Chapter 18 Network Security and Protocols
Chapter 18 Network Security and Protocols
Chapter 18 Network Security and Protocols
Protocols
Chapter 18
Chapter Objectives - I
Chapter 18
Chapter Objectives - II
Chapter 18
Recall - I
Chapter 18
Recall - II
Chapter 18
Threats
Types of Threats
Internal
Chapter 18
External
Internal Threats
Chapter 18
Unauthorized Access
Data Destruction
Administrative Access
System Crash/Hardware Failure
Virus
Chapter 18
Passwords
User Account Control
Policies
Fault Tolerance
External Threats
Social Engineering
Hacking
Chapter 18
Chapter 18
Physical protection
Firewalls
Encryption
Authentication
Public Keys and Certificates
VLAN
10
Chapter 18
11
Security Attacks - I
Active
Chapter 18
Passive
12
Case Study - I
The Customer Service department of MoneyMaker
bank provides online services to the customers. It
has been a month since maintenance tasks have
been performed on the computers of the
department at Hyderabad branch. The customer
service department of Hyderabad branch reports
that the response of the computers has become
slow and pop-ups continually plague Internet
browsers. The computers are infected with
spyware.
Chapter 18
13
Problem
Chapter 18
14
Suggested Solution
Spyware is software and not a virus that hides itself
somewhere on the computer and collects
information about the user. Spyware is often
downloaded onto the computer when you download
other free software or when you visit certain
Websites. To solve the problem the spyware can be
removed using a removal tool such as Spybot. This
will help in improving system performance.
Chapter 18
15
Chapter 18
16
Chapter 18
17
Cryptography
Chapter 18
Message Confidentiality
Message Integrity
Message Authentication
Message Nonrepudiation
Entity Authentication
18
Types of Cryptosystems
Chapter 18
19
Encryption/Decryption
Chapter 18
Substitution ciphers
Transposition ciphers
20
Chapter 18
21
Chapter 18
22
Digital Signatures - I
Chapter 18
23
Digital Signature - II
Chapter 18
24
Authentication Protocol
Chapter 18
25
Chapter 18
26
Chapter 18
27
Chapter 18
28
Firewall - I
Chapter 18
Packet-Filter Firewalls
Proxy Firewalls
29
Firewall - II
Chapter 18
30
Case Study - II
Network administrator John has installed a new
Web browser on the computer of the employee in
the Mumbai branch of the MoneyMaker Bank. The
user complains to John that he is unable to connect
to the Internet using the new Web browser and a
firewall warning message appears.
Chapter 18
31
Problem
Chapter 18
32
Suggested Solution
Chapter 18
33
VLAN - I
Port Numbers
MAC addresses
IP addresses
Multicast IP Addresses
Combination
Chapter 18
34
VLAN - II
Table Maintenance
Frame tagging
Time Division Multiplexing (TDM)
Network Management
Creating Virtual Work Groups
Security
Chapter 18
35
Chapter 18
36
RAID
Chapter 18
37
Chapter 18
38
Chapter 18
Tape Backup
Chapter 18
40
Perfect Server - I
Chapter 18
41
Perfect Server - II
Chapter 18
42
Chapter 18
Fast NICs
Fast Drives
43
Reliability - I
Dedicated Circuits
Surge suppressors
Uninterruptible Power Supply (UPS)
Backup Power
Chapter 18
44
Reliability - II
Boot sector
Executable
Macro
Trojan
Worm
Chapter 18
45
Protocols
Chapter 18
46
SLIP
Chapter 18
47
PPP - I
Chapter 18
PPP - II
Chapter 18
49
PPTP
Chapter 18
50
IPSec
Chapter 18
Transport Mode
Tunnel Mode
51
SSL
Chapter 18
Fragmentation
Compression
Message Integrity
Confidentiality
Framing
52
Summary - I
Chapter 18
53
Summary - II
Chapter 18
54
Summary - III
Chapter 18
55
Summary - IV
Chapter 18
56
Summary - V
Chapter 18
57
Summary - VI
Chapter 18
58
Summary - VII
Chapter 18
59
Summary - VIII
Chapter 18
60
Summary - IX
Chapter 18
61
Summary - X
Chapter 18
62