Unit 6

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 7

Unit 6:

Topic 1:Server management and Firewalls

What Is Server Management?

Whenever computers share resources with client machines they are considered servers.

Server management is the process of monitoring and maintaining servers to operate at peak performance.

Server management also holds the management of hardware, software, security, and backups.

The primary goals of an effective server management strategy are to:

 Minimize—and hopefully eliminate—server slowdowns and downtime.

Build secure server environments.

 Ensure servers continue to meet the needs of an organization as it evolves

What Is a Virtual Server?

 Virtualization is a major trend in today’s server environments.

 While a traditional, physical server is typically a single server running on a single machine; a virtual server can allow

multiple servers to be hosted on one piece of hardware

 Virtual servers—also known as virtual machines—can help increase efficiency by enabling more to be done with less

hardware.

 They can be more complex to manage than physical servers, but the same server management principles apply to both.

 Anyone who manages servers needs to be familiar with a wide range of IT topics like physical vs. virtual servers to

understand what environment is best to meet organizational needs.

SERVER MANAGEMENT BASICS

 Server management basics include management of hardware, software, security, and backups.

 The following are important elements of effective server management any IT strategy or software solution should help

address:
 Hardware Topic 2: user management
 User management describes the ability for administrators to manage user access to

various IT resources like systems, devices, applications, storage systems, etc

 User management is a core part to any directory service and is a

basic security essential for any organization.

 User management solves the problem of managing user access to various resources.

 For example, the marketing team generally requires access to different resources than

the accounting team.

 Further, an employee on the marketing likely doesn’t need access to internal financial

systems and vice versa, a finance employee isn’t requiring access to Sales force or

Market.

 User management enables IT administrators to manage resources and provision

users based on need and role.

Topic 3: overview of Firewalls

What is a Firewall?

 A firewall can be defined as a special type of network security device or a software program that monitors and filters incoming and

outgoing network traffic based on a defined set of security rules.

 It acts as a barrier between internal private networks and external sources (such as the public Internet).

 The primary purpose of a firewall is to allow non-threatening traffic and prevent malicious or unwanted data traffic for protecting the

computer from viruses and attacks.

 A firewall is a cyber security tool that filters network traffic and helps users block malicious software from accessing the Internet in infected

computers.

 Some of the important risks of not having a firewall are:

Open Access

 If a computer is running without a firewall, it is giving open access to other networks.

 This means that it is accepting every kind of connection that comes through someone.

 In this case, it is not possible to detect threats or attacks coming through our network.

 Without a firewall, we make our devices vulnerable to malicious users and other unwanted sources.
Lost or Comprised Data

 Without a firewall, we are leaving our devices accessible to everyone.

 This means that anyone can access our device and have complete control over it, including the network.

 In this case, cybercriminals can easily delete our data or use our personal information for their benefit.

Network Crashes

 In the absence of a firewall, anyone could access our network and shut it down.

 It may lead us to invest our valuable time and money to get our network working again.

 Therefore, it is essential to use firewalls and keep our network, computer, and data safe and secure from unwanted sources.

How does a firewall works?

 A firewall system analyzes network traffic based on pre-defined rules.

 It then filters the traffic and prevents any such traffic coming from unreliable or suspicious sources.

 It only allows incoming traffic that is configured to accept.

 Typically, firewalls intercept network traffic at a computer's entry point, known as a port.

 Firewalls perform this task by allowing or blocking specific data packets (units of communication transferred over a digital network) based

on pre-defined security rules.

 Incoming traffic is allowed only through trusted IP addresses, or sources.

What is antivirus?

 Antivirus is an application or software which provides security from the malicious software coming from the internet. An antivirus chases

the method in which it performs 3 actions which are:

 Detection

 Identification

 Removal

Antivirus deals with both external threats and internal threats. It is implemented only software not in hardware also.

Difference between a Firewall and Anti-virus

 Firewalls and anti-viruses are systems to protect devices from viruses and other types of Trojans, but there are significant

differences between them.

 Based on the vulnerabilities, the main differences between firewalls and anti-viruses are tabulated below:

Types of Firewall-

There are mainly three types of firewalls, such as software firewalls, hardware firewalls, or both, depending on their structure.

Each type of firewall has different functionality but the same purpose.
A hardware firewall is a physical device that attaches between a computer network and a gateway. For example- a broadband

router.

A hardware firewall is sometimes referred to as an Appliance Firewall. On the other hand, a software firewall is a simple program

installed on a computer that works through port numbers and other installed software. This type of firewall is also called a Host

Firewall.

Besides, there are many other types of firewalls depending on their features and the level of security they provide. The following

are types of firewall techniques that can be implemented as software or hardware:

o Packet-filtering Firewalls

o Circuit-level Gateways

o Proxy Firewall

 Packet-filtering Firewalls

 A packet filtering firewall is the most basic type of firewall.

 It acts like a management program that monitors network traffic and filters incoming packets based on configured security
rules.

 These firewalls are designed to block network traffic IP protocols, an IP address, and a port number if a data packet does
not match the established rule-set.

 While packet-filtering firewalls can be considered a fast solution without many resource requirements, they also have
some limitations.

 Because these types of firewalls do not prevent web-based attacks, they are not the safest.

 Circuit-level Gateways

 Circuit-level gateways are another simplified type of firewall that can be easily configured to allow or block traffic
without consuming significant computing resources.

 These types of firewalls typically operate at the session-level of the OSI model by verifying TCP (Transmission
Control Protocol) connections and sessions.

 Circuit-level gateways are designed to ensure that the established sessions are protected.

 Typically, circuit-level firewalls are implemented as security software or pre-existing firewalls.

 Like packet-filtering firewalls, these firewalls do not check for actual data, although they inspect information about
transactions.

 Therefore, if a data contains malware, but follows the correct TCP connection, it will pass through the gateway.

 That is why circuit-level gateways are not considered safe enough to protect our systems.

Proxy Firewalls (Application-Level Gateways/Cloud Firewalls)

Proxy firewalls operate at the application layer to filter incoming traffic between your network and the traffic source—hence, the name
“application-level gateway.”

These firewalls are delivered via a cloud-based solution or another proxy device. Rather than letting traffic connect directly, the proxy
firewall first establishes a connection to the source of the traffic and inspects the incoming data packet.

Topic 4: Wireless networks and security

 Wireless network security primarily protects a wireless network from unauthorized and malicious access attempts.

 Typically, wireless network security is delivered through wireless devices (usually a wireless router/switch) that encrypts and secures

all wireless communication by default.

 Even if the wireless network security is compromised, the hacker is not able to view the content of the traffic/packet in transit.
 Moreover, wireless intrusion detection and prevention systems also enable protection of a wireless network by alerting the wireless

network administrator in case of a security breach.

Some of the common algorithms and standards to ensure wireless network security are Wired Equivalent Policy (WEP) and Wireless

Protected Access (WPA).

Types of Wireless Connections

In addition to a LAN, there are a few other types of common wireless networks: personal-area network (PAN), metropolitan-area network

(MAN), and wide-area network (WAN).

LAN

A local-area network is a computer network that exists at a single site, such as an office building. It can be used to connect a variety of

components, such as computers, printers, and data storage devices. LANs consist of components like switches, access points, routers, firewalls,

and Ethernet cables to tie it all together. Wi-Fi is the most commonly known wireless LAN.

PAN

A personal-area network consists of a network centralized around the devices of a single person in a single location. A PAN could have

computers, phones, video game consoles, or other peripheral devices. They are common inside homes and small office buildings. Bluetooth is the

most commonly known wireless PAN.

MAN

A metropolitan-area network is a computer network that spans across a city, small geographical area, or business or college campus. One

feature that differentiates a MAN from a LAN is its size. A LAN usually consists of a solitary building or area. A MAN can cover several square

miles, depending on the needs of the organization.

Large companies, for example, may use a MAN if they have a spacious campus and need to manage key components, such as HVAC and

electrical systems.

WAN

A wide-area network covers a very large area, like an entire city, state, or country. In fact, the internet is a WAN. Like the internet, a WAN can

contain smaller networks, including LANs or MANs. Cellular services are the most commonly known wireless WANs.

Topic 5: The Components of a Wireless Network

Several components make up a wireless network’s topology:

1. Clients: What we tend to think of as the end user devices are typically called ‘clients’. As the reach of Wi-Fi has expanded, a variety of

devices may be using Wi-Fi to connect the network, including phones, tablets, laptops, desktops, and more. This gives users the ability to

move about the area without sacrificing their bridge to the network.

2. Access Point (AP): An access point (AP) consists of a Wi-Fi that is advertising a network name (known as a Service Set Identifier, or

SSID). Users who connect to this network will typically find their traffic bridged to local-area network (LAN) wired network (like Ethernet)

for communication to the larger network or even the internet.

Wi-Fi Network Standards

 802.11a
This original amendment added support for the 5 GHz band, allowing transmission up to 54 megabits of data per second. The 802.11a

standard makes use of orthogonal frequency-division multiplexing (OFDM). It splits the radio signal into sub-signals before they get to a receiver.

802.11a is an older standard and has been largely replaced by newer technology.

 802.11b

802.11b added faster rates in the 2.4GHz band to the original standard. It can pass up to 11 megabits of data in a second. It uses

complementary code keying (CCK) modulation to achieve better speeds. 802.11b is an older standard and has been largely replaced by newer

technology.

 802.11g

802.11g standardized the use of OFDM technology used in 802.11a in the 2.4GHz band. It was backwards compatible with both 802.11 and

802.11b. 802.11g is an older standard and has been largely replaced by newer technology.

 802.11n

Once the most popular standard 802.11n was the first time a unified specification covered both the 2.4GHz and 5GHz bands. This protocol

offers better speed when compared to those that came before it by leveraging the idea of transmitting using multiple antennas simultaneously

(usually called Multiple In Multiple Out or MIMO technology). 802.11n is an older standard, but some older devices may still be found in use.

 802.11ac

802.11ac was only specified for the 5GHz band. It built upon the mechanisms introduced in 802.11n. While not as revolutionary as 802.11n

was, it still extended speeds and capabilities in the 5GHz band. Most devices currently out in the wild are likely 802.11ac devices.

802.11ac technology was released in two main groups, usually called ‘waves’. The primary difference is that Wave 2 devices have a few more

technical capabilities when compared to Wave 1, but it is all interoperable.

Advantages and disadvantages of Wireless Communication

Advantages:

1. Freedom from wires:

Can be configured with the use of any physical connection.

2. Easy to setup:

Wireless network is easy to expand and setup.

3. Better or global coverage:

It provides global reach by providing networking in places such as rural areas, battlefield, etc… where wiring is not feasible.

4. Flexibility:

Wireless network is more flexible and adaptable compared to wired network.

5. Cost-effectiveness:

Since it is easy to install and doesn’t require cables, wireless network is relatively cheaper.

6. Mobile and portable:

Wireless network is easy to carry and re-install in another place.

Disadvantages:

1. As communication is done through open space, it is less secure.

2. Unreliability
3. More open to interference.

4. Increased chance of jamming.

5. Transmission speed is comparably less.

Applications of Wireless Communication:

1. Satellite system

2. Television remote control

3. Wi-Fi

4. Paging system

Topic 6: security issues:

Wireless network security issues and threats

Three most common WLAN security threats include:

 denial of service attacks - where the intruder floods the network with messages affecting the availability of the network resources

 spoofing and session hijacking - where the attacker gains access to network data and resources by assuming the identity of a valid

user

 Eavesdropping - where unauthorized third-parties intercept the data being transmitted over the secure network.

 components that are required for wireless communication include

1. wireless NIC - it works within the computer device and provides wireless connectivity

2. Access Point - is a device, such as a wireless router, that allows wireless devices to connect to a network.

3. Routers - is a device that forwards data packets along networks

4. Repeaters - a repeater is an electronic device that receives a signal and re transmits it. Repeaters are used to extend

transmissions e.g. Wifi signals

5. Antennae

You might also like