You are on page 1of 20

Chapter 1

  

Introduction to Networks Understand the Characteristics of Network Learn about Network Topologies and Security Policies

Network Management


       Characteristics of Networks Components Topologies of Network Meshed Topologies Network Security Classes of Attacks Threats and Mitigation Network Management 3 .

Networks provide an easy access to information. Network Management 4 . and increase the productivity for users.  A network comprises of all the hardware and software components involved in connecting computers.

 In network design the following characteristics should be considered: ▪ ▪ ▪ ▪ ▪ ▪ ▪ Cost Security Speed Topology Scalability Reliability Availability 5 Network Management .

enabling users to perform various tasks. Protocols are used to implement applications.  Applications. Network Management 6 . make up the key components of networking.

 To build a network. you need three component categories: • Computers • Networking • Media Network Management 7 .

Local area networks or LANs are used to connect networking devices that are in a close geographic area.  Network Management 8 .  Wide area networks or WANs are used to connect the LANs together.

Network Management 9 . and • Dedicated connections. • Packet-switched. are used: • Circuit-switched. In a WAN service. or circuits. • Cell-switched. four basic types of connections.

 Network Management 10 .  A topology defines how the components are connected.Various types of topologies can be used for cabling up your network components.

  A physical topology is the description of how components are physically cabled together. A logical topology describes how components communicate across the physical topology. Network Management 11 .

every device is connected to every other device. every component is not connected to every other component.  Network Management 12 .Meshing describes how components are connected together.  In a fully meshed environment.  In a partially meshed environment.

60 to 80 percent of the security breaches or attacks of the surveyed companies occurred within the network.   The Computer Security Institute or CSI have produced many reports on security. Security solutions are derived from the security policy. Network Management 13 .

 The three things which provide an effective network security defense are: ▪ Adversaries ▪ Motivations ▪ Classes of attacks  The Five Classes of attacks are: ▪ ▪ ▪ ▪ ▪ Passive Active Distributed Insider Close-in 14 Network Management .

 The four categories of common threats to networks and their components are: ▪ ▪ ▪ ▪ Physical installations Reconnaissance attacks Access attacks Denial of service or DoS attacks Network Management 15 .

 Physical installations involve four types of threats: ▪ ▪ ▪ ▪ Hardware Electrical Environmental Maintenance Network Management 16 .

Network Management 17 . should be deployed. firewalls and IDS/IPS.  A reconnaissance attack occurs when an adversary tries to learn information about your network. To mitigate scanning and packet sniffing attacks.

 An access attack might occur when an adversary tries to gain unauthorized access to a component. Network Management 18 .

 DoS attacks involve an adversary to reduce the level of operation or service. Network Management 19 .

Thank You! .