广西医科大学:《计算机网络 Computer Networking》课程教学资源(PPT课件讲稿)Chapter 17 NETWORK MANAGEMENT

CHAPTER 17 NETWORK MANAGEMENT PART THREE INTRODUCTION CHAPTER 17 Examines the vital topic of network security and explains many ways in which networks can be made more secure CHAPTER 18 You will cover encryption digital signatures, and digital certificates in detail, and you will understand the importance of user IDs and strong passwords CHAPTER 19 You will investigate the threat of viruses and other network perils as well as steps that can be taken to minimize their Impact www.gxmu.edu.cn
PART THREE INTRODUCTION www.gxmu.edu.cn CHAPTER 17 Examines the vital topic of network security and explains many ways in which networks can be made more secure. CHAPTER 18 You will cover encryption, digital signatures, and digital certificates in detail, and you will understand the importance of user IDs and strong passwords. CHAPTER 19 You will investigate the threat of viruses and other network perils as well as steps that can be taken to minimize their impact. CHAPTER 17 NETWORK MANAGEMENT

CHAPTER 17 NETWORK MANAGEMENT Chapter 18 Explains network design and implementation process Learn that designing a new or changed network is a multiphase activity That requires user involvement along the way Study the various steds in the process, sted that are described and illustrated www.gxmu.edu.cn
www.gxmu.edu.cn Explains network design and implementation process. Learn that designing a new or changed network is a multiphase activity That requires user involvement along the way . Study the various steds in the process, sted that are described and illustrated. Chapter 18 CHAPTER 17 NETWORK MANAGEMENT

A CHAPTER 17 NETWORK MANAGEMENT Chapter 19 Describes network management and operations process Explore the reasons for managing a network and the standard management functions that are put into a network context Learn the practical issues of day-to-day operation of a network problem management, performance management configuration management, change management www.gxmu.edu.cn
Chapter 19 www.gxmu.edu.cn Describes network management and operations process. Explore the reasons for managing a network and the standard management functions that are put into a network context. Learn the practical issues of day-to-day operation of a network: problem management, performance management , configuration management, change management CHAPTER 17 NETWORK MANAGEMENT

9 CHAPTER 17 NETWORK MANAGEMENT Chapter 17 Network Security 17-IIntroduction 17-2 Why is needs 17-3 Management's responsibili 17-4 types of threat Security architecture Security attacks Security services www.gxmu.edu.cn
Chapter 17 Network Security 17-1 Introduction 17-2 Why is needs 17-3 Management's responsibility 17-4 types of threat • Security Architecture • Security attacks • Security services www.gxmu.edu.cn CHAPTER 17 NETWORK MANAGEMENT

CHAPTER 17 NETWORK MANAGEMENT 17-1 OBJECTIVES Explain why it is necessary Discuss management's responsibility Describe key elements of a network security policy; ist the types of security threats Explain purpose, pros, and cons of encryption www.gxmu.edu.cn
17-1 OBJECTIVES Explain why it is necessary; Discuss management's responsibility; Describe key elements of a network security policy; List the types of security threats; Explain purpose, pros, and cons of encryption; www.gxmu.edu.cn CHAPTER 17 NETWORK MANAGEMENT

CHAPTER 17 NETWORK MANAGEMENT 17-1 OBJECTIVES Describe how symmetric and asymmetric key-based encryption system work Digital signatures and certificates Describe various types of network accesss control Discuss disaster recovery planning Describe the security of home network www.gxmu.edu.cn
Describe how symmetric and asymmetric key-based encryption system work; Digital signatures and certificates; Describe various types of network accesss control ; Discuss disaster recovery planning; Describe the security of home network; www.gxmu.edu.cn CHAPTER 17 NETWORK MANAGEMENT 17-1 OBJECTIVES

CHAPTER 17 NETWORK MANAGEMENT 17-1 INTRODUCTION Describes network security Explains the types of security threats The various measures to increase a network's security It also includes being able to recover from security incidents www.gxmu.edu.cn
17-1 INTRODUCTION Describes network security . Explains the types of security threats. The various measures to increase a network's security. It also includes being able to recover from security incidents. www.gxmu.edu.cn CHAPTER 17 NETWORK MANAGEMENT

CHAPTER 17 NETWORK MANAGEMENT 17-2 Security Is NOT 半 像戲 www.gxmu.edu.cn
www.gxmu.edu.cn 17-2 Security Is NOT Enough No longer can a business be operated without having access to information and a reliable communication system. Usually, the value of the data stored on networked computers far exceeds ,The cost of the networks themselves. Security CHAPTER 17 NETWORK MANAGEMENT

CHAPTER 17 NETWORK MANAGEMENT 17-2 Why Security 目标和破坏 的范围 快速变化的威胁 全面框架 econds 下一代 区域网络 Flash Minutes threats 多个LAN Massive 第三代 worm- Days Distribute driven 单个LAN Weeks第二代 d denial DDOS Macro of service· Damagin 第一代 Blended vIruses g payload 单个pc threats Boot worms Denial of viruses service 1980s 1990s Today Future www.gxmu.edu.cn
www.gxmu.edu.cn 17-2 Why Security ⚫Hacker ⚫Cybercrime and Cyberterror ⚫Attacks on the scope and time TOOLS工具 HIGH LOW 1980 1985 1990 1995 2000 猜口令 自我复制程序 口令破解 攻击已知漏洞 破坏审计 后门程序 干扰通信 手动探测 窃听 数据包欺骗 图形化界面自动扫描 拒绝服务 www攻击 攻击者 攻击者的 知识水平 攻击的复杂度 隐秘且高级的扫描工具 偷窃信息 网管探测 分布式攻击工具 新型的跨主机工具 网络信息系统 内部人员威胁 拒绝服务攻 击 逻辑炸弹 特洛伊木马 黑客攻击 计算机病毒 信息泄漏、 篡改、破 坏 后门、隐蔽通道 蠕虫 社会工程 天 灾 系统Bug 全面框架 区域网络 多个LAN 单个LAN 单个pc 目标和破坏 的范围 1980s 1990s Today Future 第一代 • Boot viruses Weeks 第二代 • Macro viruses • Denial of service Days 第三代 • Distribute d denial of service • Blended threats Minutes 下一代 • Flash threats • Massive wormdriven DDoS • Damagin g payload worms Seconds 快速变化的威胁 CHAPTER 17 NETWORK MANAGEMENT

CHAPTER 17 NETWORK MANAGEMENT 17-2 Why Network Security is Needed Large and small organizations of all types are becoming increasingly dependent on networks to carry on their activities o In the past, networks were main private. easy to control with the rise of the Internet and its use for conducting business, network are more open OIt is virtually impossible to eliminate all network security www.gxmu.edu.cn
17-2 Why Network Security is Needed ⚫large and small organizations of all types are becoming increasingly dependent on networks to carry on their activities. ⚫In the past, networks were main private. easy to control. ⚫ with the rise of the Internet and its use for conducting business, network are more open. ⚫It is virtually impossible to eliminate all network security . www.gxmu.edu.cn CHAPTER 17 NETWORK MANAGEMENT
按次数下载不扣除下载券;
注册用户24小时内重复下载只扣除一次;
顺序:VIP每日次数-->可用次数-->下载券;
- 局域网基础知识及网络设备(PPT课件讲稿).ppt
- 长沙医学院:《计算机专业英语》课程教学资源_教学大纲.doc
- 郑州大学:《计算机组成原理》课程教学资源(PPT课件讲稿,共八章,任课教师:石磊).ppt
- 《数字图像处理》课程教学资源(PPT课件讲稿)第4章 图像增强.ppt
- 电子工业出版社:《计算机网络》课程教学资源(第五版,PPT课件讲稿)第8章 因特网上的音频/视频服务.ppt
- 《数字图像处理》课程教学资源(PPT课件讲稿)第8章 彩色图像处理.ppt
- 《数学建模》课程教学资源(PPT讲稿)SAS基础培训(生成SAS数据集、加工SAS数据集)Statistical Analysis System.ppt
- 《计算机系统结构》课程教学资源(PPT课件讲稿)第一章 计算机系统结构的基本概念.ppt
- 《计算机系统结构》课程教学资源(PPT课件讲稿)第八章 多计算机系统.ppt
- 《操作系统原理》课程教学资源(PPT课件讲稿)Chapter 05 并发性——互斥和同步(Concurrency - Mutual Exclusion and Synchronization).ppt
- 《计算机体系结构》课程教学资源(PPT课件讲稿)第七章 多处理机系统.ppt
- 电子科技大学:《面向对象程序设计语言C++》课程教学资源(PPT课件讲稿)第九章 多态性(主讲:丘志杰).ppt
- 《操作系统》课程教学资源(PPT课件讲稿)Chapter 03 Process Description And Control.ppt
- 《计算机系统结构》课程教学资源(PPT课件讲稿)第五章 存储系统.ppt
- 电子科技大学:《计算系统与网络安全 Computer System and Network Security》课程教学资源(PPT课件讲稿)第2章 信息安全数学基础(计算复杂性).ppt
- 电子科技大学:《计算系统与网络安全 Computer System and Network Security》课程教学资源(PPT课件讲稿)第5章 网络隔离技术.ppt
- 电子科技大学:《计算系统与网络安全 Computer System and Network Security》课程教学资源(PPT课件讲稿)第7章 协议安全技术(安全协议实例).ppt
- 电子科技大学:《计算系统与网络安全 Computer System and Network Security》课程教学资源(PPT课件讲稿)第4章 网络基础(网络概述、协议).ppt
- 四川大学:《Matlab程序设计》课程教学资源(教学大纲)Programming in Matlab.pdf
- 四川大学:.NET and .NET Core:Languages, Cloud, Mobile and AI(PPT课件讲稿)NET for Data Science and AI.pptx
- 《PhotoshopCS2基础教程与上机指导》课程教学资源(PPT课件讲稿)第20章 Web图像与动画设计.ppt
- 深圳大学:《图片处理基础》课程教学课件(PPT讲稿)Poisson Image Editing.pptx
- 广西外国语学院:《计算机网络》课程教学资源(PPT课件讲稿)第8章 DNS.ppt
- 《C语言程序设计》课程教学资源(PPT课件讲稿)第5章 循环结构程序设计.ppt
- 《高级语言程序设计 Advanced Programming》课程教学资源(PPT课件讲稿)第8章 指针.ppt
- 《Java面向对象程序设计》课程教学资源(PPT课件讲稿)第四章 Java图形用户界面设计 4.2 AWT和Swing组件.pptx
- 江苏海洋大学(淮海工学院):《Java面向对象程序设计》课程教学资源(PPT课件讲稿)第2章 Java语言基础.pptx
- 江苏海洋大学(淮海工学院):《Java面向对象程序设计》课程教学资源(PPT课件讲稿)第4章 Java图形用户界面设计.pptx
- 《Java面向对象程序设计》课程教学课件(PPT讲稿)AWT和Swing组件.pptx
- 《Java面向对象程序设计》课程教学课件(PPT讲稿)流程控制语句.pptx
- 《Java面向对象程序设计》课程教学资源(PPT课件讲稿)第六章 Java输入输出流与文件操作.pptx
- 《Java面向对象程序设计》课程教学资源(PPT课件讲稿)第三章 Java面向对象编程.pptx
- 淮阴工学院:《数据库原理》课程教学资源(PPT课件讲稿)第3章 关系数据库的基本理论.ppt
- 大数据分析(PPT讲稿)大数据引领我们走向数据智能化时代.ppt
- 局域网的硬件设备和操作系统(PPT讲稿).ppt
- 上海交通大学:云安全(PPT讲稿)Cloud Security.pptx
- 上海交通大学:《Multicore Architecture and Parallel Computing》课程教学资源(PPT课件讲稿)Lecture 7 CUDA.ppt
- 上海交通大学:《通信网络》课程PPT教学课件(讲稿)Communication Networks - ANALYSIS OF 10G EEE PROTOCOL.pptx
- 亚马逊云计算AWS(Amazon Web Service)、Cloud Computing——Cassandra.ppt
- 《计算机图形学》课程教学资源(PPT课件讲稿)Chapter 4 Graphics Output Primitives(Part II).pptx