Lecture Five Network and Telecommunications
Lecture Five Network and Telecommunications
Lecture Five Network and Telecommunications
TELECOMMUNICATIONS
Lecturer : Mr Oguna
Introduction
• Controlling user access to information is just one aspect of working in the
information systems security industry. With those controls in place, you can
focus on building network systems that provide a secure environment to
share and distribute information. In this lesson, you will analyze network
systems and telecommunications.
• The assurance of network system security is dependent upon the design of
an effective and well-rounded data network. The application of specialized
models, topologies, protocols, and services is instrumental in building a
data network from the ground up and employing secure data exchange,
distributing confidential information among network resources. In this
topic, you will identify data network design principles, topologies,
protocols, and services.
Introduction
• The layout of your data network can either be an asset to security or
can increase the system’s vulnerability for unauthorized access. In
addition to improving system security, your design can enhance the
manageability of the data network.
• Effective data network design can also have significant effects on data
transmission time, improving user productivity. Utilizing proper data
network design techniques can increase your ability to efficiently
provide security and convenience to your network users.
Objectives
At the end of the lecture you should be able:
• Identify data network design.
• Identify remote data access to network systems.
• Analyze data network security.
• Apply data network management
5.2 Lecture Outline
• With data access allocated to both local and remote users, and data
networks designed to provide for data integrity, ensuring confidentiality is
the next phase in networking systems and telecommunications
• Enforcing rigorous security protocols and mechanisms is essential for
preventing unauthorized entry and guarding against network attacks.
Because network vulnerabilities can be exploited and compromise system
resources, you need to take necessary measures to secure your data
network.
5.6.1 Network Attacks
• Denial of service (DoS) attacks can be used to target the availability of the
network or network services. DoS attacks may cause excessive use of
network resources.
• A man-in-the-middle attack occurs when an attacker interposes a device
between two legitimate hosts to gain access to their data transmissions.
• While spam usually does not cause a failure, it does cause network over-
utilization by filling networks with unwanted email messages
• A Trojan horse or Trojan program is unauthorized software that
masquerades as legitimate software
• A malicious code attack is a type of attack where an attacker inserts some
type of malicious software, or malware, into a user’s system to disrupt or
disable the operating system or an application
5.6.2 Network Security Mechanisms
• An access control list (ACL) on a router can protect traffic with rules that either
permit or deny traffic through the router. With a consistent deny all philosophy,
rules can be written to permit access by IP address, protocol type, application
type, and session status.
• Many administrators place hardware-based firewalls between the external and
internal network components to protect the systems.
• An implemented intrusion detection system (IDS) can detect unwanted network
attacks and alert an administrator to such events.IDS devices use a signature file
that contains patterns of activity known to represent an attack.
• Using an intrusion prevention system (IPS) can be helpful in network security. The
IPS is placed inline; it does not monitor traffic, but reacts when intrusions are
identified, and blocks the event
Firewall configuration and deployment