Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

Networking, Cloud Computing, Protocol, Risk and Controls

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 32

Networking, Cloud Computing

Protocols, Risk and Controls

Presented By
Samuel O. Dawodu, B.Eng
Computer Network

A computer network is a group of devices connected with each other


through a transmission medium such as wires, cables etc. These
devices can be computers, printers, scanners, Fax machines etc.
The purpose of a computer network is to exchange data between or
share resources in other devices over the network. These devices are
often referred as nodes.
Network Components

A computer network is built up from several components.

• Router
• Switches
• Servers
• Clients
• Modem
• NICS
• Cables
• Transmission Media
Network Architecture

Network architecture is the logical and structural layout of the network, consisting of transmission
equipment, software and communication protocols, and infrastructure (i.e. wired or wireless)
transmission of data and connectivity between components.

The two types of widely used network architectures are peer-to-peer aka P2P and client/server aka
tiered
Peer to Peer Networking

All the computers in a computer Advantages


network are connected with every • Less costly, no need for a central server

computer in the network. • A failure on one computer does not affect others
• Installation and set up is easy
Every computer in the network use
the same resources as other
computers.
Disadvantages
There is no central computer that • Security and data backup is being done to each
acts as a server. computer on the network
• Scalability is an issue. The more the computers,
the more it is difficult to manage in terms of
All computers acts as a server for security, performance and connectivity
the data that is stored in them.
• Data backup is easy and cost effective

Client Server Networking • Performance and response time is better as the


server is more powerful than the rest
• Security is easier managed from the server
• Scalability is not an issue as more computers can
• A powerful central computer acts be connected to the server easily.
Advantages
as a hub and serves all the requests
from client computers.

• All the shared data is stored in the


server computer and shared with
the client computer when a request
is made by the client computer

• All the communication takes place


Disadvantages
through the server computer • In case of server failure entire network is down.
• Server maintenance cost is high as the server is
the main component in this Architecture. More
resources will be needed to handle many client
request and to hold large amount of data.
Types of Network
Personal Area Network (PAN)

A personal area network is a computer network for


interconnecting electronic devices centered on an individual
person's workspace.

A PAN provides data transmission among devices such as


computers, smartphones, tablets and personal digital assistants
Local Area Network (LAN)

A local area network is a computer network that interconnects


computers within a limited area such as an office building.

LANs are not limited to wire connection, there is a new


evolution to the LANs that allows local area network to work
on a wireless connection – Wireless LAN (WLAN).
Metropolitan Area Network (MAN)

• MAN network covers larger area by connecting LANs


to a larger network of computers.
• In Metropolitan area network various Local area
networks are connected with each other through
telephone lines.
• The size of the Metropolitan area network is larger than
LANs and smaller than WANs(wide area networks), a
MANs covers the larger area of a city or town.
Wide Area Network (WAN)

 Wide area network provides long distance


transmission of data. The size of the WAN is larger
than LAN and MAN.
 A WAN can cover country, continent or even a
whole world. Internet connection is an example of
WAN.
 Other examples of WAN are mobile broadband
connections such as 3G, 4G etc.
Other types of Networks

• Virtual Private Network (VPN)

• Cloud Network
Virtual Private Network (VPN)

A virtual private network, or VPN, is an encrypted connection


over the Internet from a device to a network. The encrypted
connection helps ensure that sensitive data is safely transmitted.
It prevents unauthorized people from eavesdropping on the
traffic and allows the user to conduct work remotely.
By extending a private network across the Internet, a VPN lets
its users send and receive data as if their devices were connected
to the private network – even if they’re not. Through a virtual
point-to-point connection, users can access a private network
remotely.
VPNs can be divided into three main categories – remote
access, intranet-based site-to-site, and extranet-based site-to-
site.
Types of VPN

REMOTE ACCESS VPN

 Provides multiple users in various fixed locations


with the ability to access each other’s resources.
 Connecting  local area networks (LANs) of the
same organization but geographically separated to
the same wide area network (WAN) so they can
securely share the information and resources
between each other
Types of VPN

INTRANET-BASED SITE-TO-SITE VPN

Provides multiple users in various fixed


locations with the ability to access each
other’s resources.

Connecting  local area networks (LANs) of


the same organization but geographically
separated to the same wide area network
(WAN) so they can securely share the
information and resources between each other.
Types of VPN

EXTRANET-BASED SITE-TO-SITE VPN

it’s used when a connection between two separate


intranets is required, but without the possibility of
one accessing the other directly. An example of
that would be two separate companies working
together.

Connecting  local area networks (LANs) of the


different organization to the same wide area
network (WAN) so they can securely share the
information and resources between each other.
Cloud Computing

 On-demand availability of computer system resources,


especially data storage (cloud storage) and computing
power, without direct active management by the user.
 Generally used to describe data centers available to many
users over the Internet.
 A fundamental concept behind cloud computing is that the
location of the service, and many of the details such as the
hardware or operating system on which it is running, are
largely irrelevant to the user.
Cloud Computing Models

Infrastructure-as-a- Platform-as-a-Service Software-as-a-Service


Service (IaaS) ((PaaS) (SaaS)
• refers to the fundamental building • As well as the underlying storage, • delivery of applications-as-a-service
blocks of computing that can be rented networking, and virtual servers this
will also include the tools and
• underlying hardware and operating
• physical or virtual servers, storage and system is irrelevant to the end user,
software that developers need to
networking
build applications on top of • service is access via a web browser
• Attractive to companies that want to or app; it is often bought on a per-
build applications from the very
• Could include middleware, database
management, operating systems, and seat or per-user basis.
ground up and want to control nearly
all the elements themselves development tools.

• Rrequire firms to have the technical


skills to be able to orchestrate services
at that level
Protocols make it possible for the
various components of a network to
communicate with each other.

Network They are a set of rules governing


exchange of information in an easy,
Protocols reliable and secure way

The OSI and the TCP/IP Model


provides more information on how the
protocols interoperate in network
communication
OSI vs TCP/IP Model
Protocol Port Number Description

File Transfer Protocol 20/21 FTP allows users to transfer files from one machine to another. Types of files may
(FTP) include program files, multimedia files, text files, and documents, etc..

Secure Shell (SSH) 22 SSH is the primary method used to manage network devices securely at the
command level. It is typically used as a secure alternative to Telnet which does not
support secure connections.

Telnet 23 Telnet is the primary method used to manage network devices at the command

Common
level. Unlike SSH which provides a secure connection, Telnet does not. Caution
should be used when connecting to a device using Telnet over a public network as
the login credentials will be transmitted in the clear.

Simple Mail Transfer


Protocol (SMTP)
25 SMTP is used for two primary functions, it is used to transfer mail (email) from
source to destination between mail servers and it is used by end users to send email
Protocols
to a mail system.

Domain Name System 53 The DNS is used widely on the public internet and on private networks to translate
(DNS) domain names into IP addresses, typically for network routing. A DNS server can
also be set up within a private network to private naming services between the hosts
of the internal network without being part of the global system.
Protocol Port Number Description

Dynamic Host Configuration Protocol (DHCP) 67/68 DHCP is use to dynamically assign IP address to systems on the network. A poll of addresses

that are available for assignment is set up on the DHCP server from which the Ips
are selected and assiged to systems

Hypertext Transfer Protocol (HTTP) 80 HTTP is one of the most commonly used protocols on most networks. HTTP is the main

protocol that is used by web browsers and is thus used by any client that uses files located on

these servers.

Post Office Protocol (POP) version 3 110 POP version 3 is one of the two main protocols used to retrieve mail from a server. POP was

designed to be very simple by allowing a client to retrieve the complete contents of a server

mailbox and then deleting the contents from the server.

Common
Network Time Protocol (NTP)

Simple Network Management Protocol (SNMP)


123

161/162
NTP is used to synchronize the devices on the Internet and internal networks for keeping an

accurat clock on systems on the network.

SNMP is used by network administrators as a method of network management. SNMP has a


Protocols
number of different abilities including the ability to monitor, configure and control network

devices.

Lightweight Directory Access Protocol (LDAP) 389 LDAP provides a mechanism of accessing and maintaining distributed directory information.

Hypertext Transfer Protocol over SSL/TLS (HTTPS) 443 HTTPS is used in conjunction with HTTP to provide the same services but doing it using a

secure connection which is provided by either SSL or TLS.


NETWORK SECURITY THREATS

 A network security threat is an effort to obtain illegal admission


to your organization’s network, to take your data without your
knowledge, or execute other malicious pursuits.

 Your network security is at risk or vulnerable if or when there is


a weakness or vulnerability within your computer network.
Common Network Threats

Computer Virus Rogue security software Trojan Horse


• Pieces of software that are designed • Malicious software that misleads • A malicious bit of attacking code or
to be spread from one computer to users to believe there is a computer software hiding behind a legitimate
another. virus installed on their computer or program that tricks users into
that their security measures are not running it willingly.
• They’re often sent as email up to date.
attachments or downloaded from • Can record your passwords by
specific websites with the intent to • Tthey offer to install or update users’ logging keystrokes and stealing any
infect your computer and other security settings through the sensitive data you may on your
computers on your contact list by download of their program to computer
using systems on your network remove the alleged viruses, or to pay
for a tool.
• leads to actual malware being
installed on your computer
Common Network Threats

Adware and Spyware Computer worm Rootkit


• Malicious software that replicates • A collection of software tools that enables
• Adware collects data with consent quickly and spread from one remote control and administration-level access
and automatically displays computer to another. over a computer or computer networks.
advertisements based on browsing • Transmission of worms is also often • Once remote access is obtained, the rootkit can
habits. Spyware is installed without done by exploiting software perform a number of malicious actions; they
user consent and is able to collect vulnerabilities. come equipped with keyloggers, password
data from user system. stealers and antivirus disablers.
Common Network Threats

Phishing SQL Injection attack Man-in-the-middle attacks


• A method of a social engineering with the • Target data-driven applications by • Allows the attacker to eavesdrop on private
goal of obtaining sensitive data such as exploiting security vulnerabilities in communication between two targets
passwords, usernames, credit card the application’s software
numbers.
• Types of MITM attacks Includes:
• One of the most dangerous privacy  DNS spoofing
• Attacks often come in the form of instant issues for data confidentiality
messages or phishing emails designed to  HTTPS spoofing
appear legitimate. The recipient of the  IP spoofing
email is then tricked into opening a
malicious link, which leads to the  ARP spoofing
installation of malware on the recipient’s  SSL hijacking
computer
 Wi-Fi hacking
Network Security Threats

DOS and DDOS attack


• A DoS attack is performed by one machine and its
internet connection, by flooding a website with packets
and making it impossible for legitimate users to access
the content of flooded website.

• A DDoS attack, or distributed denial-of-service attack is


launched from several computers, and the number of
computers involved can range from just a couple of
them to thousands or even more.
NETWORK RISK

Confidentiality Risk Integrity Risk Availability Risk


Unauthorized access to Unauthorized Unavailability of network
sensitive and private modification/changes to resources to authorized users
information critical information or
configuration
Network Controls

PREVENTIVE CONTROLS

A network Architecture Asset inventory and Vulnerability and Patch


documentation Classification management Process

Well configured perimeter Secure authentication


Antivirus programs
defense systems systems and processes

Regular Employee training Privileged Access


and awareness programs Management process
Network Controls

DETECTIVE CONTROLS

Enterprise log Management File Integrity monitoring Database Activity Endpoint Detection and
System and monitoring (FIM) solution Monitoring Response Solution
process
Network Controls

CORRECTIVE CONTROLS

 Enterprise Data Backup and Restoration process


 Incidence Response Management
 Business Continuity and Disaster Recovery

You might also like