013 Types of Networks There are different types of networks. Each type has different characteristics and therefore different security needs. Some of the fundamental differentiating attributes of the various types of networks are: the network ifferent applications supported on the network
  • 2. Depending on the type of network there may be different information security requirements requiring that various protocols, security services, security mechanisms are used in a fashion to support that type of network. While each network environment has some characteristics and security needs unique to that environment, there are many security techniques that should be universally applied to all environments. For example; sound policies and procedures, risk assessment of the assets, user awareness training, encryption technology, authentication technology, sound credential (password) selection and protection, malware protection, firewalls are a few security techniques that need to be applied in all of the networks albeit in configurations that best suits a particular environment. Local Area Network (LAN) A LAN network covers a small geographic area that takes
  • 3. advantage of high speed data transfers usually implemented through Ethernet or fiber. A LAN could be a home, office, group of building with local proximity (university, business). LANs typically share resources such as file servers and printers. Wide Area Network (WAN) A WAN covers a large geographic area that may require connection through satellite, high speed dedicated lines and other means. The internet is a WAN. WANs can connect LANs together into a larger organizational structure that can be used to share resources such as file, email, dns servers to name a few. Resources can be shared using slower connections on geographically separated areas across the WAN. Wireless Networks and Mobile Networks The movement to laptop systems at home and workplaces accelerated the mobility of computing.
  • 4. As employees traveled between offices, client sites, home and various other remote locations they could remain connected to company servers as long as the remote site had connectivity to the companies’ intranet. Initially this connectivity was provided by having Ethernet cabling available for remote users to physically plug their laptops into. Eventually, companies started installing wireless hotspots that could be automatically detected by systems that had wireless cards. The proliferation of wireless connectivity and internet use spread from the workplace to general societal use. Average users demanded access to the internet and company intranets. Soon public places such as airports, libraries, train stations, schools and coffee shops installed wireless hotspots to allow people internet access. Some towns and cities are installing wireless hotspots to allow internet connectivity for citizens.
  • 5. In addition to wireless hotspots becoming omnipresent the use of handheld devices is on the rise. Handheld devices started with cell phones and moved to higher functionality devices such as the Blackberry and Palm smart phones which allowed email access, and various local applications. The handheld devices have continued to evolve to higher functioning devices which provide general internet services as well as thousands of applications. Examples of these are the Apple iphone and the numerous smartphones that support the Google Android operating system. Of course these devices still provide telephone services! These devices make use of various cellular network technologies such as GSM (Global System for Mobile Communications), CDMA (Code Division Mobile Access) which conform to 3G and 4G technologies for connectivity. Types of *NET environments. The various types of network environments can be deployed
  • 6. into different types of interconnected environments. We should not think of all interconnected computers as the internet. Depending on the allowable members and systems of an inter-connected environment the environment may be termed: “internet”, the “intranet” or the “extranet”. Internet The internet is global network of interconnected computers and computer networks. The systems that are members of the internet use the standard “internet protocol suite” which is TCP/IP, however not all applications use TCP/IP. The internet serves billions of users worldwide. Intranet An intranet is a private global network of interconnected computers and computer networks that is used by an organization. It uses all the protocols used in the internet only the scope of the network is within the organization.
  • 7. Extranet An extranet is a private global network of interconnected computers and computer networks that is used by an organization. It uses all the protocols used in the internet. It differs from an intranet in that it expands connectivity to other users, suppliers, organizations through secure protocols to facilitate information exchange and communication. Summary These networks continue to grow in complexity. These networks exist in an endless number of different configurations which all share the same requirement which is to be secure. To add to the complexity of the networks, devices are being deployed into virtualized environments, some of which are deployed to the Cloud Computing environment. The added dimensions of virtualization and cloud deployments raise the complexity of securing these environments.
  • 8. As the network complexity grows the complexity for securing the environment grows. The preferred approach to implementing security in these ever increasing complex environments is a strategy of security in depth. Security Architecture for OSI Week7 Part3-IS RevisionSu2013 Security Architecture for OSI The ITU (International Telecommunications Union) is a United Nations sponsored agency which develops standards (called recommendations) for telecommunications and open systems interconnection (OSI). Recommendation X.800, Security Architecture for OSI defines a systematic approach for the manager and technical professional responsible for implementing security in a network, communications or computer environment to
  • 9. systematically define the requirements for security and to characterize various approaches to implement functionality that satisfies the requirements. The framework provided by the architecture categorizes the elements of security into security attacks, security services and security mechanisms. A Security Attack is an action that compromises the information owned or entrusted to the organization. The compromise affects some attribute of the CIA triad. A Security Service is a collection of functionality (routines, programs, algorithms, specifications) that provides support for various aspects of security: In order to protect a network from attack, mechanisms need to be implemented that support each of these services to the extent they are needed in the target environment. Security services are implemented by making use of one or more security mechanisms. Security Services:
  • 10. cating entity is the one they claim to be. resource. unauthorized disclosure. a are available. sent/received/stored is exactly as it was sent/received/stored by the authorized entity. parties in a communication that they sent or received all or part of it. observation and logging of system activity. The security services enumerated above are categories of services that are further divided into specific services that apply to different aspects of a service. For example; the authentication service is divided into two specific services peer entity authentication and
  • 11. data origin authentication. Peer entity authentication involves each party in a logical connection being able to confirm to some degree of confidence the identity of the other party. Data origin authentication is used in a connectionless transfer such that the recipient of the data can be confident in the identity of the sender. RFC 2828 provides the following definition for a security service: Definition: Security Service: A processing or communication service that is provided by a system to give a specific kind of protection to system resources; security services implement security policies by using security mechanisms. A Security Mechanism is a particular technique or set of techniques that are used to implement a security service.
  • 12. Security mechanisms are divided into two groups: specific security mechanisms and pervasive security mechanisms. A specific security mechanism is implemented in a particular protocol layer or layers (e.g. TCP and/or application layer, etc.) to provide a security service. For example: encipherment is a specific security mechanism that could be implemented at various protocol layers. Encipherment may be implemented at the application level using PGP, the transport layer using SSL and the IP layer using IPsec. Specific Security Mechanisms: encrypt and decrypt information. Supports authentication, data confidentiality, data integrity. value and append it to a data object such that any recipient of the data can verify the data's origin and integrity. resource (control, data) from unauthorized use in accordance by the
  • 13. systems security policy. unauthorized changes to data, both malicious and accidental. identity of an entity. frustrate analysis of the data stream. s mechanisms to control the path data takes from source to destination to ensure secure transmission of data. for the integrity of a data exchange (i.e. Digital Certificates) Pervasive security mechanisms are not specific to any protocol layer or security service. The mechanism is implemented in any protocol layer and for any service. Pervasive Security Mechanisms:
  • 14. g an action to be taken. audit record of security activity. recovery from various events. ITU-T X.800 Security Architecture for OSI can be found at: http://www.itu.int/rec/T- REC-X.800-199103-I/en http://www.itu.int/rec/T-REC-X.800-199103-I/en http://www.itu.int/rec/T-REC-X.800-199103-I/en Layers and Protocols Week7 Part2-IS Revision Spring2014
  • 15. Layers and Protocols Since the layers of the OSI reference model do not match the TCP/IP layers exactly we need to modify how we think about the OSI layers in the context of TCP/IP. The terminology of the OSI reference model helps us understand the functions and divisions between each layer. As the discussion moves to reference an actual implementation we need to learn about the terminology and details of that implementation, which in this case is TCP/IP. Numerous protocols have been listed with each layer to familiarize you with the layer the protocol operates at and to provide a sense for the number of protocols there are. These are a sampling of the protocols. Credit to TCP/IP Network Administration by O’Reilly for assistance in organizing thoughts and some diagrams. Application Layer: User accessed programs and processes are accessed from this layer. In
  • 16. TCP/IP any application that occurs above the transport layer is an application. Any program a user directly interacts with, as well as various services a user may not be aware of (i.e. daemons, services) is at this layer. Note – some applications are associated with well-known port numbers to establish host to host communications using TCP/IP. The port numbers for some of the sample applications are included below. Examples of application protocols: - Port 25 – HyperText Transfer Protocol – Port 80 – HyperText Transfer Protocol Secure – Ports 161 and 162 TP – Ports 20 and 21 – Port 23 - Mail delivery – Secure shell
  • 17. Presentation Layer: How data is represented needs to agreed to by cooperating applications. Applications typically take care of this job in TCP/IP; however there is standardization around various presentation protocols (i.e. MIME, TIFF, JPEG). Examples of presentation protocols: – American Standard Code for Information Interchange – Extended Binary-Coded Decimal Interchange Mode FF – Tagged Image File Format – Joint Photo Experts Group – Motion Picture Experts Group – Musical Instrument Digital Interface – Graphic Interchange Format Session Layer: There is no separately identifiable session layer
  • 18. in the TCP/IP protocol hierarchy. That is not to say session functions do not exist in TCP/IP as they certainly do. In TCP/IP session management for the most part occurs at the TCP/IP layer. The mechanisms used for session communication in TCP/IP are called ports and sockets. Some protocols that are considered session layer protocols are: – Network File System – Structured Query Language – Remote Procedure Call Transport Layer: Much of the discussion around TCP/IP occurs at the transport layer. It is important to note that in TCP there are two transport services: TCP and UDP. TCP provides a connection based, reliable, guaranteed data delivery across the network. UDP (User Data Protocol) provides an unreliable, connectionless protocol. UDP has little protocol overhead so it is very efficient. For sending short amounts of information very
  • 19. quickly UDP may be preferred. If information is dropped or lost during transmission it is easier to resend the data than to set up a TCP connection. Between the two protocols there is different terminology used to describe the data that is transmitted. Note the differences are at the application and transport layers. Examples of Transport layer protocols: – Transmission Control Protocol. Connection-oriented, full-duplex, guaranteed delivery, unit of transmission is called TCP Segment – User Datagram Protocol. Connectionless, no guaranteed delivery , minimal overhead, unit of transmission is called UDP Packet Network Layer: This layer manages connections across the network. It isolates the upper level protocols from the details of the underlying network. In TCP/IP this function is
  • 20. implemented by IP (Internet Protocol), It takes care of IP addressing and routing the data from network to network. Examples of Network Layer Protocols: – Connectionless, 32-bit/4 byte address – 128 bit/16 byte address. More security features than IPv4. – Internet Control Message Protocol – Used by IP and other connectionless protocols to detect and react to transmission errors. ICMP used to: report network/routing failures; test node reachability; increase routing efficiency (informs routers of better routes; and informs source when datagram has exceeded time to exist. – Routing Information Protocol – Internal routing protocol within an AS. Decides based on number of hops, doesn’t consider line utilization or bandwidth. – Open Shortest Path First – Internal routing protocol within an autonomous system
  • 21. – Border Gateway Protocol – Exterior routing protocol between autonomous systems Stream Segment Datagram Frame Message Packet Datagram Frame TCP UDP Application layer Transport layer Internet layer Network Access layer – Internet Group Management Protocol – allows hosts to participate in
  • 22. multicasting. – The most secure tunneling protocol. Is an integrated part of IPv6 and add- on for IPv4. – Simple Key Exchange for IP – Internet Key Exchange – Internetwork Packet Exchange Protocol Data Link Layer: The reliable delivery of data across the physical network is handled by the data link layer. IP tends to make use of existing data link protocols. – MAC Layer – MAC Layer – MAC Layer – Serial Line Internet Protocol – Point-to-Point Protocol (replaced SLIP) – encapsulates to go across serial lines. Not routable over Internet. Has header & data compression, error correction, different auth protocols, and encapsulates more than IP. Uses PAP,
  • 23. CHAP, or EAP to authenticate to Net Access Server (NAS). – Address Resolution Protocol - IP passed down from upper layers, DL needs to resolve it into a MAC (hardware) address in order to put into the MAC address in the header portion of the frame. ARP broadcasts a frame with the IP in it, the one with that IP address responds with its MAC. Addresses are cached in ARP table. ARP Poisoning – type of masquerade, alter ARP table to point to attacker’s own MAC. – Reverse Address Resolution Protocol. Used by diskless machines to get IP address. Booting system broadcasts a RARP with its MAC address, and RARP Server responds with an assigned IP. – Enhancement to RARP. In addition to IP address, BOOTP server also provides diskless workstation with its DNS server address, and default gateway address. – Dynamic Host Configuration Protocol – Layer 2 Forwarding
  • 24. – Layer 2 Tunneling Protocol (typically services are combined IPsec) – – Integrated Services Digital Network – – Synchronous Data Link Control – Link Access Procedure – Link-Access Procedure-Balanced – High-Level Data Link Control, extension of SDLC, encapsulation used in X.25 – Password Authentication Protocol – Challenge Handshake Protocol - Extensible Authentication Protocol Physical Layer: This layer defines the physical characteristics of the equipment needed to
  • 25. carry signals across the communications/network system. Examples of protocols and standards that operate at this layer are: – High Speed Serial Interface Encapsulation of data As in the OSI reference model data is passed down the stack when being sent to the network. When it is received it is passed up the stack. To show how data is actually passed we will use the TCP/IP layers since it represents an actual implementation. Consider the example where Machine 1 at the application level creates data. It passes the data to the layer below it (transport layer). The transport layer creates its data and encapsulates the data from the application data and passes it to the internet layer. This
  • 26. process continues down the protocol stack on machine 1 by the internet layer passing the data down to the network access layer. Once the network access layer is reached the data is transmitted on the network to Machine 2. When Machine 2 receives the data it is at the lowest layer in the protocol stack. The lower level deals with the network access protocol data from the sending machine (Machine 2) and unwraps (removes the encapsulating protocol) and passes the remaining data to the layer above it which is the internet layer. The internet layer unwraps (removes the encapsulating protocol) and passes the remaining data to the layer above it (Transport layer). This continues up the protocol stack on Machine 2 by the Transport layer unwrapping its data and passing the remaining data to the Application layer.
  • 27. One of the elegant features of the protocol stack is how the protocols are nested for transmission. Each layer has its own independent structures. Conceptually, a layer is not aware of the data used in the adjacent layers (layers above or below it). Each layer has its own data structures, and there own terminology for describing the data structure. This is all described in the RFC standards for each protocol. Data is encapsulated by the layer by placing a “header” in front of the data it is transmitting. The header makes the data understandable to that layer. For any given layer the data structure consists of a header and data. As you move down the stack headers are added in front of the data. As you move up the stack the header for a given layer is “removed” yielding the “data” which is passed back up the stack. Of course the next layer in the stack is interpreting that “data” as a “header” followed by “data”. Machine 1 Machine 2
  • 28. Transmitted over Network Application Transport Internet Network Access Application Transport Internet Network Access Encryption at Various Protocol Layers Encryption can be implemented at various protocol layers in the
  • 29. OSI stack. Typical encryption models are “end to end” encryption and “link level” encryption. It is worthwhile to differentiate the implications of encrypting at the various levels. Following is a diagram credited to: Encryption in relation to the protocol layers (Source: based on King and Newson, 1999, p. 104). This diagram provides a clear picture of where encryption occurs in the protocol stack. Data Data Data Data Header Header Header Header Header Header Application Layer Transport Layer
  • 30. Network Access Layer Internet Layer Send Receive End-to-End Encryption End-to-end encryption is also known as application layer encryption. Encryption is implemented at the highest layer of the OSI stack. A protocol example of end-to-end encryption is the sending and receiving of encrypted email using services such as PGP or S/MIME. Other examples of end-to-end encryptions are applications such as: SHTTP (secure hypertext transfer) or SET (Secure Electronic Transactions). You could think of this as encryption occurring between processes. With application layer encryption the routing information is not encrypted. Since the encryption occurs at the highest protocol layer as the data is passed down the stack to lower layers routing information is
  • 31. prepended to support routing between intermediate hosts. The routing information is not encrypted and therefore exposed to an attacker. Therefore, while the data is encrypted, the traffic pattern is not encrypted and could be captured and analyzed by an eavesdropper. With end-to-end encryption keys must be exchanged by each pair of application users. This is in contrast to link layer encryption where encryption keys are exchanged between hosts. The number of encryption keys for distribution and management is an area of concern. Transport/Network Encryption With IPsec encryption occurs at the Network and IP layers of the stack. With IPsec security associations can be set up between hosts and devices with IP addresses and port numbers. This permits a more granular policy than link layer encryption. While the end- points in Transport/Network encryption are not as wide as
  • 32. Application encryption it is considered in the above diagram as end-to-end encryption. Link Layer Encryption Link layer encryption occurs at both ends (incoming and outgoing) of each communications link such as a frame relay switch or a router. This provides a high level of security but it does require a lot of encryption devices. Since the message is decrypted each time it enters an encryption device there is a window the data is exposed to eavesdroppers before the data is re-encrypted for the next hop. When sending data across the internet the user has no control over the security implemented at various hosts (hops) along the route. For intranets or extranets link layer encryption may be adequate since the infra-structure is under the management and control of the organization but when information is sent outside an organization link layer encryption may not be adequate.
  • 33. Often, both end-to-end and link layer encryption are combined for additional protection. With end-to-end encryption the user data is encrypted with encryption keys known only to the sender and receiver at the application layers. Each data frame is then encrypted with encryption keys shared by adjacent devices or hosts for sending to the next device/host. By implementing both techniques the application message is never in plaintext until it reaches its destination. Using both encryption techniques does provide a small window of opportunity for an eavesdropper when the frame header is in decrypted within the frame switch or router. Telecommunications, Network and Internet Security
  • 34. Week7 Part1-IS RevisionSu2013 Telecommunications, Network and Internet Security The topics in this lesson cover several areas in the domain of information security. Much of material in this lesson is a framework for Information Security, however presenting it at this point has afforded us the opportunity to build up a base of knowledge covering various topics from a more pragmatic perspective. This lesson will provide some architectural framework around the concepts we have discussed so far and also provide essential concepts for further learning of Information Security concepts. Open Systems Interconnection (OSI) Reference Model Data communications and network technology is very complex. They consist of numerous functions and protocols that describe the actions and interactions that go on in
  • 35. a network. The OSI reference model provides a model that neatly divides the network into layers. The OSI reference model provides a universally accepted model for discussing communication functions. By dividing the functions into layers the complexity of the entire communications/network model is “simplified” (relatively speaking). Each layer consists of the functions and protocols implemented at that layer. Any given layer implements numerous functions and protocols. Definition: Protocol: An agreed upon set of rules for communicating. The layers functionally build on one another. That is, an upper layer relies on the services and protocols of a lower layer. The stacked layers are commonly referred to as the protocol stack (general term) or IP stack (example of a specific stack). There are seven
  • 36. layers in the OSI reference model. The layers are defined in descending order from highest to lowest. Number Name Description 7 Application Various application programs 6 Presentation Services to present data to applications 5 Session Manages sessions between applications. Establishing connections and terminating sessions. 4 Transport Provides end to end delivery of data 3 Network Manages data addressing and delivery between networks 2 Data Link Provides reliable data communication across physical link 1 Physical Defines physical characteristics of network media When two machines communicate with one another the
  • 37. respective layers on each machine communicate with one another. That is, the same layer on each machine understands the protocols for that layer. For example, application data layers on one machine can understand application data layers on another machine since they use the same protocols. The following is a logical view of how each machine understands the protocols from the respective layer on the other machine. Standards Committees The OSI reference model is a reference model. In other words it is used as a reference to simplify the understanding of what occurs in a network and communications model. Of equal importance to the functions that occur at each layer in the protocol stack is how each layer in the protocol stack interfaces to the layer above and below it. There was a time when manufacturers developed their own proprietary interfaces. Allowing a competitor to easily interface to their hardware or
  • 38. software was not a priority. 7 Application 6 Presentation 5 Session 4 Transport 3 Network 2 Data Link 1 Physical 7 Application 6 Presentation 5 Session 4 Transport 3 Network 2 Data Link 1 Physical Machine 1 Machine 2
  • 39. Logical View of Communication between Protocol Layers In fact, the more difficult it was for a competitor the better since it meant the customer would look to a single supplier for a complete solution. This is no longer acceptable practice. Customers want systems that adhere to standard interfaces. They want to be able to choose between various manufacturers and mix and match components that are tailored to their requirements. Proprietary interfaces are still developed by manufacturers so that their specialized hardware and software can be optimized to their environment. However standard interfaces must also be provided, and not as an afterthought. They must be an integral part of the implementation which is fully documented, tested and supported. It should be noted that when a new technology is brought to the market that first implementation has a significant advantage in establishing the
  • 40. standards. Subsequent implementations by various companies will undoubtedly influence the standards, but the first to the market with a good idea usually has a distinct advantage since they gain market share (and influence) and they often represent the leading authority on the technology. Discussion: There was a time when many operating systems were completely proprietary. To use a third party device required opening up source code to understand how a device driver could be written for a “non- standard device”. I recall working on problems in the 1960s and 1970s developing on-line interfaces to various photo composition machines (fore runners of today’s laser and inkjet printers). The interfaces for writing a device driver in the operating system code were not cleanly delineated and over time customers demanded that operating systems open their source code so third party manufacturers
  • 41. could implement to various operating system interfaces so devices would work “out of the box” with minimal problems. By having well defined interfaces between the layers different manufacturers can implement hardware and software that work together. The well defined protocols are published in standards. Standards committees are comprised of representatives from various companies throughout the communications, network and computing industry worldwide. The protocols are developed and standards documents are published that document the protocols. As the protocols are used problems are found which result in the protocols being modified in stepwise refinement. As changes are made revised standards are issued for review. When approval is reached a new version of the standard is issued. The world of network and communications technology has a huge number of standards
  • 42. and protocols. The standards committees are made up from experts in the various technologies from industry, government and academia. The representatives are from throughout the world since communications standards must span international borders. If you are thinking of developing anything you need to first check the body of standards to see what is already available. Some of the standards organizations are: P (Federal Information Processing Standard) from the NIST (National Institute of Standards and Technology). Standardization Sector (ITU-T)
  • 43. TCP/IP The OSI reference model is an idealized model that neatly breaks down communications and networks technology into functional layers with sharp well defined interfaces between each layer. The model provides useful abstractions to help to organize your thinking without being “burdened” by the details of an actual implementation. When design moves to implementation the details need to be considered. There are several implementations of networks that used the OSI reference as a model. Digital Equipment Corporations DECnet and Novell Networks are two implementations that made use of OSI reference model. The dominant networking protocols used today is TCP/IP (Transmission Control Protocol – Internet Protocol). There is not a consensus on how the TCP/IP protocol stack maps to the OSI reference
  • 44. model. Following are two different mapping between the OSI reference model layers and the layers in the TCP/IP implementation: Example 1: OSI Reference Model Layer OSI Layer Equivalent TCP/IP layer 7, 6 , 5 Application, Presentation, Session, Application 4 Transport Transport 3 Network Network 2 Data Link Data Link 1 Physical Physical
  • 45. Example 2: OSI Reference Model Layer OSI Layer Equivalent TCP/IP layer 7, 6 , 5 Application, Presentation, Session Application 4 Transport Host to Host Transport 3 Network Internet 2, 1 Data Link, Physical Network Access Layer