The document discusses how networking technologies impact everyday life and business. It covers topics like how networks connect devices globally, trends in networking like cloud computing and BYOD, and implications for communication, collaboration and more. Advancements in networking are creating a more connected world without boundaries.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0 ratings0% found this document useful (0 votes)
62 views55 pages
Topic 2 Network
The document discusses how networking technologies impact everyday life and business. It covers topics like how networks connect devices globally, trends in networking like cloud computing and BYOD, and implications for communication, collaboration and more. Advancements in networking are creating a more connected world without boundaries.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 55
Instructor: Jason S.
Aguilar 1.1 Globally Connected • Explain how multiple networks are used in every day life.
1.2 LANs, WANs, and the Internet
• Explain how topologies and devices are connected in a small to medium-sized business network.
1.3 The Network as a Platform
• Explain the basic characteristics of a network that supports communication in a small to medium-sized business.
1.4 The Changing Network Environment
• Explain trends in networking that will affect the use of networks in small to medium-sized businesses. Welcome to a world where we are more powerful together, than we ever could be apart. Welcome to the human network. We live in a world we barely imagined 20 years ago. What wouldn’t we have without the Internet? What will be possible in the future using the network as the platform? Advancements in networking technologies are helping create a world without boundaries. The immediate nature of communications over the Internet encourages global communities. Cisco refers to the impact of the Internet and networks on people the “human network”. Do you remember sitting in a classroom, like this? You don't have to be in school anymore to take a class. You don't have to be in a classroom to have a teacher. The globalization of the Internet has empowered individuals to create information that can be accessed globally. Forms of communication: Texting Social Media Collaboration Tools Blogs Wikis Podcasting Data networks have evolved into helping support the way we work. Online learning opportunities decrease costly and time consuming travel. Employee training is becoming more cost effective. We listen to music, watch movies, read books, and download material for future offline access. Networks allow online gaming in ways that were not possible 20 years ago. Offline activities have also been enhanced by networks including global communities for a wide range of hobbies and interests. How do you play on the Internet? Small Home Networks – connect a few computers to each other and the Internet Small Office/Home Office – enables computer within a home or remote office to connect to a corporate network Medium to Large Networks – many locations with hundreds or thousands of interconnected computers World Wide Networks – connects hundreds of millions of computers world- wide – such as the Internet Every computer connected to a network is called a host or end device. Servers are computers that provide information to end devices on the network. For example, email servers, web servers, or file server Clients are computers that send requests to the servers to retrieve information such as a web page from a web server or email from an email server. Client and server software usually run on separate computers. However, in small businesses or homes, it is typical for a client to also function as the server. These networks are called peer-to-peer networks. Peer-to-peer networking advantages: easy to set up, less complex, and lower cost. Disadvantages: no centralized administration, not as secure, not scalable, and slower performance. A network can be as simple as a single cable connecting two computers or as complex as a collection of networks that span the globe. Network infrastructure contains three broad categories of network components: Devices Media Services End Devices An end device is where a message originates from or where it is received. Data originates with an end device, flows through the network, and arrives at an end device An intermediary device interconnects end devices in a network. Switches are used to connect multiple devices together on the same network. In a properly designed network, LAN switches are responsible for directing and controlling the data flow at the access layer to networked resources. Router is a device that works on Layer 3 of OSI Model (Network Layer), You can make communication in between different networks by connecting them with a router. Communication across a network is carried through a medium which allows a message to travel from source to destination. Networks typically use three types of media: Metallic wires within cables, such as copper Glass, such as fiber optic cables Wireless transmission Network diagrams, often called topology diagrams, use symbols to represent devices within the network. In addition to the device representations on the right, it is important to remember and understand the following terms: Network Interface Card (NIC) Physical Port Interface Note the key differences between the two topology diagrams (physical location of devices vs. ports and network addressing schemes) Two most common types of networks: Local Area Network (LAN) – spans a small geographic area owned or operated by an individual or IT department. Wide Area Network (WAN) – spans a large geographic area typically involving a telecommunications service provider. Other types of networks: Metropolitan Area Network (MAN) Wireless LAN (WLAN) Storage Area Network (SAN) Three characteristics of LANs: Spans a small geographic area such as a home, school, office building, or campus. Usually administered by a single organization or individual. Provides high speed bandwidth to end and intermediary devices within the network. Three characteristics of WANs: WANs interconnect LANs over wide geographical areas such as between cities, states, or countries. Usually administered by multiple service providers. WANs typically provide slower speed links between LANs. The Internet is a worldwide collection of interconnected LANs and WANs. LANs are connected to each other using WANs. WANs are then connected to each other using copper wires, fiber optic cables, and wireless transmissions. The Internet is not owned by any individual or group, however, the following groups were developed to help maintain structure: IETF ICANN IAB Unlike the Internet, an intranet is a private collection of LANs and WANs internal to an organization that is meant to be accessible only to the organizations members or others with authorization. An organization might use an extranet to provide secure access to their network for individuals who work for a different organization that need access to their data on their network. Bring Your Own Device (BYOD) is a major global trend that allows users to use their own devices giving them more opportunities and greater flexibility. BYOD allows end users to have the freedom to use personal tools to access information and communicate using their: Laptops Netbooks Tablets Smartphones E-readers Individuals want to collaborate and work with others over the network on joint projects. Collaboration tools including Cisco WebEx (shown in the figure) gives users a way to instantly connect, interact and achieve their objectives. Collaboration is a very high priority for businesses and in education. Cisco TelePresence powers the new way of working where everyone, everywhere, can be more productive through face to face collaboration. Around the world each day, we transform organizations by transforming our customer experiences. Cloud computing is a global trend that allows us to store personal files or backup our data on servers over the Internet. Applications such as word processing and photo editing can also be accessed using the Cloud. Cloud computing also allows businesses to extend their capabilities on demand and delivered automatically to any device anywhere in the world. Cloud computing is made possible by data centers. Smaller companies that can’t afford their own data centers, lease server and storage services from larger data center organizations in the Cloud. Four types of Clouds: Public Clouds Services and applications are made available to the general public through a pay-per-use model or for free. Private Clouds Applications and services are intended for a specific organization or entity such as the government. Hybrid Clouds Made up of two or more Cloud types – for example, part custom and part public. Each part remains a distinctive object but both are connected using the same architecture. Custom Clouds Smart home technology is a growing trend that allows technology to be integrated into every-day appliances which allows them to interconnect with other devices. Ovens might know what time to cook a meal for you by communicating with your calendar on what time you are scheduled to be home. Powerline networking can allow devices to connect to a LAN where data network cables or wireless communications are not a viable option. Using a standard powerline adapter, devices can connect to the LAN wherever there is an electrical outlet by sending data on certain frequencies. In addition to DSL and cable, wireless is another option used to connect homes and small businesses to the Internet. More commonly found in rural environments, a Wireless Internet Service Provider (WISP) is an ISP that connects subscribers to designated access points or hotspots. Wireless broadband is another solution for the home and small businesses. Uses the same cellular technology used by a smart phone. An antenna is installed outside the house providing wireless or wired connectivity for devices in the home. A hacker set up an open “rogue” wireless hotspot posing as a legitimate wireless network. A customer logged onto her bank’s website. The hacker hijacked her session. The hacker gained access to her bank accounts. An employee receive an email from his CEO, containing an attached PDF. Ransomware is installed on the employee’s computer. Ransomware gathers and encrypts corporate data. The attackers hold the company’s data for ransom until they are paid. Stuxnet Worm Infiltrated Windows operating systems. Targeted Step 7 software that controls programmable logic controllers (PLCs) to damage the centrifuges in nuclear facilities. Transmitted from the infected USB drives into the PLCs eventually damaging many cetrifuges. Known as script kiddies. Have little or no skill. Use existing tools or instructions found on the Internet to launch attacks. Protest against organizations or governments Post articles and videos. Leak information. Disrupt web services with DDoS attacks. Much hacking activity is motivated by financial gain. Cybercriminals want to generate cash flow Bank accounts Personal data Anything else they can leverage Nation states are also interested in using cyberspace Hacking other countries Interfering with internal politics Industrial espionage Gain significant advantage in international trade The Internet of Things (IoT) Connected things to improve quality of life. Example: fitness trackers
How secure are these devices?
Firmware Security flaws Updatable with patch
DDoS attack against domain name provider,
Dyn Took down many websites. Compromised webcams, DVRs, routers, and other IoT devices formed a botnet. The hacker controlled botnet created the DDoS attack that disabled essential Internet services. Personally identifiable information (PII) is any information that can be used to positively identify an individual. Examples of PII include: Name, Social security number, Birthdate, Credit card numbers, Bank account numbers, Government-issued ID, Address information (street, email, phone numbers) This information is sold on the dark web. Create fake accounts, such as credit cards and short-term loans.
Protected Health Information (PHI) – A subset of PII:
Creates and maintains electronic medical records (EMRs) Regulated by Health Insurance Portability and Accountability Act (HIPAA) Could result in lost competitive advantage. Corporate espionage in cyberspace. Loss of trust that comes when a company is unable to protect its customers’ personal data. In 2016, a hacker published PII of 20,000 U.S. FBI employees and 9,000 U.S. DHS employees. Stuxnet worm was designed to impede Iran’s progress in enriching uranium Example of network attack motivated by national security concerns Cyberwarfare is a serious possibility. The Internet has become essential as a medium for commercial and financial activities. Disruption can devastate a nation’s economy and the safety of its citizens. Security Operations Centers (SOCs) provide a broad range of services: Monitoring Management Comprehensive threat solutions Hosted security
SOCs can be:
In-house, owned and operated by a business. Elements can be contracted out to security vendors. The major elements of a SOC: People Processes Technology The SANS Institute (www.sans.org) classifies the roles people play in a SOC into four job titles: Tier 1 Alert Analyst Tier 2 Incident Responder Tier 3 Subject Matter Expert (SME)/Hunter SOC Manager
Can you guess the responsibilities for
each of the job titles? Tier 1 Alert Analyst begins with monitoring security alert queues. Tier 1 Alert Analyst verifies if an alert triggered in the ticketing software represents a true security incident. The incident can be forwarded to investigators, or resolved as a false alarm. Security Information and Event Management (SIEM) systems: Collect and filter data. Detect and classify threats. Analyze and investigate threats. Implement preventive measures. Address future threats. Organizations may implement an enterprise-level SOC. The SOC can be : A complete in-house solution Outsourced at least part of the SOC operations to a security solutions provider. Most enterprise networks must be up and running at all times. Preferred uptime is often measured in the number of down minutes in a year. A “five nines” uptime means that the network is up 99.999% of the time (or down for no more than 5 minutes a year). Trade off between strong security and permitting business functions.