Networking, Cloud Computing, Protocol, Risk and Controls
Networking, Cloud Computing, Protocol, Risk and Controls
Networking, Cloud Computing, Protocol, Risk and Controls
Presented By
Samuel O. Dawodu, B.Eng
Computer Network
• Router
• Switches
• Servers
• Clients
• Modem
• NICS
• Cables
• Transmission Media
Network Architecture
Network architecture is the logical and structural layout of the network, consisting of transmission
equipment, software and communication protocols, and infrastructure (i.e. wired or wireless)
transmission of data and connectivity between components.
The two types of widely used network architectures are peer-to-peer aka P2P and client/server aka
tiered
Peer to Peer Networking
computer in the network. • A failure on one computer does not affect others
• Installation and set up is easy
Every computer in the network use
the same resources as other
computers.
Disadvantages
There is no central computer that • Security and data backup is being done to each
acts as a server. computer on the network
• Scalability is an issue. The more the computers,
the more it is difficult to manage in terms of
All computers acts as a server for security, performance and connectivity
the data that is stored in them.
• Data backup is easy and cost effective
• Cloud Network
Virtual Private Network (VPN)
File Transfer Protocol 20/21 FTP allows users to transfer files from one machine to another. Types of files may
(FTP) include program files, multimedia files, text files, and documents, etc..
Secure Shell (SSH) 22 SSH is the primary method used to manage network devices securely at the
command level. It is typically used as a secure alternative to Telnet which does not
support secure connections.
Telnet 23 Telnet is the primary method used to manage network devices at the command
Common
level. Unlike SSH which provides a secure connection, Telnet does not. Caution
should be used when connecting to a device using Telnet over a public network as
the login credentials will be transmitted in the clear.
Domain Name System 53 The DNS is used widely on the public internet and on private networks to translate
(DNS) domain names into IP addresses, typically for network routing. A DNS server can
also be set up within a private network to private naming services between the hosts
of the internal network without being part of the global system.
Protocol Port Number Description
Dynamic Host Configuration Protocol (DHCP) 67/68 DHCP is use to dynamically assign IP address to systems on the network. A poll of addresses
that are available for assignment is set up on the DHCP server from which the Ips
are selected and assiged to systems
Hypertext Transfer Protocol (HTTP) 80 HTTP is one of the most commonly used protocols on most networks. HTTP is the main
protocol that is used by web browsers and is thus used by any client that uses files located on
these servers.
Post Office Protocol (POP) version 3 110 POP version 3 is one of the two main protocols used to retrieve mail from a server. POP was
designed to be very simple by allowing a client to retrieve the complete contents of a server
Common
Network Time Protocol (NTP)
161/162
NTP is used to synchronize the devices on the Internet and internal networks for keeping an
devices.
Lightweight Directory Access Protocol (LDAP) 389 LDAP provides a mechanism of accessing and maintaining distributed directory information.
Hypertext Transfer Protocol over SSL/TLS (HTTPS) 443 HTTPS is used in conjunction with HTTP to provide the same services but doing it using a
PREVENTIVE CONTROLS
DETECTIVE CONTROLS
Enterprise log Management File Integrity monitoring Database Activity Endpoint Detection and
System and monitoring (FIM) solution Monitoring Response Solution
process
Network Controls
CORRECTIVE CONTROLS