SECURITY IN COMPUTING FIETH EDITION Chapter 6: Networks 授课教师:高海波 可南中医药大学 信息管理与信息系统教研室 From Security in Computing, Fifth Edition, by Charles P Pfleeger, et aL. (ISBN: 9780134085043) Copyright 2015 by Pearson Education, Inc. All rights reserved
SECURITY IN COMPUTING, FIFTH EDITION Chapter 6: Networks From Security in Computing, Fifth Edition, by Charles P. Pfleeger, et al. (ISBN: 9780134085043). Copyright 2015 by Pearson Education, Inc. All rights reserved. 1 授课教师:高海波 河南中医药大学 信息管理与信息系统教研室
2 Objectives for Chapter 6 Networking basics Network threats and vulnerabilities WiFi security Denial-of-service attacks Network encryption concepts and tools Types of firewalls and what they do Intrusion detection and prevention systems Security information and event management tools From Security in Computing, Fifth Edition, by Charles P Pfleeger, et aL. (ISBN: 9780134085043) Copyright 2015 by Pearson Education, Inc. All rights reserved
Objectives for Chapter 6 • Networking basics • Network threats and vulnerabilities • WiFi security • Denial-of-service attacks • Network encryption concepts and tools • Types of firewalls and what they do • Intrusion detection and prevention systems • Security information and event management tools 2 From Security in Computing, Fifth Edition, by Charles P. Pfleeger, et al. (ISBN: 9780134085043). Copyright 2015 by Pearson Education, Inc. All rights reserved
3 Network Transmission media Cable Optical fiber Microwave iFI Satellite communication From Security in Computing, Fifth Edition, by Charles P Pfleeger, et aL. (ISBN: 9780134085043) Copyright 2015 by Pearson Education, Inc. All rights reserved
Network Transmission Media • Cable •Optical fiber • Microwave •WiFi •Satellite communication 3 From Security in Computing, Fifth Edition, by Charles P. Pfleeger, et al. (ISBN: 9780134085043). Copyright 2015 by Pearson Education, Inc. All rights reserved
Communication Media Vulnerability Sender Wiretap LAN Imposter WAN Rogue receiver sniffer, wiretap Satellite, microwave interception LAN wired interception Receiver From Security in Computing, Fifth Edition, by Charles P Pfleeger, et aL. (ISBN: 9780134085043) Copyright 2015 by Pearson Education, Inc. All rights reserved
Communication Media Vulnerability 4 From Security in Computing, Fifth Edition, by Charles P. Pfleeger, et al. (ISBN: 9780134085043). Copyright 2015 by Pearson Education, Inc. All rights reserved
5 Communication Media Pros/ cons Medium Strengths Weaknesses Widely used Susceptible to emanation Inexpensive to buy install Susceptible to physical maintain wiretapping Optical fiber Immune to emanation Potentially exposed at Difficult to wiretap connection points Microwave Strong signal, not seriously. Exposed to interception affected by weather along path of transmission Requires line of sight location Signal must be repeated approximately every 30 miles(50 kilometers) Wireless (radio, WiFi) Widely available Signal degrades over Built into many computers distance suitable for short range Signal interceptable in circular pattern around transmitter Satellite Strong fast signal Delay due to distance signal travels up and down Signal exposed over wid area at receiving end From Security in Computing, Fifth Edition, by Charles P Pfleeger, et al.(ISBN: 9780134085043) Copyright 2015 by Pearson Education, Inc. All rights reserved
Communication Media Pros/Cons 5 From Security in Computing, Fifth Edition, by Charles P. Pfleeger, et al. (ISBN: 9780134085043). Copyright 2015 by Pearson Education, Inc. All rights reserved