Com Serv
Com Serv
Cable Testers
Cable Testers also known as a media tester
that is used for find network problems involves bad cabling and connectors.
Generally it is used for test whether the cable works properly or not
that was finding to the pinpoint the distance to a break in a cable.
Crimper
to attach the RJ-45 type connectors to end of the cables.
was generally used for network and telephone line cabling.
Multimeter
to check the shorts in the coaxial cable.
know as multitester as well as volt ohm meter (VOM)
Multimeter can be used to directly measure electrical vales of voltage (V), current in ampier(A)
and resistance in ohms.
POST Cards
tests the activity of the system as it boots up.
used when the framework can't read from a floppy or hard drive.
Putty
Putty is a free and open-source troubleshooting tool.
Putty was created for Microsoft Windows, but it has been working on various operating systems
like as Linux.
Utilizing putty we can perform different basic actions such as creating folders, copying them and
so on.
TTL and ms
• What is time-to-live (TTL)?
Time-to-live (TTL) is a value for the period of time that a packet, or data, should exist on a
computer or network before being discarded.
• Ping (latency is the technically more correct term) means the time it takes for a small data set to
be transmitted from your device to a server on the Internet and back to your device again. The
ping time is measured in milliseconds (ms)
Network Monitor
One of the most popular networking Monitoring Tool is Microsoft Network Monitor.
was originally designed and developed by Raymond Patch,
Used for troubleshooting network problems and applications on the network
ipconfig
Ipconfig stands for internet protocol configuration.
used to troubleshoot internet issues and find information about the host computer TCP/IP
configuration.
used to know current local IP address, default gateway, TCP/IP settings for troubleshooting a
networking issue
Nslookup
Nslookup used for domain name or IP address mapping or for any other specific DNS record.
it is a network administration command-line trouble shorting tool.
Generally, nslookup used for find the ip address of a host and find the domain name of an ip
address and find mail servers for a domain.
What is DNS?
DNS, or the Domain Name System, translates human readable domain names (for example,
www.amazon.com)to machine readable IP addresses (for example, 192.0.2.44).
Nslookup
Nslookup www.google.com
Netstat
displays network connections for the Transmission Control Protocol (TCP) (both incoming and
outgoing),number of network interface and network protocol statistics.
accessible on all operating system
used for finding problems in the system and to decide the measure of traffic on the system as a
performance measurement.
Netstat [-a] [-e] [-n] [-0] [-p proto] [-r] [-s] [-v] [interval]
Chapter 6
Information Systems Security
Learning Objectives
Upon successful completion of this chapter, you will be able to:
Identify the information security triad
Identify and understand the high-level concepts surrounding information security tools
Secure yourself digitally
Introduction
• Computers and digital devices are becoming integral to conducting business
- Which also makes them a target of attack
• Devices needs to be secured
• Networks that computers and devices use should also be secured
CIA Triad
Confidentiality — restrict access to authorized individuals
Integrity— data has not been altered in an unauthorized manner
Availability — information can be accessed and modified by authorized
individuals in an appropriate timeframe
Confidentiality
Integrity
Availability
Authentication
• Persons accessing the information is who they say they are
• Factors of identification:
Encryption
• An algorithm (program) encodes or scrambles information during
transmission or storage
Decoded/unscrambled by only authorized individuals to read it
How is this done?
— Both parties agree method (there are many) using keys
• Symmetric key — sender and receiver have the key which can be
risky
• Public Key— use a public and private key where the public key is
used to send an encrypted message and a private key that the
receiver uses to decode the message
Passwords
• Single-factor authentication (user ID/password) is the easiest to break
• Password policies ensure that this risk is minimized by requiring:
- A certain length to make it harder to guess
- Contain certain characters — such as upper and lower case, one number, and a special character
- Changing passwords regularly and do not a password to be reused
- Employees do not share their password
- Notifying the security department if they feel their password has been compromised.
- Yearly confirmation from employees that they understand their responsibilities
Backup
• Important information should be backed up and store in a separate location
- Very useful in the event that the primary computer systems become unavailable
• A good backup plan requires:
- Understanding of the organizational information resources
- Regular backups of all data
- Offsite storage of backups
- Test of the data restoration
• Complementary practices:
- UPS systems
- Backup processing sites
Physical Security
• Protection of the actual equipment
- Hardware
- Networking components
• Organizations need to identify assets that need to be physically secured:
- Locked doors
- Physical intrusion detection - e.g., using security cameras
- Secured equipment
- Environmental monitoring — temperature, humidity, and airflow for computer equipment
- Employee training
Security Policies
• Starting point in developing an overall security plan
• Formal, brief, and high-level statement issued by senior management
— Guidelines for employee use of the information resources
— Embraces general beliefs, goals, objectives, and acceptable procedures
— Includes company recourse if employees violate the policy
• Security policies focus on confidentiality, integrity, and availability
— Includes applicable government or industry regulations
• Bring Your Own Device (BYOD) policies for mobile devices
— Use when accessing/storing company information
— Intellectual property implications
• Difficult to balance the need for security and users' needs
Summary
• Identified the information security triad
• Identified and understand the high-level concepts surrounding information security tools
• How to secure yourself digitally
•
NETWOR DEVICES-FOR SECURITY FIREWAL
Contents
• Introduction
• History
• Why firewall security
• Types of firewalls
• Working
• Need for firewalls
• Next generation firewall
• Advantages and disadvantages
• Conclusion
Introduction
• A firewall is a network security system, either hardware- or software-based, that controls
incoming and outgoing network traffic based on a set of rules.
• Network firewalls are frequently used to prevent unauthorized Internet users from accessing
private networks connected to the Internet, especially intranets.
• All messages entering or leaving the intranet pass through the firewall, which examines each
message and blocks those that do not meet the specified security criteria.
Continued...
• In protecting private information, a firewall is considered a first line of defense.
• In most sewer infrastructures, firewalls provide an essential layer of security that, combined
with other measures, prevent attackers from accessing your servers in malicious ways.
History
• Computer security borrowed the term firewall from firefighting and fire prevention, where a
firewall is a barrier established to prevent the spread of fire.
• Before firewalls emerged in the late 1980s, the only real form of network security was
performed by access control lists (ACLs) residing on routers.
• Firewall emerged in the late 1980s when the Internet was a fairly new in terms of its global use
and connectivity.
Types of firewalls
• Hardware firewalls
• Software firewalls
Hardware firewall
• Hardware firewall can be purchased as a stand-alone product but are also typically found in
broadband routers, and should be considered an important part of your system and network set-
up.
• Most hardware firewalls will have a minimum of four network ports to connect other computers,
but for larger networks, business networking firewall solutions are available.
Software firewall
• Software firewalls are installed on your computer (like any software) and you can customize it
allowing you some control over its function and protection features. A software firewall will
protect your computer from outside attempts to control or gain access your computer.
• New generation Operating systems come with built in firewalls or you can buy a firewall software
for the computer that accesses the internet or acts as the gateway to your home network.
Firewall logic
• Firewalls use 3 types of filtering mechanisms:
1. Packet filtering
2. Proxy service
3. Stateful inspection
Packet filtering
Data flow consists of packets of information and firewalls analyze these packets to sniff out
offensive or unwanted packets depending on what you have defined as unwanted packets.
Looks at each packet entering or leaving the network and accepts or rejects it based on user
defined rules. Packet filtering is fairly effective and transparent to users, but it is difficult to
configure.
Proxy service
• A proxy server is a type of gateway that hides the true network address of the computer(s)
connecting through it.
• A proxy server connects to the Internet, makes the requests for pages, connections to servers,
etc., and receives the data on behalf of the computer(s) behind it.
• The firewall capabilities lie in the fact that a proxy can be configured to allow only certain types
of traffic to pass (e.g., HTTP files, or web pages).
• Proxy firewalls are considered to be the most secure firewall because they prevent direct
network contact other systems.
Firewall proxy servers works at the application layer of the firewalls, where both ends of a connection
are forced to conduct a session through the proxy.
Stateful inspection
A newer method that doesn't examine the contents of each packet but instead compares
certain key parts of the packet to a database of trusted information.
Information traveling from inside the firewall to the outside is monitored for specific defining
characteristics, then incoming information is compared to these characteristics.
If the comparison yields a reasonable match, the information is allowed through. Otherwise it is
discarded.
Benefits of NGFW
The 3 great benefits offered by next generation firewall for your enterprise wireless network are
1. Application Identification
2. Application Control
3. Threat Prevention
Advantages
• Low cost.
• Packet filters make use of current network routers.
• Makes Security Transparent to End-Users.
• Easy to install. High speed
• Packet filters make use of current network routers. Therefore implementing a packet filter
security system is typically less complicated than other network security solutions.
• Packet filters are generally faster than other firewall technologies because they perform fewer
evaluation
Disadvantages
• Packet filtering by a software firewall can degrade your system's performance, because it's a
demanding task to examine every packet of data.
• Whichever option you choose, configuring and maintaining the firewall can be a difficult.
• A network firewall also can lend users a false sense of security, encouraging them not to
maintain security at the machine level if the network firewall fails or is not configured properly,
this system proved disastrous.
• Sometimes difficult to remove or un-install a firewall complement
These are the following materials needed in the configuration task:
1. Connectors
- It is used to connect external devices to the computer system.
2. Adapter
- A piece of hardware that plugs into an expansion slot in your computer.
4. Appropriate software
- This software packages are used to install new drivers needed in setting up your computer.
7. Manuals
- These provide instructions for certain operation or task.
8. Cable tie
- It is used to organized wires and cables used in connecting computers to avoid tangling.
These are the following tools/ testing devices needed in the configuration task:
1. Screw drivers
- Flat screw driver is used to fasten negative slotted
- Philips screw driver is used to fasten positive slotted & screws.
2. Pliers
- Side Cutter pliers is used for cutting and trimming of connecting wires or terminal leads in the
circuit board.
- Long nose pliers is used for holding, bending and stretching the lead Of electronics component
and connecting wire.
3. Soldering iron/gun
- It is used to join two Or more metal conductors with the support of soldering lead melted
around it.
4. Multi-tester
- It is used by technician for measuring current, voltage and resistance.
5. Magnifying glass
- It is a device made of glass with handle. It exaggerates or increase the apparent size of an
Object.
6. Safety apparel suit (coverall)
- It is used by the person for body protection.
8. Tweezers
- It is used to hold the small sensitive part of the computer.
9. Mini-vacuum cleaner
- It is used for cleaning sensitive parts of the computer.
If you need to add a network adapter, first choose which method you want to use to install it. Most
people prefer to use a USB (Universal Serial Bus) network adapter, because it's easy to install. If you
have a portable computer, you might find a CardBus (also known as PCMCIA or PC Card) or CF network
adapter better meets your needs. If you have a desktop computer with the proper amount of available
space, you may also have the option of adding an internal network adapter.
The instructions you follow to install a network adapter depend on how you connect it.
Why RAID?
RAID
It is a technique that combines multiple disk drives into a logical unit (RAID set) and provides
protection, performance, or both.
• Due to mechanical components in a disk drive it offers limited performance
• An individual drive has a certain life expectancy and is measured in MTBF:
For example: If the MT BF of a drive is 750,000 hours, and there are 1000 drives in the array,
then the MTBF of the array is 750 hours (750,000/1000)
• RAID was introduced to mitigate these problems
RAID Techniques
• Three key techniques used for RAID are:
Striping
Mirroring
Parity
RAID Technique - Parity
• Parity is a calculated value that's used to restore data from the other drives if one of the drives
in the set fails. It determines the number of odd and even bits in a number, and this information
is used to reconstruct data if a sequence of numbers is lost, which is the case if one of the disks
fail.
RAID Level 0
• There is no parity checking of data.
• So if data in one drive gets corrupted then all the data would be lost. Thus RAID 0 does not
support data recovery
• Spanning is another term that is used with RAID level 0 because the logical disk will span all the
physical drives
• RAID 0 implementation requires minimum 2 disks
RAID Level 1
• Data stripping is used as in RAID 0, but each logical strip is mapped to two separate physical drives
• Thus every disk in the array has a mirror disk that contains the same data
• Data can be read from either disk but is written on both disks
RAID Level 2
• In RAID 2 mechanism, all disks participate in the execution of every I/O request.
• The spindles of individual disk drives are synchronized so that each disk head is in the same
position on each disk at any given time.
• Data stripping is used.
• Error correcting code is also calculated and stored with data
• Not implemented in practice due to high costs and overheads
RAID Level 3
• Data is divided into byte units and written across multiple disk drives.
• Parity information is stored for each disk section and written to a dedicated parity drive.
• All disks can be accessed in parallel
• Data can be transferred in bulk. Thus high speed data transmission is possible
RAID Level 3
• In case of drive failure, the parity drive is accessed and data is reconstructed from the remaining
devices.
• Once the failed drive is replaced, the missing data can be restored on the new drive
• RAID 3 can provide very high data transfer rates
RAID LEVEL 4
• •RAID 4 is very similar to RAID 3 in that a parity disk drive is always one of the five associated
disk drives. But the difference is instead of doing the parity at the byte level. in RAID 4, the
parity is done at the block level.
RAID LEVEL 5
• RAID 5 consists of block-level striping with distributed parity.
• Unlike in RAID 4, parity information is distributed among the drives. It requires that all drives but
one be present to operate at that block.
BENEFITS OF RAID
• Data loss can be very dangerous for an organization
• RAID technology prevents data loss due to disk failure
• RAID technology can be implemented in hardware or software
• Servers make use of RAID technology
Redundant Array of Independent Disks
(RAID)
Level 0
• Striping
no fault tolerance
• High performance
Level 1
• Mirroring
Level 2
• Data striping over all drives at the bit level; parity data created with hamming code
Hamming codes = overlapping parity that is used to reconstruct the original data
Level 3
• Byte-level parity
• All parity data is on one disk
Level 4
• Block-level parity
Level 5
• Interleave parity— data and parity over all disks
ComServ
Movie review
Every child is special
This hardware tool is used for finding network problems involves bad cabling and connectors.
Cable Testers
This hardware tool use to attach the RJ-45 type connectors to end of the cables. k
Crimper
This hardware tool is use to check the shorts in the coaxial cable k
Multimeter
This hardware tool use to tests the activity of the system as it boots up *
POST Cards
Also known as Krone tool *
LSA punch down tool
Is a software tool that can perform different basic actions such as creating folders, copying them and so
on *
Putty
PING Acronym (Give the meaning)
PACKET INTERNET GOPHER
IPCONFIG Acronym (Give the meaning)
internet protocol configuration
TTL Acronym (Give the meaning)
time to live
TRACERT Acronym (Give the meaning)
TRACE ROUTE
DNS Acronym (Give the meaning)
Domain Name System
BYOD Acronym (Give the meaning)
Bring Your Own Device
VPN Acronym (Give the meaning)
Virtual Private Networks
It is a command line that used for domain name or ip address mapping for any other specific dns record
NSLOOKUP
It is a software tool that displays network connections for transmission control protocol *
NETSTAT
What does "C" stands for in CIA Triad
Confidentiality
What does "l" stands for in CIA Triad *
Integrity
In CIA triad this refer to, restrict access to authorized individuals *
Confidentiality
In CIA triad this refer to, that the data has not been altered in an authorized manner k
Integrity
In CIA triad this refer to the information, that can be accessed and modified by authorized individuals in
an appropriate timeframe *
Availability
Give at least one example of "Tools for information Security *
Authentication
Give at least one example of "Tools for information Security *
Access Control
This refer to only provide access to information necessary to perform their job duties to read, modify
add and or delete information *
Access Control
An Algorithm which encodes or scrambles information during transmission
Encryption
This Security tools, inspect and stops packets of information that don't apply to a strict set of rules
Firewall
This Security tools allows remote users to remotely access these systems over a public network like the
internet *
Virtual Private Networks
In Firewall, Give 1 type of filtering mechanism *
Packet filtering
What filtering mechanism, which looks at each packet entering or leaving the network and accepts or
rejects it *
Packet filtering
Is a type of gateway that hides the true network address of the computer(s) connecting through it
Proxy service