Security System 1 - 12

download Security System 1 - 12

of 12

Transcript of Security System 1 - 12

  • 8/14/2019 Security System 1 - 12

    1/12

    #12. Infrastructure andConnectivity

  • 8/14/2019 Security System 1 - 12

    2/12

    AGENDA

    Understanding Infrastructure Security

  • 8/14/2019 Security System 1 - 12

    3/12

    Virtual Private Networks

    A virtual private network (VPN) is a private

    network connection that occurs through a public

    network. A private network provides security

    over an otherwise unsecure environment. VPNscan be used to connect LANs together across

    the Internet or other public networks. With a

    VPN, the remote end appears to be connected

    to the network as if it were connected locally. AVPN requires either special hardware to be

    installed or a VPN software package running on

    servers and workstations.

  • 8/14/2019 Security System 1 - 12

    4/12

    Virtual Private Networks

    VPNs typically use a tunneling protocol such as

    Layer 2 Tunneling Protocol (L2TP), IPSec, or

    Point-to-Point Tunneling Protocol (PPTP).

    Figure 3.9 shows a remote network beingconnected to a LAN using the Internet and a

    VPN. This connection appears to be a local

    connection, and all message traffic and

    protocols are available across the VPN.

  • 8/14/2019 Security System 1 - 12

    5/12

  • 8/14/2019 Security System 1 - 12

    6/12

    Virtual Private Networks

    As mentioned earlier, VPNs are used to make

    connections between private networks across a

    public network, such as the Internet. These

    connections arent guaranteed to be secureunless a tunneling protocol (such as PPTP) and

    an encryption system (such as IPSec) are used.

    A wide range of options, including proprietary

    technologies, is available for VPN support.

  • 8/14/2019 Security System 1 - 12

    7/12

    Virtual Private Networks

    Many of the large ISPs and data

    communications providers offer dedicated

    hardware with VPN capabilities. Many servers

    also provide software VPN capabilities for usebetween two networks.

    VPN systems can be dedicated to a certain

    protocol, or they can pass whatever protocols

    they see on one end of the network to the otherend. A pure VPN connection appears as a

    dedicated wired connection between the two

    network ends.

  • 8/14/2019 Security System 1 - 12

    8/12

    Wireless Access Points

    It does not take much to build a wireless

    network. On the client side, you need a wireless

    network card (NIC) in place of the standard

    wired NIC. On the network side, you needsomething to communicate with the clients.

  • 8/14/2019 Security System 1 - 12

    9/12

    Wireless Access Points

    The primary method of connecting a wireless

    device to a network is via a wireless portal. A

    wireless access point(WAP) is a low-power

    transmitter/receiver, also known as atransceiver, which is strategically placed for

    access. The portable device and the access

    point communicate using one of several

    communications protocols, including IEEE802.11 (also known as Wireless Ethernet).

  • 8/14/2019 Security System 1 - 12

    10/12

    Wireless Access Points

    Wireless communication methods are becoming

    more prevalent in computing because the cost

    of the transmitting and receiving equipment has

    fallen drastically over the last few years.Wireless also offers mobile connectivity within a

    campus, a building, or even a city. Most wireless

    frequencies are shared frequencies in that more

    than one person may be using the samefrequency for communication.

  • 8/14/2019 Security System 1 - 12

    11/12

    Wireless Access Points

    Wireless communication methods are becoming

    more prevalent in computing because the cost

    of the transmitting and receiving equipment has

    fallen drastically over the last few years.Wireless also offers mobile connectivity within a

    campus, a building, or even a city. Most wireless

    frequencies are shared frequencies in that more

    than one person may be using the samefrequency for communication.

  • 8/14/2019 Security System 1 - 12

    12/12

    Wireless Access Points

    Wireless communication methods are becoming

    more prevalent in computing because the cost

    of the transmitting and receiving equipment has

    fallen drastically over the last few years.Wireless also offers mobile connectivity within a

    campus, a building, or even a city. Most wireless

    frequencies are shared frequencies in that more

    than one person may be using the samefrequency for communication.