Chapter 7. Infrastructure is the basic physical structures (devices) in an organization required...
-
Upload
kelly-hodges -
Category
Documents
-
view
214 -
download
1
Transcript of Chapter 7. Infrastructure is the basic physical structures (devices) in an organization required...
![Page 1: Chapter 7. Infrastructure is the basic physical structures (devices) in an organization required for the correct operation. The proper use of right.](https://reader036.fdocuments.in/reader036/viewer/2022062714/56649d0a5503460f949dd2aa/html5/thumbnails/1.jpg)
Infrastructure SecurityChapter 7
![Page 2: Chapter 7. Infrastructure is the basic physical structures (devices) in an organization required for the correct operation. The proper use of right.](https://reader036.fdocuments.in/reader036/viewer/2022062714/56649d0a5503460f949dd2aa/html5/thumbnails/2.jpg)
Infrastructure is the basic physical structures (devices) in an organization required for the correct operation.
The proper use of right components may improve the performance and the security.
Infrastructure
2Prepared by Saher Hasan Mohammed
![Page 3: Chapter 7. Infrastructure is the basic physical structures (devices) in an organization required for the correct operation. The proper use of right.](https://reader036.fdocuments.in/reader036/viewer/2022062714/56649d0a5503460f949dd2aa/html5/thumbnails/3.jpg)
Prepared by Saher Hasan Mohammed 3
A complete network consist of many different types devices.
Every device in a network has a specific responsibility to perform.
Devices can be used to regulate the flow of data, expand the network and provide safe working environment.
Devices
![Page 4: Chapter 7. Infrastructure is the basic physical structures (devices) in an organization required for the correct operation. The proper use of right.](https://reader036.fdocuments.in/reader036/viewer/2022062714/56649d0a5503460f949dd2aa/html5/thumbnails/4.jpg)
Prepared by Saher Hasan Mohammed 4
Workstations are the most common, and integral part of any network.
Workstations are the machines that an end user uses to perform the daily work activities.
Workstations are also called a client terminals.
Workstations are prone to many security threats.
Examples of workstation OS are MS Windows 95/ 2000/ XP/ Vista/ 7
Workstations
![Page 5: Chapter 7. Infrastructure is the basic physical structures (devices) in an organization required for the correct operation. The proper use of right.](https://reader036.fdocuments.in/reader036/viewer/2022062714/56649d0a5503460f949dd2aa/html5/thumbnails/5.jpg)
Prepared by Saher Hasan Mohammed 5
Out-of-date OS: Install the latest OS/ Security patch.
No firewall between the workstation and the internet: Install a firewall.
No antivirus programs installed: Install an antivirus program, and update it periodically
Workstations – Threats
![Page 6: Chapter 7. Infrastructure is the basic physical structures (devices) in an organization required for the correct operation. The proper use of right.](https://reader036.fdocuments.in/reader036/viewer/2022062714/56649d0a5503460f949dd2aa/html5/thumbnails/6.jpg)
Prepared by Saher Hasan Mohammed 6
Unnecessary software application installed. Uninstall all the unnecessary software programs.
Unnecessary hardware installed. Uninstall all the unnecessary hardware devices
Unnecessary user accounts created. Remove all the user accounts, and protect the administrator account with a strong password.
Workstations – Threats
![Page 7: Chapter 7. Infrastructure is the basic physical structures (devices) in an organization required for the correct operation. The proper use of right.](https://reader036.fdocuments.in/reader036/viewer/2022062714/56649d0a5503460f949dd2aa/html5/thumbnails/7.jpg)
Prepared by Saher Hasan Mohammed 7
Workstations are the primary mode of entry for a virus into a network.
In a network, if one workstation is infected by a virus, then other workstations can also be infected.
A virus can propagate from one computer to another when an infected file is transferred from one computer to another via an email or an optical disk.
Workstation – Antivirus
![Page 8: Chapter 7. Infrastructure is the basic physical structures (devices) in an organization required for the correct operation. The proper use of right.](https://reader036.fdocuments.in/reader036/viewer/2022062714/56649d0a5503460f949dd2aa/html5/thumbnails/8.jpg)
Prepared by Saher Hasan Mohammed 8
Workstations should have up-to-date antivirus program installed.
Antivirus programs should be updated periodically.
If a workstation is infected, disconnect it from the network, remove all the file, format the workstation, install a fresh copy of up-to-date OS and antivirus program and then connect the workstation to the network.
Workstation – Antivirus
![Page 9: Chapter 7. Infrastructure is the basic physical structures (devices) in an organization required for the correct operation. The proper use of right.](https://reader036.fdocuments.in/reader036/viewer/2022062714/56649d0a5503460f949dd2aa/html5/thumbnails/9.jpg)
Prepared by Saher Hasan Mohammed 9
Workstation
![Page 10: Chapter 7. Infrastructure is the basic physical structures (devices) in an organization required for the correct operation. The proper use of right.](https://reader036.fdocuments.in/reader036/viewer/2022062714/56649d0a5503460f949dd2aa/html5/thumbnails/10.jpg)
Prepared by Saher Hasan Mohammed 10
The servers are the computers in a network that host applications and data for everyone to share.
Serves can host applications like email, database, print, websites.
Servers use a more robust and sophisticated OS.
While setting up a server, only the specific applications needed to perform an activity should be installed.
Examples of Sever OS are MS Windows 2003/ 2008 Server.
Server
![Page 11: Chapter 7. Infrastructure is the basic physical structures (devices) in an organization required for the correct operation. The proper use of right.](https://reader036.fdocuments.in/reader036/viewer/2022062714/56649d0a5503460f949dd2aa/html5/thumbnails/11.jpg)
Prepared by Saher Hasan Mohammed 11
The need for antivirus on a server depends on the use of the server.
If the server is used as a DNS server or remote access server, then antivirus is not mandatory.
If the server is used as email server or a file server, then an antivirus plays a very important role, and it must be installed and updated periodically.
Server – Antivurus
![Page 12: Chapter 7. Infrastructure is the basic physical structures (devices) in an organization required for the correct operation. The proper use of right.](https://reader036.fdocuments.in/reader036/viewer/2022062714/56649d0a5503460f949dd2aa/html5/thumbnails/12.jpg)
Prepared by Saher Hasan Mohammed 12
To connect any workstation, server, MFP, or any network device, NIC is used.
NIC can be a single port NIC or multiport NIC.
The purpose of NIC is to provide lower-level functionality from the OSI model.
Network Interface Card (NIC)
![Page 13: Chapter 7. Infrastructure is the basic physical structures (devices) in an organization required for the correct operation. The proper use of right.](https://reader036.fdocuments.in/reader036/viewer/2022062714/56649d0a5503460f949dd2aa/html5/thumbnails/13.jpg)
Prepared by Saher Hasan Mohammed 13
A repeater is a simple hardware device that receives a weak signal and regenerates it.
Since the repeater creates a new signal, the distortion or attenuation is removed and the signal is made stronger.
Repeaters are used at Layer 1( Physical) of the OSI Model.
Repeaters are generally used to extend the coverage of a network by extending the length of the segment.
Repeater
![Page 14: Chapter 7. Infrastructure is the basic physical structures (devices) in an organization required for the correct operation. The proper use of right.](https://reader036.fdocuments.in/reader036/viewer/2022062714/56649d0a5503460f949dd2aa/html5/thumbnails/14.jpg)
Prepared by Saher Hasan Mohammed 14
Repeater
![Page 15: Chapter 7. Infrastructure is the basic physical structures (devices) in an organization required for the correct operation. The proper use of right.](https://reader036.fdocuments.in/reader036/viewer/2022062714/56649d0a5503460f949dd2aa/html5/thumbnails/15.jpg)
Prepared by Saher Hasan Mohammed 15
A hub is a hardware device that physically connects multiple cables, providing a common connection point.
Hubs are passive devices. They will forward a message to all the nodes connected via the ports.
Hubs will divide the bandwidth among all the nodes.
Hubs have a single collision domain, thus collisions are more.
Hubs are used at Layer 1( Physical) of the OSI Model.
Hub
![Page 16: Chapter 7. Infrastructure is the basic physical structures (devices) in an organization required for the correct operation. The proper use of right.](https://reader036.fdocuments.in/reader036/viewer/2022062714/56649d0a5503460f949dd2aa/html5/thumbnails/16.jpg)
Prepared by Saher Hasan Mohammed 16
Hub
![Page 17: Chapter 7. Infrastructure is the basic physical structures (devices) in an organization required for the correct operation. The proper use of right.](https://reader036.fdocuments.in/reader036/viewer/2022062714/56649d0a5503460f949dd2aa/html5/thumbnails/17.jpg)
Prepared by Saher Hasan Mohammed 17
A switch is a special type of hub.
A switch is an active device.
Switch operates at the second layer (DLL) of OSI model.
A switch will forward the packets only the correct destination.
A switch will not divide the bandwidth, thus the transmission speed is higher.
Switches have 2 collision domains, thus reducing the amount of collisions
Switch
![Page 18: Chapter 7. Infrastructure is the basic physical structures (devices) in an organization required for the correct operation. The proper use of right.](https://reader036.fdocuments.in/reader036/viewer/2022062714/56649d0a5503460f949dd2aa/html5/thumbnails/18.jpg)
Prepared by Saher Hasan Mohammed 18
Switch
![Page 19: Chapter 7. Infrastructure is the basic physical structures (devices) in an organization required for the correct operation. The proper use of right.](https://reader036.fdocuments.in/reader036/viewer/2022062714/56649d0a5503460f949dd2aa/html5/thumbnails/19.jpg)
Prepared by Saher Hasan Mohammed 19
A bridge is software or a hardware device that connects two LAN’s or two segments of the same LAN.
Bridge is a layer 2 (DLL) device.
Two LAN’s or the two segments of the same LAN must use the same data link protocol.◦ Example (Ethernet, Token, Ring)
Bridges
![Page 20: Chapter 7. Infrastructure is the basic physical structures (devices) in an organization required for the correct operation. The proper use of right.](https://reader036.fdocuments.in/reader036/viewer/2022062714/56649d0a5503460f949dd2aa/html5/thumbnails/20.jpg)
Prepared by Saher Hasan Mohammed 20
Transparent Bridge: Connects two LAN’s that use the same data link protocol.◦ Ethernet network– Ethernet network.◦ Token ring network – Token ring network.
Translating Bridge: Connects two LAN’s that use different data link protocol.◦ Ethernet network– Token ring network.◦ Token ring network – Ethernet network.
Bridges Types
![Page 21: Chapter 7. Infrastructure is the basic physical structures (devices) in an organization required for the correct operation. The proper use of right.](https://reader036.fdocuments.in/reader036/viewer/2022062714/56649d0a5503460f949dd2aa/html5/thumbnails/21.jpg)
Prepared by Saher Hasan Mohammed 21
Bridges
![Page 22: Chapter 7. Infrastructure is the basic physical structures (devices) in an organization required for the correct operation. The proper use of right.](https://reader036.fdocuments.in/reader036/viewer/2022062714/56649d0a5503460f949dd2aa/html5/thumbnails/22.jpg)
Prepared by Saher Hasan Mohammed 22
Routers are hardware devices used to forward the data packets between different networks.
Routers intelligent devices, they have routing protocols and store the path information in the routing tables.
Routers operate at the third layer (Network) of OSI model.
Since the routers are geographically separated, they can be accessed remotely via SNMP. This poses a security threat.
Router
![Page 23: Chapter 7. Infrastructure is the basic physical structures (devices) in an organization required for the correct operation. The proper use of right.](https://reader036.fdocuments.in/reader036/viewer/2022062714/56649d0a5503460f949dd2aa/html5/thumbnails/23.jpg)
Prepared by Saher Hasan Mohammed 23
Routers can be static or dynamic.◦ Static – the routing table cannot be changes.◦ Dynamic – the routing table can change depending on the situation to
find the next best route.
Routers
![Page 24: Chapter 7. Infrastructure is the basic physical structures (devices) in an organization required for the correct operation. The proper use of right.](https://reader036.fdocuments.in/reader036/viewer/2022062714/56649d0a5503460f949dd2aa/html5/thumbnails/24.jpg)
Prepared by Saher Hasan Mohammed 24
Router
![Page 25: Chapter 7. Infrastructure is the basic physical structures (devices) in an organization required for the correct operation. The proper use of right.](https://reader036.fdocuments.in/reader036/viewer/2022062714/56649d0a5503460f949dd2aa/html5/thumbnails/25.jpg)
Prepared by Saher Hasan Mohammed 25
A gateway is a node on a network that serves as an entrance to another network.
Gateway is a device that uses software to connect networks with different architecture by performing protocol conversion at the application level.
Gateway operates at all the 7 layers of the OSI Model.
Gateways
![Page 26: Chapter 7. Infrastructure is the basic physical structures (devices) in an organization required for the correct operation. The proper use of right.](https://reader036.fdocuments.in/reader036/viewer/2022062714/56649d0a5503460f949dd2aa/html5/thumbnails/26.jpg)
Prepared by Saher Hasan Mohammed 26
Gateways
![Page 27: Chapter 7. Infrastructure is the basic physical structures (devices) in an organization required for the correct operation. The proper use of right.](https://reader036.fdocuments.in/reader036/viewer/2022062714/56649d0a5503460f949dd2aa/html5/thumbnails/27.jpg)
Prepared by Saher Hasan Mohammed 27
A firewall is a network device-hardware, software, or a combination.
The main purpose of a firewall is to enforce a security policy across its connections.
Security policies are a series of rules that define what traffic is permissible and what traffic is to be blocked or denied.
The corporate connection to the internet must go through a firewall, this blocking all the unwanted access to the internet.
Firewalls
![Page 28: Chapter 7. Infrastructure is the basic physical structures (devices) in an organization required for the correct operation. The proper use of right.](https://reader036.fdocuments.in/reader036/viewer/2022062714/56649d0a5503460f949dd2aa/html5/thumbnails/28.jpg)
Prepared by Saher Hasan Mohammed 28
Firewalls can enforce the security policies through the following mechanisms:◦ Network Address Translation ◦ Basis Packet Filtering◦ Access Control Lists
Firewall
![Page 29: Chapter 7. Infrastructure is the basic physical structures (devices) in an organization required for the correct operation. The proper use of right.](https://reader036.fdocuments.in/reader036/viewer/2022062714/56649d0a5503460f949dd2aa/html5/thumbnails/29.jpg)
Prepared by Saher Hasan Mohammed 29
Firewall
![Page 30: Chapter 7. Infrastructure is the basic physical structures (devices) in an organization required for the correct operation. The proper use of right.](https://reader036.fdocuments.in/reader036/viewer/2022062714/56649d0a5503460f949dd2aa/html5/thumbnails/30.jpg)
Prepared by Saher Hasan Mohammed 30
Wireless devices being additional security concerns.
Since wireless devices do not have any physical medium, and used radio waves and infrared to carry out the data transmission, it is very difficult to control who can view the data.
Unsecured and unprotected wireless routers can pose a severe security threat to the corporate network.
Wireless
![Page 31: Chapter 7. Infrastructure is the basic physical structures (devices) in an organization required for the correct operation. The proper use of right.](https://reader036.fdocuments.in/reader036/viewer/2022062714/56649d0a5503460f949dd2aa/html5/thumbnails/31.jpg)
Prepared by Saher Hasan Mohammed 31
Wireless
![Page 32: Chapter 7. Infrastructure is the basic physical structures (devices) in an organization required for the correct operation. The proper use of right.](https://reader036.fdocuments.in/reader036/viewer/2022062714/56649d0a5503460f949dd2aa/html5/thumbnails/32.jpg)
Prepared by Saher Hasan Mohammed 32
Modem is a short name for modulator/ demodulator.
It converts analog signals to digital signals and vice versa.
A digital subscriber line (DSL) modem provides a direct digital connection between a subscribers computer and an Internet connection at the local telephone company’s switching station.
This private connection offers some degree of security and privacy.
Modems
![Page 33: Chapter 7. Infrastructure is the basic physical structures (devices) in an organization required for the correct operation. The proper use of right.](https://reader036.fdocuments.in/reader036/viewer/2022062714/56649d0a5503460f949dd2aa/html5/thumbnails/33.jpg)
Prepared by Saher Hasan Mohammed 33
Cable modems are set up in a shared arrangement, this allows the neighbor to sniff the network traffic.
Cable modems were designed to share the party line in the terminal signal area.
Cable modems use Data Over Cable Service Interface Specification (DOCSIS) standard to facilitate the communication.
Cable and DSL services were designed for continuous connection.
Modems
![Page 34: Chapter 7. Infrastructure is the basic physical structures (devices) in an organization required for the correct operation. The proper use of right.](https://reader036.fdocuments.in/reader036/viewer/2022062714/56649d0a5503460f949dd2aa/html5/thumbnails/34.jpg)
Prepared by Saher Hasan Mohammed 34
Modem
![Page 35: Chapter 7. Infrastructure is the basic physical structures (devices) in an organization required for the correct operation. The proper use of right.](https://reader036.fdocuments.in/reader036/viewer/2022062714/56649d0a5503460f949dd2aa/html5/thumbnails/35.jpg)
Prepared by Saher Hasan Mohammed 35
The modem connection provides a direct network connection between the modem equipment and the client computer. There is no inherent security mechanism in this setup.
The best security measure in the Cable/ DSL setup is the use of a firewall.
Cable/ DSL Security
![Page 36: Chapter 7. Infrastructure is the basic physical structures (devices) in an organization required for the correct operation. The proper use of right.](https://reader036.fdocuments.in/reader036/viewer/2022062714/56649d0a5503460f949dd2aa/html5/thumbnails/36.jpg)
Prepared by Saher Hasan Mohammed 36
Private branch exchanges are an extension of the public telephone network into a business.
PBX serves a particular business or an office.
PBX’s are computer based switching equipment designed to connect telephones into the local phone system.
PBX’s can be hacked via a phone hacker, also called as phreakers.
Telephone firewalls must be used to regulate the telecommunication.
Telecom/ PBX
![Page 37: Chapter 7. Infrastructure is the basic physical structures (devices) in an organization required for the correct operation. The proper use of right.](https://reader036.fdocuments.in/reader036/viewer/2022062714/56649d0a5503460f949dd2aa/html5/thumbnails/37.jpg)
Prepared by Saher Hasan Mohammed 37
Telecom/ PBX
![Page 38: Chapter 7. Infrastructure is the basic physical structures (devices) in an organization required for the correct operation. The proper use of right.](https://reader036.fdocuments.in/reader036/viewer/2022062714/56649d0a5503460f949dd2aa/html5/thumbnails/38.jpg)
Prepared by Saher Hasan Mohammed 38
IDS are systems designed to detect, log, and respond to unauthorized network or host use, both in real time and after the fact.
IDS are of two types, network-based systems and host based systems.
IDS have two primary methods of detection, signature-base and anomaly-base.
Intrusion Detection System (IDS)
![Page 39: Chapter 7. Infrastructure is the basic physical structures (devices) in an organization required for the correct operation. The proper use of right.](https://reader036.fdocuments.in/reader036/viewer/2022062714/56649d0a5503460f949dd2aa/html5/thumbnails/39.jpg)
Prepared by Saher Hasan Mohammed 39
Network-based IDS solutions are connected to a segment of network where they examine all of the passing packets.
Using signature of known attacks, a network IDS can observe misuse of the network.
Network IDS should be placed at critical parts of the corporate network. Ideally, at the port of entry into the network.
Intrusion Detection System (IDS)
![Page 40: Chapter 7. Infrastructure is the basic physical structures (devices) in an organization required for the correct operation. The proper use of right.](https://reader036.fdocuments.in/reader036/viewer/2022062714/56649d0a5503460f949dd2aa/html5/thumbnails/40.jpg)
Prepared by Saher Hasan Mohammed 40
Intrusion Detection System (IDS)
Segment 1
Segment 2
Switch A
Switch B
Router
FIREWALL
Internet
IDS
![Page 41: Chapter 7. Infrastructure is the basic physical structures (devices) in an organization required for the correct operation. The proper use of right.](https://reader036.fdocuments.in/reader036/viewer/2022062714/56649d0a5503460f949dd2aa/html5/thumbnails/41.jpg)
Prepared by Saher Hasan Mohammed 41
A host based IDS works by collecting the information from all of the servers on the network.
The IDS collects all this information and analyze it to detect any pattern of unauthorized usage.
Host based IDS works well for small networks, but for large networks, its becomes an issue to collect and analyze all the information.
Intrusion Detection System (IDS)
![Page 42: Chapter 7. Infrastructure is the basic physical structures (devices) in an organization required for the correct operation. The proper use of right.](https://reader036.fdocuments.in/reader036/viewer/2022062714/56649d0a5503460f949dd2aa/html5/thumbnails/42.jpg)
Prepared by Saher Hasan Mohammed 42
The anomaly method works by analysis statistical patterns of usage of a network.
A network pattern is prepared under normal operating conditions. If there is any significant deviation from this normal pattern, an alert is generated.
This method is good for detecting a large scale deviation.
For a smaller deviation, anomaly method can raise a false alarm.
Intrusion Detection System (IDS)
![Page 43: Chapter 7. Infrastructure is the basic physical structures (devices) in an organization required for the correct operation. The proper use of right.](https://reader036.fdocuments.in/reader036/viewer/2022062714/56649d0a5503460f949dd2aa/html5/thumbnails/43.jpg)
Prepared by Saher Hasan Mohammed 43
Mobile devices like PDS’s, smart phones and tablets can add security threats to a corporate network.
When synchronizing the mobile device with the office computer, there are chances of introducing a virus/ bug into the network.
Mobile Devices
![Page 44: Chapter 7. Infrastructure is the basic physical structures (devices) in an organization required for the correct operation. The proper use of right.](https://reader036.fdocuments.in/reader036/viewer/2022062714/56649d0a5503460f949dd2aa/html5/thumbnails/44.jpg)
Prepared by Saher Hasan Mohammed 44
Any network device can be hacked and misused if it is not properly configured and physically secured.
The best way to secure a network device is by correctly configuring it, setting the correct access controls and using strong passwords.
Security Concerns for the Devices
![Page 45: Chapter 7. Infrastructure is the basic physical structures (devices) in an organization required for the correct operation. The proper use of right.](https://reader036.fdocuments.in/reader036/viewer/2022062714/56649d0a5503460f949dd2aa/html5/thumbnails/45.jpg)
Prepared by Saher Hasan Mohammed 45
Media is the base for communication between devices.
Media operates at the layer 1 (physical layer) of the OSI model.
Common types of media used are,◦ Coaxial cable◦ Twisted-pair cable◦ Fiber-optics◦Wireless
Media
![Page 46: Chapter 7. Infrastructure is the basic physical structures (devices) in an organization required for the correct operation. The proper use of right.](https://reader036.fdocuments.in/reader036/viewer/2022062714/56649d0a5503460f949dd2aa/html5/thumbnails/46.jpg)
Prepared by Saher Hasan Mohammed 46
Coaxial cables are very common in connecting TV’s to cable services or satellite.
It is used in these areas because of its high bandwidth and shielding capabilities.
Coax cables are less prone to the external interferences, but very costly to run.
Coaxial Cable (coax)
![Page 47: Chapter 7. Infrastructure is the basic physical structures (devices) in an organization required for the correct operation. The proper use of right.](https://reader036.fdocuments.in/reader036/viewer/2022062714/56649d0a5503460f949dd2aa/html5/thumbnails/47.jpg)
Prepared by Saher Hasan Mohammed 47
Coaxial Cable (coax)
![Page 48: Chapter 7. Infrastructure is the basic physical structures (devices) in an organization required for the correct operation. The proper use of right.](https://reader036.fdocuments.in/reader036/viewer/2022062714/56649d0a5503460f949dd2aa/html5/thumbnails/48.jpg)
Prepared by Saher Hasan Mohammed 48
Twisted-pair cables have replaced the coax cables in the Ethernet networks.
Twisted-pair cables use the same technology used by the phone company for the movement of electrical signals.
Twisted-pair cables come if two forms,◦ Unshielded Twisted-pair cables◦ Shielded Twisted-pair cables
Twisted-pair Cable
![Page 49: Chapter 7. Infrastructure is the basic physical structures (devices) in an organization required for the correct operation. The proper use of right.](https://reader036.fdocuments.in/reader036/viewer/2022062714/56649d0a5503460f949dd2aa/html5/thumbnails/49.jpg)
Prepared by Saher Hasan Mohammed 49
Shielded twisted-pair Cable (STP) has a foil shield around the pairs to provide extra shielding from electromagnetic interference.
Unshielded twisted-pair Cable (UTP) has no such foil around it. It uses the actual twists to eliminate interference.
STP provides better communication, but it is expensive compared to UTP.
Twisted-pair Cable
![Page 50: Chapter 7. Infrastructure is the basic physical structures (devices) in an organization required for the correct operation. The proper use of right.](https://reader036.fdocuments.in/reader036/viewer/2022062714/56649d0a5503460f949dd2aa/html5/thumbnails/50.jpg)
Prepared by Saher Hasan Mohammed 50
The standard method of connecting twisted-pair cables is via a 8-pin connector called RJ-45 connector.
Twisted-pair cables are divided into three categories depending upon their transmission speed.
Twisted-pair Cable
Designation Category Description
10BaseT Category 3 10 Mbps baseband Ethernet over twisted pair cable with a maximum length of 100 meters.
100BaseT Category 5 100 Mbps baseband Ethernet over twisted pair cable.
1000BaseT Category 6 1000 Mbps baseband Ethernet over four pairs of category 5 unshielded twisted pair cables.
![Page 51: Chapter 7. Infrastructure is the basic physical structures (devices) in an organization required for the correct operation. The proper use of right.](https://reader036.fdocuments.in/reader036/viewer/2022062714/56649d0a5503460f949dd2aa/html5/thumbnails/51.jpg)
Prepared by Saher Hasan Mohammed 51
Twisted-pair Cable
![Page 52: Chapter 7. Infrastructure is the basic physical structures (devices) in an organization required for the correct operation. The proper use of right.](https://reader036.fdocuments.in/reader036/viewer/2022062714/56649d0a5503460f949dd2aa/html5/thumbnails/52.jpg)
Prepared by Saher Hasan Mohammed 52
Fiber optic cable uses a beam of laser light to connect devices over a thin glass wire.
The biggest advantage of fiber optic cables is the higher bandwidth. These cables are used as a backbone to all the large networks and internet.
The biggest disadvantage of fiber optic cables is the cost.
Fiber Optic Cables
![Page 53: Chapter 7. Infrastructure is the basic physical structures (devices) in an organization required for the correct operation. The proper use of right.](https://reader036.fdocuments.in/reader036/viewer/2022062714/56649d0a5503460f949dd2aa/html5/thumbnails/53.jpg)
Prepared by Saher Hasan Mohammed 53
Making connection to a fiber optic cable is very difficult/ impossible.
It is very difficult to splice a fiber optic. Making the precise connections on the end of fiber optic line is a highly skilled job and is done by a specifically trained professionals.
Once the connector is fitted on the end, several forms of connectors and blocks are used to make new connections.
Fiber Optic Cables
![Page 54: Chapter 7. Infrastructure is the basic physical structures (devices) in an organization required for the correct operation. The proper use of right.](https://reader036.fdocuments.in/reader036/viewer/2022062714/56649d0a5503460f949dd2aa/html5/thumbnails/54.jpg)
Prepared by Saher Hasan Mohammed 54
Fiber Optic Cable
![Page 55: Chapter 7. Infrastructure is the basic physical structures (devices) in an organization required for the correct operation. The proper use of right.](https://reader036.fdocuments.in/reader036/viewer/2022062714/56649d0a5503460f949dd2aa/html5/thumbnails/55.jpg)
Prepared by Saher Hasan Mohammed 55
Fiber Optic Cable
![Page 56: Chapter 7. Infrastructure is the basic physical structures (devices) in an organization required for the correct operation. The proper use of right.](https://reader036.fdocuments.in/reader036/viewer/2022062714/56649d0a5503460f949dd2aa/html5/thumbnails/56.jpg)
Prepared by Saher Hasan Mohammed 56
Unguided media is a phrase used to cover all transmission media not guided by wire or fiber.
Unguided media includes radio frequency (RF), infrared (IR) and microwave methods.
Unguided media have one attribute in common, that they are unguided and can travel to many machines simultaneously.
Unguided Media
![Page 57: Chapter 7. Infrastructure is the basic physical structures (devices) in an organization required for the correct operation. The proper use of right.](https://reader036.fdocuments.in/reader036/viewer/2022062714/56649d0a5503460f949dd2aa/html5/thumbnails/57.jpg)
Prepared by Saher Hasan Mohammed 57
Radio Frequency (RF) is the most common and widely used method of wireless communication.
RF waves uses variety of frequency bands, each with special characteristics.
Microwave is used to describe a specific portion of the RF spectrum that is used for communication as well as other tasks such as cooking.
RF/Microwave
![Page 58: Chapter 7. Infrastructure is the basic physical structures (devices) in an organization required for the correct operation. The proper use of right.](https://reader036.fdocuments.in/reader036/viewer/2022062714/56649d0a5503460f949dd2aa/html5/thumbnails/58.jpg)
Prepared by Saher Hasan Mohammed 58
Advantages of Microwaves ◦Microwaves can penetrate through thick walls◦Microwaves can propagate through rough terrain◦Microwaves have broadcast capability ◦Microwaves provide cost-effective solutions
RF/Microwave
![Page 59: Chapter 7. Infrastructure is the basic physical structures (devices) in an organization required for the correct operation. The proper use of right.](https://reader036.fdocuments.in/reader036/viewer/2022062714/56649d0a5503460f949dd2aa/html5/thumbnails/59.jpg)
Prepared by Saher Hasan Mohammed 59
IR is a band of electromagnetic energy just beyond the red end of the visible spectrum.
IR is commonly used in remote control devices, wireless devices like printers, keyboards, mice and PDA’s.
Drawbacks of IR◦ Slow◦ Cannot penetrate thick walls
Infrared (IR)
![Page 60: Chapter 7. Infrastructure is the basic physical structures (devices) in an organization required for the correct operation. The proper use of right.](https://reader036.fdocuments.in/reader036/viewer/2022062714/56649d0a5503460f949dd2aa/html5/thumbnails/60.jpg)
Prepared by Saher Hasan Mohammed 60
Obtaining physical, unauthorized access to the media can have severe consequences.
The ability to observe the network traffic; username, password and data is called as sniffing.
War driving involves using a laptop and software to find wireless networks from outside the premises. It is mainly used to locate a wireless network with poor or no security and obtaining free internet access.
Security Concerns for Transmission Media
![Page 61: Chapter 7. Infrastructure is the basic physical structures (devices) in an organization required for the correct operation. The proper use of right.](https://reader036.fdocuments.in/reader036/viewer/2022062714/56649d0a5503460f949dd2aa/html5/thumbnails/61.jpg)
Prepared by Saher Hasan Mohammed 61
Advancement of technology has reduced the size of storage devices, cost and increased the storage capacity.
Examples of removable media are◦ Hard drives (portable external HD)◦ Diskettes (floppy drives)◦ Tapes (magnetic tapes)◦ Optical media (CD and DVD)◦ Electronic media (SD cards)
Removable Media
![Page 62: Chapter 7. Infrastructure is the basic physical structures (devices) in an organization required for the correct operation. The proper use of right.](https://reader036.fdocuments.in/reader036/viewer/2022062714/56649d0a5503460f949dd2aa/html5/thumbnails/62.jpg)
Prepared by Saher Hasan Mohammed 62
Since the removable media is portable and small in size, it can easily be stolen. This results in the loss of critical information.
Common way to prevent this loss ◦ Store all the important information on a server, not on a portable
media◦ If portable media is not necessary then remove it from the computer
Security Concerns for Removable Media
![Page 63: Chapter 7. Infrastructure is the basic physical structures (devices) in an organization required for the correct operation. The proper use of right.](https://reader036.fdocuments.in/reader036/viewer/2022062714/56649d0a5503460f949dd2aa/html5/thumbnails/63.jpg)
Prepared by Saher Hasan Mohammed 63
Security Topology - DMZ
Un-trusted Zone – Internet
Outer Firewall
Semi-trusted Zone - DMZ
Inner Firewall
Trusted Zone – Internal Network
Server
Server
![Page 64: Chapter 7. Infrastructure is the basic physical structures (devices) in an organization required for the correct operation. The proper use of right.](https://reader036.fdocuments.in/reader036/viewer/2022062714/56649d0a5503460f949dd2aa/html5/thumbnails/64.jpg)
Prepared by Saher Hasan Mohammed 64
The DMZ acts like a buffer zone between the Internet (un-trusted zone) and internal network (trusted zone).
A firewall is used to clearly demarcate the zones and enforce the separation of zones.
Special attention must be given to all the devices within the DMZ as they can be accessed by unauthorized users. Special security measures are used for all the devices within the DMZ.
Any server directly accessed from un-trusted zone must be present in a DMZ.
Security Topology - DMZ
![Page 65: Chapter 7. Infrastructure is the basic physical structures (devices) in an organization required for the correct operation. The proper use of right.](https://reader036.fdocuments.in/reader036/viewer/2022062714/56649d0a5503460f949dd2aa/html5/thumbnails/65.jpg)
Prepared by Saher Hasan Mohammed 65
Tunneling is a method of packaging packets so that they can travel a network in a secure and confidential manner.
Each network uses a IPSec router, these routes establish a secure and confidential path by using VPN.
These encrypted packets are not visible to outside routers, thus creating a tunnel across the Internet and establish a private connection, secure from outside use.
Security Topology – Tunneling
![Page 66: Chapter 7. Infrastructure is the basic physical structures (devices) in an organization required for the correct operation. The proper use of right.](https://reader036.fdocuments.in/reader036/viewer/2022062714/56649d0a5503460f949dd2aa/html5/thumbnails/66.jpg)
Prepared by Saher Hasan Mohammed 66
Security Topology – Tunneling
Public Internet
IPSec Routers
Tunnel
Jeddah OfficeRiyadh Office
IPSec Routers