Enviar pesquisa
Carregar
Information Security Lesson 5 - Network Infrastructure - Eric Vanderburg
•
Transferir como PPT, PDF
•
0 gostou
•
760 visualizações
Eric Vanderburg
Seguir
Information Security Lesson 5 - Network Infrastructure - Eric Vanderburg
Leia menos
Leia mais
Tecnologia
Denunciar
Compartilhar
Denunciar
Compartilhar
1 de 30
Baixar agora
Recomendados
Secure Communications
Secure Communications
chriscavallo
Information Security Lesson 7 - Remote Access - Eric Vanderburg
Information Security Lesson 7 - Remote Access - Eric Vanderburg
Eric Vanderburg
Market Trend And Korenix IIoT Vision - 2018
Market Trend And Korenix IIoT Vision - 2018
Jiunn-Jer Sun
Network Security Through FIREWALL
Network Security Through FIREWALL
TheCreativedev Blog
Seminar
Seminar
Abhinav Kushwah
ZyXEL MWC 2014 Small Business Gateway (SBG) Product Scope and Features
ZyXEL MWC 2014 Small Business Gateway (SBG) Product Scope and Features
Zyxel Communications Corp.
Wall mounted ip network adapter t 7806
Wall mounted ip network adapter t 7806
Trimatrik Multimedia
Meletis Belsis - Voip security
Meletis Belsis - Voip security
Meletis Belsis MPhil/MRes/BSc
Recomendados
Secure Communications
Secure Communications
chriscavallo
Information Security Lesson 7 - Remote Access - Eric Vanderburg
Information Security Lesson 7 - Remote Access - Eric Vanderburg
Eric Vanderburg
Market Trend And Korenix IIoT Vision - 2018
Market Trend And Korenix IIoT Vision - 2018
Jiunn-Jer Sun
Network Security Through FIREWALL
Network Security Through FIREWALL
TheCreativedev Blog
Seminar
Seminar
Abhinav Kushwah
ZyXEL MWC 2014 Small Business Gateway (SBG) Product Scope and Features
ZyXEL MWC 2014 Small Business Gateway (SBG) Product Scope and Features
Zyxel Communications Corp.
Wall mounted ip network adapter t 7806
Wall mounted ip network adapter t 7806
Trimatrik Multimedia
Meletis Belsis - Voip security
Meletis Belsis - Voip security
Meletis Belsis MPhil/MRes/BSc
How to secure your industrial network using segmentation and segregation
How to secure your industrial network using segmentation and segregation
Westermo Network Technologies
GSM Part-20
GSM Part-20
Techvilla
Wall mounted ip network adapter t 7805 a
Wall mounted ip network adapter t 7805 a
Trimatrik Multimedia
How to migrate legacy serial devices to IP broadband
How to migrate legacy serial devices to IP broadband
Westermo Network Technologies
Databook 2016-151224-a3
Databook 2016-151224-a3
DrayTek
Webinar how to prepare for the sunset of 2G and 3G cellular communications
Webinar how to prepare for the sunset of 2G and 3G cellular communications
Westermo Network Technologies
Mobile Video Architecture project
Mobile Video Architecture project
Transit-Protect
Draytek Databook 2015 v2
Draytek Databook 2015 v2
DrayTek
Digistor standalone NVR - Info tech Middle East
Digistor standalone NVR - Info tech Middle East
Ali Shoaee
Intoto Linley Tech Utm Architecture Presentation
Intoto Linley Tech Utm Architecture Presentation
saddepalli
Changes to Priority 2 E-Rate: How Pine Cove Consulting and Sophos Can Help
Changes to Priority 2 E-Rate: How Pine Cove Consulting and Sophos Can Help
Pine Cove Consulting
1000281 en 2
1000281 en 2
nguyenlam123
Juniper Networks SRX Branch Solutions
Juniper Networks SRX Branch Solutions
Altaware, Inc.
Air vision ds
Air vision ds
Lamarck Sousa
LoRaWAN for IoT
LoRaWAN for IoT
Stavros Kalapothas
Low-Power Wide Area - Overview
Low-Power Wide Area - Overview
M2M Alliance e.V.
DrayTek switch_management_intro
DrayTek switch_management_intro
DrayTek
Databook 2017 v2
Databook 2017 v2
DrayTek
An Overview of LoRA, Sigfox, and IEEE 802.11ah
An Overview of LoRA, Sigfox, and IEEE 802.11ah
Faheem Zafari
Networking Concepts Lesson 01 - Intro - Eric Vanderburg
Networking Concepts Lesson 01 - Intro - Eric Vanderburg
Eric Vanderburg
Network security & information security maintainence modified
Network security & information security maintainence modified
Keerthan Shetty
Networking Concepts Lesson 03 - Media - Eric Vanderburg
Networking Concepts Lesson 03 - Media - Eric Vanderburg
Eric Vanderburg
Mais conteúdo relacionado
Mais procurados
How to secure your industrial network using segmentation and segregation
How to secure your industrial network using segmentation and segregation
Westermo Network Technologies
GSM Part-20
GSM Part-20
Techvilla
Wall mounted ip network adapter t 7805 a
Wall mounted ip network adapter t 7805 a
Trimatrik Multimedia
How to migrate legacy serial devices to IP broadband
How to migrate legacy serial devices to IP broadband
Westermo Network Technologies
Databook 2016-151224-a3
Databook 2016-151224-a3
DrayTek
Webinar how to prepare for the sunset of 2G and 3G cellular communications
Webinar how to prepare for the sunset of 2G and 3G cellular communications
Westermo Network Technologies
Mobile Video Architecture project
Mobile Video Architecture project
Transit-Protect
Draytek Databook 2015 v2
Draytek Databook 2015 v2
DrayTek
Digistor standalone NVR - Info tech Middle East
Digistor standalone NVR - Info tech Middle East
Ali Shoaee
Intoto Linley Tech Utm Architecture Presentation
Intoto Linley Tech Utm Architecture Presentation
saddepalli
Changes to Priority 2 E-Rate: How Pine Cove Consulting and Sophos Can Help
Changes to Priority 2 E-Rate: How Pine Cove Consulting and Sophos Can Help
Pine Cove Consulting
1000281 en 2
1000281 en 2
nguyenlam123
Juniper Networks SRX Branch Solutions
Juniper Networks SRX Branch Solutions
Altaware, Inc.
Air vision ds
Air vision ds
Lamarck Sousa
LoRaWAN for IoT
LoRaWAN for IoT
Stavros Kalapothas
Low-Power Wide Area - Overview
Low-Power Wide Area - Overview
M2M Alliance e.V.
DrayTek switch_management_intro
DrayTek switch_management_intro
DrayTek
Databook 2017 v2
Databook 2017 v2
DrayTek
An Overview of LoRA, Sigfox, and IEEE 802.11ah
An Overview of LoRA, Sigfox, and IEEE 802.11ah
Faheem Zafari
Networking Concepts Lesson 01 - Intro - Eric Vanderburg
Networking Concepts Lesson 01 - Intro - Eric Vanderburg
Eric Vanderburg
Mais procurados
(20)
How to secure your industrial network using segmentation and segregation
How to secure your industrial network using segmentation and segregation
GSM Part-20
GSM Part-20
Wall mounted ip network adapter t 7805 a
Wall mounted ip network adapter t 7805 a
How to migrate legacy serial devices to IP broadband
How to migrate legacy serial devices to IP broadband
Databook 2016-151224-a3
Databook 2016-151224-a3
Webinar how to prepare for the sunset of 2G and 3G cellular communications
Webinar how to prepare for the sunset of 2G and 3G cellular communications
Mobile Video Architecture project
Mobile Video Architecture project
Draytek Databook 2015 v2
Draytek Databook 2015 v2
Digistor standalone NVR - Info tech Middle East
Digistor standalone NVR - Info tech Middle East
Intoto Linley Tech Utm Architecture Presentation
Intoto Linley Tech Utm Architecture Presentation
Changes to Priority 2 E-Rate: How Pine Cove Consulting and Sophos Can Help
Changes to Priority 2 E-Rate: How Pine Cove Consulting and Sophos Can Help
1000281 en 2
1000281 en 2
Juniper Networks SRX Branch Solutions
Juniper Networks SRX Branch Solutions
Air vision ds
Air vision ds
LoRaWAN for IoT
LoRaWAN for IoT
Low-Power Wide Area - Overview
Low-Power Wide Area - Overview
DrayTek switch_management_intro
DrayTek switch_management_intro
Databook 2017 v2
Databook 2017 v2
An Overview of LoRA, Sigfox, and IEEE 802.11ah
An Overview of LoRA, Sigfox, and IEEE 802.11ah
Networking Concepts Lesson 01 - Intro - Eric Vanderburg
Networking Concepts Lesson 01 - Intro - Eric Vanderburg
Destaque
Network security & information security maintainence modified
Network security & information security maintainence modified
Keerthan Shetty
Networking Concepts Lesson 03 - Media - Eric Vanderburg
Networking Concepts Lesson 03 - Media - Eric Vanderburg
Eric Vanderburg
Recording formats and_editing_softwares
Recording formats and_editing_softwares
Azizur Rahman
Network Security Offering by GSS America
Network Security Offering by GSS America
Gss America
Soft computing and artificial intelligence techniques for intrusion
Soft computing and artificial intelligence techniques for intrusion
Alexander Decker
Information & network security certifications
Information & network security certifications
Hamid Hasanabadi
Artificial intelligence original
Artificial intelligence original
Saila Sri
Wire Less
Wire Less
leminhvuong
Advanced Computing Techonologies
Advanced Computing Techonologies
Kathirvel Ayyaswamy
Introduction of cryptography and network security
Introduction of cryptography and network security
NEHA PATEL
Network security
Network security
Jarno Niemela
Information and Network Security
Information and Network Security
Maulik Togadiya
Basics of Soft Computing
Basics of Soft Computing
Sangeetha Rajesh
Conventional Encryption NS2
Conventional Encryption NS2
koolkampus
Soft computing
Soft computing
ganeshpaul6
NetworkSecurity.ppt
NetworkSecurity.ppt
DreamMalar
Network Security
Network Security
MAJU
Destaque
(17)
Network security & information security maintainence modified
Network security & information security maintainence modified
Networking Concepts Lesson 03 - Media - Eric Vanderburg
Networking Concepts Lesson 03 - Media - Eric Vanderburg
Recording formats and_editing_softwares
Recording formats and_editing_softwares
Network Security Offering by GSS America
Network Security Offering by GSS America
Soft computing and artificial intelligence techniques for intrusion
Soft computing and artificial intelligence techniques for intrusion
Information & network security certifications
Information & network security certifications
Artificial intelligence original
Artificial intelligence original
Wire Less
Wire Less
Advanced Computing Techonologies
Advanced Computing Techonologies
Introduction of cryptography and network security
Introduction of cryptography and network security
Network security
Network security
Information and Network Security
Information and Network Security
Basics of Soft Computing
Basics of Soft Computing
Conventional Encryption NS2
Conventional Encryption NS2
Soft computing
Soft computing
NetworkSecurity.ppt
NetworkSecurity.ppt
Network Security
Network Security
Semelhante a Information Security Lesson 5 - Network Infrastructure - Eric Vanderburg
Airheads barcelona 2010 securing wireless la ns
Airheads barcelona 2010 securing wireless la ns
Aruba, a Hewlett Packard Enterprise company
Accessing remote networks
Accessing remote networks
Westermo Network Technologies
CISSP Prep: Ch 5. Communication and Network Security (Part 2)
CISSP Prep: Ch 5. Communication and Network Security (Part 2)
Sam Bowne
CNIT 125 Ch 5 Communication & Network Security (part 2 of 2)
CNIT 125 Ch 5 Communication & Network Security (part 2 of 2)
Sam Bowne
Designing Local Area Network
Designing Local Area Network
zaisahil
wirelesssecurity materialwirelesssecurity materialwirelesssecurity material
wirelesssecurity materialwirelesssecurity materialwirelesssecurity material
Nune SrinivasRao
Networking
Networking
Saeed Abdillahi
Basic networking
Basic networking
PredieCatherynestrella Reyes
Understanding IT Network Security for Wireless and Wired Measurement Applicat...
Understanding IT Network Security for Wireless and Wired Measurement Applicat...
cmstiernberg
Hardware firewall
Hardware firewall
Subrata Kumer Paul
Ethernet basics
Ethernet basics
erick4chitsime
MeshDynamics Mesh Networks- High Level Overview
MeshDynamics Mesh Networks- High Level Overview
MeshDynamics
Enterprise campus networks
Enterprise campus networks
Kishor Satpathy
internet network for o level
internet network for o level
Samit Singh
Network Concepts
Network Concepts
Rajamanickam Gomathijayam
Zero Trust for Private 5G and Edge
Zero Trust for Private 5G and Edge
Rebekah Rodriguez
Information Security Lesson 13 - Advanced Security - Eric Vanderburg
Information Security Lesson 13 - Advanced Security - Eric Vanderburg
Eric Vanderburg
Computer Networks .pdf
Computer Networks .pdf
JebasudhaKingston1
Information Security Lesson 4 - Baselines - Eric Vanderburg
Information Security Lesson 4 - Baselines - Eric Vanderburg
Eric Vanderburg
A better connected world - Beijer Sales Kit 2017
A better connected world - Beijer Sales Kit 2017
Jiunn-Jer Sun
Semelhante a Information Security Lesson 5 - Network Infrastructure - Eric Vanderburg
(20)
Airheads barcelona 2010 securing wireless la ns
Airheads barcelona 2010 securing wireless la ns
Accessing remote networks
Accessing remote networks
CISSP Prep: Ch 5. Communication and Network Security (Part 2)
CISSP Prep: Ch 5. Communication and Network Security (Part 2)
CNIT 125 Ch 5 Communication & Network Security (part 2 of 2)
CNIT 125 Ch 5 Communication & Network Security (part 2 of 2)
Designing Local Area Network
Designing Local Area Network
wirelesssecurity materialwirelesssecurity materialwirelesssecurity material
wirelesssecurity materialwirelesssecurity materialwirelesssecurity material
Networking
Networking
Basic networking
Basic networking
Understanding IT Network Security for Wireless and Wired Measurement Applicat...
Understanding IT Network Security for Wireless and Wired Measurement Applicat...
Hardware firewall
Hardware firewall
Ethernet basics
Ethernet basics
MeshDynamics Mesh Networks- High Level Overview
MeshDynamics Mesh Networks- High Level Overview
Enterprise campus networks
Enterprise campus networks
internet network for o level
internet network for o level
Network Concepts
Network Concepts
Zero Trust for Private 5G and Edge
Zero Trust for Private 5G and Edge
Information Security Lesson 13 - Advanced Security - Eric Vanderburg
Information Security Lesson 13 - Advanced Security - Eric Vanderburg
Computer Networks .pdf
Computer Networks .pdf
Information Security Lesson 4 - Baselines - Eric Vanderburg
Information Security Lesson 4 - Baselines - Eric Vanderburg
A better connected world - Beijer Sales Kit 2017
A better connected world - Beijer Sales Kit 2017
Mais de Eric Vanderburg
GDPR, Data Privacy and Cybersecurity - MIT Symposium
GDPR, Data Privacy and Cybersecurity - MIT Symposium
Eric Vanderburg
Modern Security the way Equifax Should Have
Modern Security the way Equifax Should Have
Eric Vanderburg
Cybercrime and Cyber Threats - CBLA - Eric Vanderburg
Cybercrime and Cyber Threats - CBLA - Eric Vanderburg
Eric Vanderburg
Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...
Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...
Eric Vanderburg
Mobile Forensics and Cybersecurity
Mobile Forensics and Cybersecurity
Eric Vanderburg
2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...
2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...
Eric Vanderburg
Ransomware: 2016's Greatest Malware Threat
Ransomware: 2016's Greatest Malware Threat
Eric Vanderburg
Emerging Technologies: Japan’s Position
Emerging Technologies: Japan’s Position
Eric Vanderburg
Principles of technology management
Principles of technology management
Eric Vanderburg
Japanese railway technology
Japanese railway technology
Eric Vanderburg
Evaluating japanese technological competitiveness
Evaluating japanese technological competitiveness
Eric Vanderburg
Japanese current and future technology management challenges
Japanese current and future technology management challenges
Eric Vanderburg
Technology management in Japan: Robotics
Technology management in Japan: Robotics
Eric Vanderburg
Incident response table top exercises
Incident response table top exercises
Eric Vanderburg
The Prescription for Protection - Avoid Treatment Errors To The Malware Problem
The Prescription for Protection - Avoid Treatment Errors To The Malware Problem
Eric Vanderburg
Cloud Storage and Security: Solving Compliance Challenges
Cloud Storage and Security: Solving Compliance Challenges
Eric Vanderburg
Hacktivism: Motivations, Tactics and Threats
Hacktivism: Motivations, Tactics and Threats
Eric Vanderburg
Correct the most common web development security mistakes - Eric Vanderburg
Correct the most common web development security mistakes - Eric Vanderburg
Eric Vanderburg
Deconstructing website attacks - Eric Vanderburg
Deconstructing website attacks - Eric Vanderburg
Eric Vanderburg
Countering malware threats - Eric Vanderburg
Countering malware threats - Eric Vanderburg
Eric Vanderburg
Mais de Eric Vanderburg
(20)
GDPR, Data Privacy and Cybersecurity - MIT Symposium
GDPR, Data Privacy and Cybersecurity - MIT Symposium
Modern Security the way Equifax Should Have
Modern Security the way Equifax Should Have
Cybercrime and Cyber Threats - CBLA - Eric Vanderburg
Cybercrime and Cyber Threats - CBLA - Eric Vanderburg
Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...
Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...
Mobile Forensics and Cybersecurity
Mobile Forensics and Cybersecurity
2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...
2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...
Ransomware: 2016's Greatest Malware Threat
Ransomware: 2016's Greatest Malware Threat
Emerging Technologies: Japan’s Position
Emerging Technologies: Japan’s Position
Principles of technology management
Principles of technology management
Japanese railway technology
Japanese railway technology
Evaluating japanese technological competitiveness
Evaluating japanese technological competitiveness
Japanese current and future technology management challenges
Japanese current and future technology management challenges
Technology management in Japan: Robotics
Technology management in Japan: Robotics
Incident response table top exercises
Incident response table top exercises
The Prescription for Protection - Avoid Treatment Errors To The Malware Problem
The Prescription for Protection - Avoid Treatment Errors To The Malware Problem
Cloud Storage and Security: Solving Compliance Challenges
Cloud Storage and Security: Solving Compliance Challenges
Hacktivism: Motivations, Tactics and Threats
Hacktivism: Motivations, Tactics and Threats
Correct the most common web development security mistakes - Eric Vanderburg
Correct the most common web development security mistakes - Eric Vanderburg
Deconstructing website attacks - Eric Vanderburg
Deconstructing website attacks - Eric Vanderburg
Countering malware threats - Eric Vanderburg
Countering malware threats - Eric Vanderburg
Último
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
panagenda
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
Farhan Tariq
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
IES VE
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
itnewsafrica
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
Lonnie McRorey
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Alkin Tezuysal
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
Kari Kakkonen
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
Hiroshi SHIBATA
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
Nicole Novielli
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
Manik S Magar
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
Curtis Poe
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
LoriGlavin3
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
Nathaniel Shimoni
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
itnewsafrica
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Mark Goldstein
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
itnewsafrica
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
panagenda
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Pim van der Noll
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
Ravi Sanghani
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog Presentation
Knoldus Inc.
Último
(20)
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog Presentation
Information Security Lesson 5 - Network Infrastructure - Eric Vanderburg
1.
Information Security Chapter 5 Securing
the Network Infrastructure Information Security © 2006 Eric Vanderburg
2.
Cabling • Cable Plant
– Network infrastructure • Cable Characteristics – – – – – – – – – Bandwidth Rating Max Segment Length Segments per network Devices per segment Interference Susceptibility (EMI & RFI) Connection Hardware Cable Grade (PVC or Plenum Grade Teflon) Bend radius Cost (Material, Installation, & Maintenance) Information Security © 2006 Eric Vanderburg
3.
Coaxial Cable (Coax) •
Thicknet (10base5) – – – – ½ inch thick RG-11 or RG-8 Vampire tap AUI (Attachment Unit Interface) - 15 pin DB-15 • Thinnet (10base2) – BNC (British Naval Connector) – 50 ohms impedance – RG-58 • Coax for Broadband (RG-59, 75 Ohm) Information Security © 2006 Eric Vanderburg
4.
Twisted Pair • Twists
reduce crosstalk • UTP (Unshielded Twisted Pair) 10baseT • STP (Shielded Twisted Pair) – Foil wrapped around wires • Phone line (RJ-11) • TP Network cable (RJ-45) • 100 Meter max length Information Security © 2006 Eric Vanderburg
5.
Twisted Pair Categories • • • • • • • • Cat1
– voice only, before 1982 Cat2 – 4 wires, 4Mbps Cat3 – 4 wires, 10Mbps, 3 twists/foot Cat4 – 8 wires, 16Mbps Cat5 – 8 wires, 100Mbps Cat5e – 8 wires, 1Gbps, full-duplex, 100MHz* Cat6 – 8 wires, 1Gbps, 250MHz*, larger, more sensitive Cat7 – 8 wires, shielded, 1Gbps, 600MHz*, individually shielded pairs • *Easier to detect defects with higher frequencies Information Security © 2006 Eric Vanderburg
6.
Fiber Optic • • • • • • • • • Signal sent
by light No eavesdropping No interference Two cables needed for full duplex Surrounded by Kevlar Max length: 2-100 km 1Gbps & 10Gbps implementations Difficult to install Expensive (Cable, Install, Maintenance) Information Security © 2006 Eric Vanderburg
7.
Fiber Optic Connectors ST
(Straight Tip) SC (Straight Connection) LC (Link Control) MIC (Medium Interface Connector) MT-RJ two cables in one RJ-45 clone SMA (Subminiature Type A) Information Security © 2006 Eric Vanderburg
8.
Fiber Optic cable
types • Single mode – – – – Laser based Spans longer distance One piece of glass Core: 2-9 microns • Multi-mode – – – – LED based Shorter distance Multiple pieces of glass Core: 25-200 microns Information Security © 2006 Eric Vanderburg
9.
Quick Comparison Type Length Bandwidth Installation Interference Cost UTP 100 meters 10Mbps-1Gbps Easy High Cheapest STP 100
meters 16Mbps-1Gbps Moderate Moderate Moderate Thinnet 185 meters 10Mbps Easy Moderate Cheap Thicknet 500 meters 10Mbps Hard Low Expensive 2-100 kilometers 100Mbps-10Gbps Moderate None Most Expensive Fiber Information Security © 2006 Eric Vanderburg
10.
Sniffers • Captures all
data packets that travel on a network. • Designed for use in network diagnostics • Hard to trace because it is passive • Can be used to find passwords or other sensitive information • Mitigate with switched networks • Protect the physical environment • Watch out for comprimised hosts Information Security © 2006 Eric Vanderburg
11.
Removable Media • Optical
Media – CD – DVD • Magnetic Media – – – – Floppy disk Hard drive Micro drive Tape • Flash Media – USB Stick, CF (non microdrive), SD, MMC, SmartMedia, Game cartridge, PCMCIA, Rom Chips Information Security © 2006 Eric Vanderburg
12.
Securing Removable Media •
Encrypt USB Sticks • Disable or lock USB ports on the computer • Physical check that devices are not brought in Information Security © 2006 Eric Vanderburg
13.
Terms • Workstation • Server •
Terminal Information Security © 2006 Eric Vanderburg
14.
Server Types • • • • • • • • Domain Controller Application
Server File Server Print Server Communication Server Web Server Mail Server Name Server Information Security © 2006 Eric Vanderburg
15.
Server Vendors • • Sun
Microsystems Microsoft – Solaris – Looking Glass – Windows NT – Windows 2000 – Windows 2003 • • • Linux (Various Distributions) Novell Netware OS/2 • Apple – Mac OSX Server • FreeBSD • NeXT Operating Systems Microsoft Linux UNIX BSD NeXT MacOSX NetWare v1-5 Mac OS 1-9 NetWare 6 Information Security © 2006 Eric Vanderburg OS/2
16.
Equipment • Repeater • Hubs –
Active (powered – regenerates signal) – Passive (unpowered) • Bridge – Translation bridge – translates differing frame types for different architectures (ATM, Ethernet) • Router – Reduces the broadcast domain – Looks at packets – Can filter by packets Information Security © 2006 Eric Vanderburg
17.
Equipment • Switches – Cut-through
switching – reads only the first part of the frame to forward it. – Store & forward switching • Reads entire frame before forwarding. Also does error checking using the CRC field, discards if errors. • Saves bandwidth because bad frames are not forwarded. Requires faster switches • Fragment free switching – reads enough to know it is not a malformed or damaged frame – – – – Reduces the collision domain Looks at frames VLANs (Virtual LAN) Core switch – central to the network. Other switches connect into it – Workgroup switch – connects to network nodes Information Security © 2006 Eric Vanderburg
18.
Network Management • SNMP
(Simple Network Management Protocol) – Agents – MIB (Management Information Base) – Ports 161 & 162 UDP – SNMP enabled devices are called managed devices Information Security © 2006 Eric Vanderburg
19.
Securing Network Devices •
Create a custom logon prompt to remove any info about the device • Disable HTTP or SNMP access if they are not used – If used, try SSL instead of HTTP – Use SNMP version 3 • Limit access to certain machines or subnets • Log activity • Encrypt management communications Information Security © 2006 Eric Vanderburg
20.
Communication Devices • Modem
(Modulator / Demodulator) • DSL (Digital Subscriber Line) – uses phone lines on a much higher frequency. Dedicated line. • Cable Modem – faster max speed but a shared medium • Central Office (CO) or Head in – local connection point where a neighborhood of connections terminate and are connected into the ISP’s network. • Always-on connections can be tempting for attackers. Firewalls are a must. Information Security © 2006 Eric Vanderburg
21.
Remote Access • RAS
(Remote Access Server) – A computer that allows others to connect into it. – Modem – VPN • Protect using – Authentication – Privileges – Account lockout policies – Firewalls & ACL Information Security © 2006 Eric Vanderburg
22.
File Browsing • UNC
(Universal Naming Convention) – Windows shares are named computernamesharename Information Security © 2006 Eric Vanderburg
23.
Telcos • PBX (Private
Branch Exchange) – private switching station for voice and data services • PBX attacks – Data modification – Denial of service – Information disclosure – Traffic analysis – where calls go to and from, frequency, time – Theft of service Information Security © 2006 Eric Vanderburg
24.
Network Security Devices •
Firewalls – filters packets based on criteria such as an ACL or a rule base • Routers can serve this purpose but they are not as efficient as a dedicated device • Personal firewall (host based) • Enterprise software firewall – designed to run on a powerful machine that analyzes all network traffic running through it. • Hardware firewall – engineered to be able to process packets quickly and efficiently. Information Security © 2006 Eric Vanderburg
25.
Firewalls • Packet filtering –
Stateless – allows or denies packets based on rules – Stateful – keeps a state table of outgoing connections and allows corresponding incoming connections. • Advanced firewalls – Antivirus scanning – Content filtering – looks at web sites and such. Could use a database from another vendor which is updated regularly. Enable and disable types of content – Application layer firewall – looks at many packets together to determine whether to let them in. Information Security © 2006 Eric Vanderburg
26.
Firewalls • DMZ (Demilitarized
Zone) – area that is closer to the untrusted network than the rest of the LAN. Used for services made available to the Internet. • These servers may reside there: – Web server – Email server – RAS server – FTP server – Proxy server Information Security © 2006 Eric Vanderburg
27.
IDS (Intrusion Detection
System) • Monitors the packets on the network for signatures. – Network based - Looks at the overall flow. Positioned where a lot of traffic flows – Host based – resides on one machine and monitors the data coming to that machine. It may communicate with a central device. (Agent based) – Active IDS – can take action when an attack happens. – Passive IDS – alerts the administrator when there is an attack. – Anomaly based IDS or IPS (Intrusion Prevention System) – looks at behavior rather than signatures. May result in more positives. Information Security © 2006 Eric Vanderburg
28.
Other concepts • • • • Intranet Extranet NAT (Network
Address Translation) Honeypot Information Security © 2006 Eric Vanderburg
29.
Acronyms • • • • • • • • CD-ROM, Compact Disk
Read Only Memory CD-R, Compact Disk Recordable CD-RW, Compact Disk Rewritable DMZ, Demilitarized Zone DSL, Digital Subscriber Line DVD, Digital Versatile Disk DVD-R, Digital Versatile Disk Recordable DVD-RAM, Digital Versatile Disk Random Access Memory • DVD-RW, Digital Versatile Disk Rewritable • IDS, Intrusion Detection System Information Security © 2006 Eric Vanderburg
30.
Acronyms • • • • • • • • • • MIB, Management Information
base NAT, Network Address Translation PAT, Port Address Translation PBX, Private Branch Exchange RAS, Remote Access Server STP, Shielded Twisted Pair SNMP, Simple Network Management Protocol UNC, Universal Naming Convention UTP, Unshielded Twisted pair VLAN, Virtual Local Area Network Information Security © 2006 Eric Vanderburg
Baixar agora