河南中医药大学:《信息安全网络与网络安全》课程教学资源(英文讲稿)第06章 网络 Networks

SECURITY IN COMPUTING FIETH EDITION Chapter 6: Networks 授课教师:高海波 可南中医药大学 信息管理与信息系统教研室 From Security in Computing, Fifth Edition, by Charles P Pfleeger, et aL. (ISBN: 9780134085043) Copyright 2015 by Pearson Education, Inc. All rights reserved
SECURITY IN COMPUTING, FIFTH EDITION Chapter 6: Networks From Security in Computing, Fifth Edition, by Charles P. Pfleeger, et al. (ISBN: 9780134085043). Copyright 2015 by Pearson Education, Inc. All rights reserved. 1 授课教师:高海波 河南中医药大学 信息管理与信息系统教研室

2 Objectives for Chapter 6 Networking basics Network threats and vulnerabilities WiFi security Denial-of-service attacks Network encryption concepts and tools Types of firewalls and what they do Intrusion detection and prevention systems Security information and event management tools From Security in Computing, Fifth Edition, by Charles P Pfleeger, et aL. (ISBN: 9780134085043) Copyright 2015 by Pearson Education, Inc. All rights reserved
Objectives for Chapter 6 • Networking basics • Network threats and vulnerabilities • WiFi security • Denial-of-service attacks • Network encryption concepts and tools • Types of firewalls and what they do • Intrusion detection and prevention systems • Security information and event management tools 2 From Security in Computing, Fifth Edition, by Charles P. Pfleeger, et al. (ISBN: 9780134085043). Copyright 2015 by Pearson Education, Inc. All rights reserved

3 Network Transmission media Cable Optical fiber Microwave iFI Satellite communication From Security in Computing, Fifth Edition, by Charles P Pfleeger, et aL. (ISBN: 9780134085043) Copyright 2015 by Pearson Education, Inc. All rights reserved
Network Transmission Media • Cable •Optical fiber • Microwave •WiFi •Satellite communication 3 From Security in Computing, Fifth Edition, by Charles P. Pfleeger, et al. (ISBN: 9780134085043). Copyright 2015 by Pearson Education, Inc. All rights reserved

Communication Media Vulnerability Sender Wiretap LAN Imposter WAN Rogue receiver sniffer, wiretap Satellite, microwave interception LAN wired interception Receiver From Security in Computing, Fifth Edition, by Charles P Pfleeger, et aL. (ISBN: 9780134085043) Copyright 2015 by Pearson Education, Inc. All rights reserved
Communication Media Vulnerability 4 From Security in Computing, Fifth Edition, by Charles P. Pfleeger, et al. (ISBN: 9780134085043). Copyright 2015 by Pearson Education, Inc. All rights reserved

5 Communication Media Pros/ cons Medium Strengths Weaknesses Widely used Susceptible to emanation Inexpensive to buy install Susceptible to physical maintain wiretapping Optical fiber Immune to emanation Potentially exposed at Difficult to wiretap connection points Microwave Strong signal, not seriously. Exposed to interception affected by weather along path of transmission Requires line of sight location Signal must be repeated approximately every 30 miles(50 kilometers) Wireless (radio, WiFi) Widely available Signal degrades over Built into many computers distance suitable for short range Signal interceptable in circular pattern around transmitter Satellite Strong fast signal Delay due to distance signal travels up and down Signal exposed over wid area at receiving end From Security in Computing, Fifth Edition, by Charles P Pfleeger, et al.(ISBN: 9780134085043) Copyright 2015 by Pearson Education, Inc. All rights reserved
Communication Media Pros/Cons 5 From Security in Computing, Fifth Edition, by Charles P. Pfleeger, et al. (ISBN: 9780134085043). Copyright 2015 by Pearson Education, Inc. All rights reserved

6 The osi model 7-Application 7-Application 6-Presentation 6-Presentation 5-Session 5-Session 4-Transport 4-Transport 3-Network 3-Network 2Data link 2Data Link 1-Physical 1-Physical From Security in Computing, Fifth Edition, by Charles P Pfleeger, et aL. (ISBN: 9780134085043) Copyright 2015 by Pearson Education, Inc. All rights reserved
The OSI Model 6 From Security in Computing, Fifth Edition, by Charles P. Pfleeger, et al. (ISBN: 9780134085043). Copyright 2015 by Pearson Education, Inc. All rights reserved

7 Threats to network communications Interception, or unauthorized viewing Modification, or unauthorized change Fabrication, or unauthorized creation Interruption, or preventing authorized access From Security in Computing, Fifth Edition, by Charles P Pfleeger, et aL. (ISBN: 9780134085043) Copyright 2015 by Pearson Education, Inc. All rights reserved
Threats to Network Communications • Interception, or unauthorized viewing • Modification, or unauthorized change •Fabrication, or unauthorized creation • Interruption, or preventing authorized access 7 From Security in Computing, Fifth Edition, by Charles P. Pfleeger, et al. (ISBN: 9780134085043). Copyright 2015 by Pearson Education, Inc. All rights reserved

8 Security Perimeters Security perimeter 国田 From Security in Computing, Fifth Edition, by Charles P Pfleeger, et aL. (ISBN: 9780134085043) Copyright 2015 by Pearson Education, Inc. All rights reserved
Security Perimeters 8 From Security in Computing, Fifth Edition, by Charles P. Pfleeger, et al. (ISBN: 9780134085043). Copyright 2015 by Pearson Education, Inc. All rights reserved

9 What makes a network vulnerable to interception? Anonymity An attacker can attempt many attacks, anonymously, from thousands of miles away Many points of attack Large networks mean many points of potential entry Sharing Networked systems open up potential access to more users than do single computers System complexity One system is very complex and hard to protect; networks of many different systems, with disparate OSs, vulnerabilities, and purposes are that much more complex Unknown perimeter Networks, especially large ones, change all the time, so it can be hard to tell which systems belong and are behaving, and impossible to tell which systems bridge networks Unknown path There may be many paths, including untrustworthy ones, from one host to another From Security in Computing, Fifth Edition, by Charles P Pfleeger, et aL. (ISBN: 9780134085043) Copyright 2015 by Pearson Education, Inc. All rights reserved
What Makes a Network Vulnerable to Interception? • Anonymity • An attacker can attempt many attacks, anonymously, from thousands of miles away • Many points of attack • Large networks mean many points of potential entry • Sharing • Networked systems open up potential access to more users than do single computers • System complexity • One system is very complex and hard to protect; networks of many different systems, with disparate OSs, vulnerabilities, and purposes are that much more complex • Unknown perimeter • Networks, especially large ones, change all the time, so it can be hard to tell which systems belong and are behaving, and impossible to tell which systems bridge networks • Unknown path • There may be many paths, including untrustworthy ones, from one host to another 9 From Security in Computing, Fifth Edition, by Charles P. Pfleeger, et al. (ISBN: 9780134085043). Copyright 2015 by Pearson Education, Inc. All rights reserved

Unknown Perimeter Network c Network a Network B Network D Network E From Security in Computing, Fifth Edition, by Charles P Pfleeger, et aL. (ISBN: 9780134085043) Copyright 2015 by Pearson Education, Inc. All rights reserved
Unknown Perimeter 10 From Security in Computing, Fifth Edition, by Charles P. Pfleeger, et al. (ISBN: 9780134085043). Copyright 2015 by Pearson Education, Inc. All rights reserved
按次数下载不扣除下载券;
注册用户24小时内重复下载只扣除一次;
顺序:VIP每日次数-->可用次数-->下载券;
- 河南中医药大学:《信息安全网络与网络安全》课程教学资源(英文讲稿)第03章 程序与编程 Programs and Programming.pdf
- 河南中医药大学:《信息安全网络与网络安全》课程教学资源(英文讲稿)第05章 数据库 Databases.pdf
- 河南中医药大学:《信息安全网络与网络安全》课程教学资源(英文讲稿)第04章 操作系统 Operating Systems.pdf
- 河南中医药大学:《信息安全网络与网络安全》课程教学资源(英文讲稿)第02章 工具箱:鉴别、访问控制与加密 Toolbox:Authentication, Access Control, and Cryptography.pdf
- 河南中医药大学:《信息安全网络与网络安全》课程教学资源(英文讲稿)第01章 概论 Introduction.pdf
- 河南中医药大学:《信息安全网络与网络安全》课程教学资源(实验指导)第三章 网络分析实验——端口扫描与嗅探实验.pptx
- 河南中医药大学:《信息安全网络与网络安全》课程教学资源(实验指导)第三章 网络分析实验——网络监视实验.pptx
- 河南中医药大学:《信息安全网络与网络安全》课程教学资源(实验指导)第三章 网络分析实验——数据包捕获实验.pptx
- 河南中医药大学:《信息安全网络与网络安全》课程教学资源(实验指导)第八讲 主机探测及端口扫描实验.pptx
- 河南中医药大学:《信息安全网络与网络安全》课程教学资源(实验指导)第七讲 WEB漏洞渗透实验.pptx
- 河南中医药大学:《信息安全网络与网络安全》课程教学资源(实验指导)第六讲 入侵检测实验——基于虚拟蜜网的网络攻防实验.pptx
- 河南中医药大学:《信息安全网络与网络安全》课程教学资源(实验指导)第六讲 入侵检测实验.pptx
- 河南中医药大学:《信息安全网络与网络安全》课程教学资源(实验指导)第五讲 防火墙实验.pptx
- 河南中医药大学:《信息安全网络与网络安全》课程教学资源(实验指导)第四讲 协议与内容安全实验.pptx
- 河南中医药大学:《信息安全网络与网络安全》课程教学资源(实验指导)第十一章 网络服务扫描实验.pptx
- 河南中医药大学:《信息安全网络与网络安全》课程教学资源(实验指导)第十章 邮件钓鱼社会工程学实验.pptx
- 河南中医药大学:《信息安全网络与网络安全》课程教学资源(实验指导)第九章 口令破解及安全加密电邮实验.pptx
- 复旦大学:《计算机网络与网页制作》课程PPT教学课件(讲稿)19 管理你的站点.pptx
- 复旦大学:《计算机网络与网页制作》课程PPT教学课件(讲稿)18 用行为增加页面的互动.pptx
- 复旦大学:《计算机网络与网页制作》课程PPT教学课件(讲稿)17 使用Spry组件.pptx
- 河南中医药大学:《信息安全网络与网络安全》课程教学资源(英文讲稿)第07章 安全管理与事件 Management and Incidents.pdf
- 河南中医药大学:《信息安全网络与网络安全》课程教学资源(英文讲稿)第08章 密码学精讲 Details of Cryptography.pdf
- 河南中医药大学:《信息安全网络与网络安全》课程教学资源(英文讲稿)第09章 隐私 Privacy.pdf
- 河南中医药大学:《信息安全网络与网络安全》课程教学资源(英文讲稿)第10章 浏览器 The Web—User Side.pdf
- 河南中医药大学:《信息安全网络与网络安全》课程教学资源(英文讲稿)第12章 新兴问题 Emerging Topics.pdf
- 河南中医药大学:《信息安全网络与网络安全》课程教学资源(英文讲稿)第11章 云计算 Cloud Computing.pdf
- 河南中医药大学:《云计算与虚拟化技术 Cloud and virtualization technology》课程教学资源(实验课程教学大纲).pdf
- 河南中医药大学:《云计算与虚拟化技术 Cloud and virtualization technology》课程教学资源(理论课程教学大纲).pdf
- 《云计算与虚拟化技术 Cloud and virtualization technology》参考资料:The Complete VMware vSphere Guide:Design a Virtualized Data Center with VMware vSphere 6.7.pdf
- 《云计算与虚拟化技术 Cloud and virtualization technology》参考资料:4 Reasons to Embrace Multi-Cloud with Network Virtualization.pdf
- 《云计算与虚拟化技术 Cloud and virtualization technology》参考资料:IDC:The Business Value of VMware NSX Advanced Load Balancer.pdf
- 《云计算与虚拟化技术 Cloud and virtualization technology》参考资料:Mastering VMware vSphere 6.7, 2nd Edition.pdf
- 《云计算与虚拟化技术 Cloud and virtualization technology》参考资料:Mastering VMware vSphere 6.7.pdf
- 《云计算与虚拟化技术 Cloud and virtualization technology》教学资源(参考资料)Mastering VMware vSphere 6.pdf
- 《云计算与虚拟化技术 Cloud and virtualization technology》参考资料:Network Virtualization for Dummies.pdf
- 《云计算与虚拟化技术 Cloud and virtualization technology》参考资料:Optimizing Remote Worker Connectivity to Cloud Applications Using SD-WAN Gateways.pdf
- 《云计算与虚拟化技术 Cloud and virtualization technology》参考资料:VMware NSX Data Center.pdf
- 《云计算与虚拟化技术 Cloud and virtualization technology》参考资料:VMware vSphere 功能特性比较.pdf
- 《云计算与虚拟化技术 Cloud and virtualization technology》参考资料:WHAT'S NEW IN VMWARE vSPHERE 6.7.pdf
- 《云计算与虚拟化技术 Cloud and virtualization technology》参考资料:Worldwide Cloud System and Service Management Software Market Shares, 2019:SaaS and ITOM Drive Growth.pdf