KL University CSE NIS 22CS2233 Network Hardware & Software Protection PDF
Document Details
Uploaded by MagnanimousLeibniz
K L E F Deemed To Be University
K. Victor Babu
Tags
Summary
This document details a lecture on network hardware, software, and services. The focus on network hardware and software components like Modems, Routers, Hubs, and their functions. It also includes a description on network services and network monitoring tools. The document is suitable for undergraduate computer science students.
Full Transcript
Department of CSE COURSE NAME: NIS COURSE CODE: 22CS2233 Topic: NAME OF THE TOPIC Network Hardware,...
Department of CSE COURSE NAME: NIS COURSE CODE: 22CS2233 Topic: NAME OF THE TOPIC Network Hardware, Software and Services, Hardware protection Session -1 CREATED BY K. VICTOR BABU AIM OF THE SESSION To familiarize students with the basic concept of Network hardware, Network software and their services. INSTRUCTIONAL OBJECTIVES This Session is designed to: 1. Demonstrate about network hardware and software. 2. Describe network hardware and software services. 3. List out the network hardware and software services. 4. Describe the hardware protection. LEARNING OUTCOMES At the end of this session, you should be able to: 1. Define network hardware and software. 2. Describe types of network hardware and software. 3. Summarize network hardware and software services. CREATED BY K. VICTOR BABU Network Infrastructure Security Network Infrastructure Security Network Infrastructure Security, typically applied to enterprise IT environments, is a process of protecting the underlying networking infrastructure by installing preventative measures to deny unauthorized access, modification, deletion, and theft of resources and data. These security measures can include access control, application security, firewalls, virtual private networks (VPN), behavioural analytics, intrusion prevention systems, and wireless security. Network Hardware Network hardware is a set of physical or network devices that are essential for interaction and communication between hardware units operational on a computer network. These are dedicated hardware components that connect to each other and enable a network to function effectively and efficiently. CREATED BY K. VICTOR BABU Security Cyber Security Cybersecurity is the practice of protecting systems, networks, and programs from digital attacks. Attack Threat + Motive + Method + Vulnerability CREATED BY K. VICTOR BABU Types of Network Hardware Modems Routers Hubs Bridges Switches Network Interface Cards Network Cables Firewall CREATED BY K. VICTOR BABU Hub A Hub is a hardware device that divides the network connection among multiple devices. It broadcasts data to all devices on a network. When computer requests for some information from a network, it first sends the request to the Hub through cable. Hub will broadcast this request to the entire network. All the devices will check whether the request belongs to them or not. If not, the request will be dropped. As a result, it consumes a lot of bandwidth as many computers might not need to receive the broadcasted data. The hub could be useful in linking a few gaming consoles in a local multiplayer game via a wired or wireless LAN. Nowadays, the use of hub is obsolete, and it is replaced by more advanced computer network components such as Switches. CREATED BY K. VICTOR BABU Bridges Bridge: A bridge connects two separate LAN networks. It scans for the receiving device before sending a message. This implies that it avoids unnecessary data transfers if the receiving device is not there. Moreover, it also checks to see whether the receiving device has already received the message. These practices improve the overall performance of the network. CREATED BY K. VICTOR BABU Switches Switch: A Switch do switching of traffic and deliver the data to the exact port It stores the MAC addresses of network devices and transfers data packets only to those devices that have requested Thus, when the demand is high, a switch becomes more efficient as it reduces the amount of latency. A MAC address consists of 48 bits, usually represented as a string of 12 hexadecimal digits Switches can be hardware devices or software-based virtual devices. They operate on the data-link layer, or Layer 2, of the Open Systems Interconnection (OSI) model. CREATED BY K. VICTOR BABU Modem A modem enables a computer to connect to the internet via a telephone line. It stands for Modulator/Demodulator. It converts the digital data into an analog signal over the telephone lines. The modem at one end converts the computer’s digital signals into analog signals and sends them through a telephone line. At the other end, it converts the analog signals to digital signals that are understandable for another computer. Based on the differences in speed and transmission rate, a modem can be classified in the following categories: Standard PC modem or Dial-up modem Cellular Modem Cable modem CREATED BY K. VICTOR BABU Routers A router is a device that connects two or more packet-switched networks or subnetworks. It serves two primary functions: managing traffic between these networks by forwarding data packets to their intended IP addresses, and allowing multiple devices to use the same Internet connection A router is used to receive, analyse and forward the incoming packets to another network. A router connects two or more networks. One common use of the router is to connect a home or office network (LAN) to the internet (WAN). It generally has a plugged-in internet cable along with cables that connect computers on the LAN. Alternatively, a LAN connection can also be wireless (Wi-Fi-enabled), making the network device wireless. These are also referred to as wireless access points (WAPs). A router forwards the packet based on the information available in the routing table. It determines the best path from the available paths for the transmission of the packet. A router works in a Layer 3 (Network layer) of the OSI Reference model. CREATED BY K. VICTOR BABU Network Interface Cards A NIC is a hardware unit installed on a computer, which allows it to connect a computer with another computer onto a network. It is typically in the form of a circuit board or chip. In most modern machines, NICs are built into the motherboards, while in some computers, an extra expansion card in the form of a small circuit board is added externally. It can support a transfer rate of 10,100 to 1000 Mb/s. The MAC address or physical address is encoded on the network card chip which is assigned by the IEEE to identify a network card uniquely. The MAC address is stored in the PROM. There are 2 types of NIC: wired and wireless The Wired NIC is present inside the motherboard. Cables and connectors are used with wired NIC to transfer data. The wireless NIC contains the antenna to obtain the connection over the wireless network. For example, laptop computer contains the wireless NIC. CREATED BY K. VICTOR BABU Network Cables Cables: Cables connect different devices on a network. Cable is a transmission media used for transmitting a signal. There are three types of cables used in transmission: Twisted pair cable Coaxial cable Fibre-optic cable Today, most networks have cables over a wireless connection as they are more secure, less prone to attacks, and at the same time carry larger volumes of data per second. CREATED BY K. VICTOR BABU Firewall Firewall: A Firewall is a hardware or software device between a computer and the rest of the network open to attackers or hackers. Thus, a LAN can be protected from hackers by placing a firewall between the LAN and the internet connection. A firewall allows authorized connections and data-like emails or web pages to pass through but blocks unauthorized connections made to a computer or LAN. CREATED BY K. VICTOR BABU Network Software Network software is a fundamental element for any networking system. It helps administrators and security personnel reduce network complexities, and manage, monitor, and better control network traffic. Network software plays a crucial role in managing a network infrastructure and simplifying IT operations by facilitating communication, security, content, and data sharing. Network software refers to a variety of computer programs used by individuals and organizations to manage, maintain, and monitor computer networks. Network software can range from basic tools, such as network analyzers and protocol analyzers, to complex software suites that include features like network security and monitoring, network mapping, network performance analysis, network inventory and asset management, and more. Features of NMS are : fault, configuration, accounting, performance, and security management, commonly referred to as FCAPS Services are: End point connectivity, logging systems, Infra structure CREATED BY K. VICTOR BABU Network Software Types 1. Network monitoring tools: These software programs help IT professionals monitor network traffic, including traffic volume, speed, packet loss, and more. Some popular network monitoring tools include Nagios, SolarWinds Network Performance Monitor, PRTG Network Monitor, and Zabbix. Real-Time Visibility and Analytics, Performance Management (Bandwidth & Troubleshooting) 2. Network security software: These programs are designed to detect and mitigate network-based security threats, such as malware, viruses, and intrusions. Some popular network security software includes firewalls, intrusion detection systems, endpoint protection software, and VPN software. 3. Network mapping and visualization software: These programs provide a graphical representation of the network topology, allowing users to visualize network architecture, understand network performance, and identify potential bottlenecks or vulnerabilities. Examples of network mapping software include SolarWinds Network Topology Mapper and Microsoft Visio. CREATED BY K. VICTOR BABU Network Software Types 4.Network inventory and asset management software: These programs help IT professionals keep track of all the devices, software, and other assets on the network. Examples of network inventory software include Spiceworks and ManageEngine AssetExplorer. 5. File sharing software: File sharing software enables users to share files and resources across a network. Examples of file sharing software include BitTorrent, Dropbox, and Google Drive 6. Remote access software: Remote access software allows users to connect to a network from a remote location. Examples of remote access software include VPN clients, remote desktop software, and terminal emulation software. 7. Web browsers: Web browsers are software applications that enable users to access and interact with websites on the internet. Examples of web browsers include Google Chrome, Mozilla Firefox, and Microsoft Edge. 8.Operating systems: An operating system is software that manages computer hardware resources and provides common services for computer programs CREATED BY K. VICTOR BABU Network Services Network services refer to the various services or functionalities provided by a network that enable communication and data transfer between devices. Some common examples of network services include: 1.File sharing: File sharing services enable users to share files and resources across a network, allowing users to access and share files on different devices. 2.Email: Email services allow users to send and receive messages and files over a network, providing a simple and efficient way to communicate with others. 3. Printing: Printing services enable users to share printers over a network, allowing multiple users to access and use the same printer. 4. Remote access: Remote access services allow users to connect to a network from a remote location, enabling them to access network resources and services. 5. Web hosting: Web hosting services enable users to host websites and web applications on a network, providing a platform for online content and services. CREATED BY K. VICTOR BABU EXAMPLES 6. Voice and video conferencing: Voice and video conferencing services enable users to communicate with each other in real-time over a network, providing a way to hold meetings and collaborate with others remotely. 7. Domain Name System (DNS): DNS is a network service that translates domain names into IP addresses, allowing users to access websites and other resources on the internet. 8. DHCP (Dynamic Host Configuration Protocol): DHCP is a network service that automatically assigns IP addresses to devices on a network, making it easier to manage and configure network devices. 9. Network Time Protocol (NTP): NTP is a network service that synchronizes the time on network devices, ensuring that all devices are using the same time reference. Overall, network services are an essential part of network functionality, providing users with the ability to communicate, share resources, and access online content and services. CREATED BY K. VICTOR BABU Network Infrastructure Security 1. Organizational security 2. Asset classification and Control 3. Personnel Security 4. Physical and environmental security 5. Communications and operations management 6. Access control 7. System development and maintenance 8. Business continuity management 9. Compliance CREATED BY K. VICTOR BABU Hardware Protection Hardware protection refers to measures taken to secure physical computer and network components from damage, theft, and unauthorized access. Here are some examples of hardware protection: 1.Physical locks: Physical locks, such as padlocks or cable locks, can be used to secure computer cases, laptops, servers, and other equipment to prevent theft. 2.Security cameras: Security cameras can be used to monitor and record activity in areas where computer and network equipment is stored. 3.Biometric authentication: Biometric authentication technologies, such as fingerprint scanners or facial recognition systems, can be used to restrict physical access to computer and network equipment. 4.Firewalls: Firewalls are hardware devices that control access to a network and can be configured to block unauthorized traffic and protect against malware and other threats. 5.Power backup systems: Uninterruptible Power Supply (UPS) systems provide backup power in case of a power outage or electrical surge, protecting hardware components from damage. CREATED BY K. VICTOR BABU Hardware Protection 6. Environmental controls: Temperature and humidity sensors, air conditioning systems, and ventilation fans can be used to regulate the environment in which computer and network equipment is stored, protecting against damage from heat, moisture, and dust. 7. Encryption: Encryption technologies can be used to secure data stored on hardware components, such as hard drives or USB drives, protecting against unauthorized access if the equipment is lost or stolen. Overall, hardware protection is essential to maintain the physical security and integrity of computer and network components, protecting against theft, damage, and unauthorized access. CREATED BY K. VICTOR BABU SELF-ASSESSMENT QUESTIONS 1. Which of The following statements are true about Modems (a) Modems use the telephone call (b) Modem stands for modulator and demodulator (c) Modem are no longer used in secure network (d) Both a and b 2. It can be a software program or a hardware device that filters all data packets coming through the internet, a network, etc. it is known as the_______: (a) Antivirus (b)Firewall (c) Cookies (d)Malware CREATED BY K. VICTOR BABU TERMINAL QUESTIONS 1. Describe about network hardware and software ? 2. List out the network hardware and software service? 3. Analyze network hardware and software services? 4. Summarize network hardware and software services? CREATED BY K. VICTOR BABU REFERENCES FOR FURTHER LEARNING OF THE SESSION Reference Books: 1. Introduction to Network Infrastructure Security,by Angus Wong,Alan Yeung ,2009 2. Information and communications security, 2017, Proceedings (Kindle Edition). 3. Cybersecurity – Attack and Defense Strategies Counter modern threats and employ state- of-the-art tools and techniques to protect your organization against cybercriminals, 2nd Edition (Kindle Edition) Yuri Diogenes, Erdal Ozkaya 2019. 4. Nmap: Network Exploration and Security Auditing Cookbook, Paulino Calderon,2017. 5. network security hacks 2nd edition,Andrew Lockhart,2006. Sites and Web links: 6. https://www.vmware.com/topics/glossary/content/networksecurity.html#:~:text=Network %20security%20is%20a%20set,wide%20variety%20of%20potential%20threats. 2. https://www.geeksforgeeks.org/network-security/ 3. https://www.tutorialspoint.com/information_security_cyber_law/network_security.htm CREATED BY K. VICTOR BABU THANK YOU Team – Course Name CREATED BY K. VICTOR BABU