Network Security
Network Security
N
Network Administration of operational tasks that help a network to
run smoothly and efficiently.
• Create accurate technical documentation ( • HTTP: Web data transfer; all data in clear
network diagrams, cabling, etc.). text.
• Implement authentication for network • S-HTTP: Secure HTTP with support for
resource access. • Software should be separated from OS files. encryption, signing, MAC authentication.
• Provide troubleshooting support. • Follow Unix-style structure: use bin and lib • HTTPS: Secure HTTP using SSL/TLS; all data
Structuring Software:
for consistency. encrypted.
• Responsible for system setup, • Site-specific software should be stored • SSH: Secure alternative to rsh; encrypts
Application Protocols:
configuration, and maintenance. separately to define responsibility. session and X11 forwarding.
• Full system access (unrestricted). • On-demand Method: inetd listens and starts
• Enforcement measures (e.g., cleanup of Summoning Daemons:
daemon when needed.
temp files).
Root Account: • Can delete critical system files.
• Not all services are suited for on-demand
• Immediate deactivation if weak passwords
• Recovery only possible through backups. startup.
are found.
hapter 1: Introduction to
C
System and Network hapter 3: Host and User
C hapter 5: Application-level
C
Administration Management Services
Central Topic
Chapter 2: System Components Chapter 4: Network-level Services hapter 6:Models, Methods and
c
Tools of Network Administratio
• Refers to both the operating system and all • Datagram is decapsulated.
cooperating computers in a network. At Destination: • Built-in service: CMIS
Definition of “System” in Administration: • Packet is extracted and sent to the
• More precisely: human–computer system = transport layer. • Comprehensive; covers all 7 OSI layers
collaboration between human and computer
to solve a problem or provide a service.
• Transfers packets from source to 1. OSI Management Protocol (CMIP): • Used in LAN/WAN management
destination without altering them.
• No strict definition. • Object-oriented, layered design
• Fragmentation: Splits large packets into
Operating System: • Generally includes the kernel + user utilities. smaller ones for delivery. • SNMP often used in this context
Network Layer Features:
• Considered all bundled programs essential • Routing: Chooses optimal path for packet • Developed by IETF
for system functionality. delivery.
• Initially for Internet component management
• Addressing: Adds source and destination
• Uses the system and infrastructure. addresses to packets. • Widely adopted for WANs and telecom
1. Human: 2. SNMP / Internet Model:
systems
• Often the source of most system issues.
1. Packetizing • Easy to implement
• Devices that run software.
2. Host Computers: Network Layer Services: 2. Routing Network Management Standards:
• Most commonly deployed standard
• Can be fixed or mobile.
hree Main Components of
T 3. Forwarding • International standard by ITU-T
Human–Computer Systems: • Specialized devices for traffic management.
• Designed for telecom network management
• Encapsulates data from upper layers into a . TMN (Telecommunications Management
3
• Direct internet traffic.
network layer packet. Network):
• Routers: • Based on OSI framework
• Operate at IP level (Layer 3 of OSI).
• Adds header (with source & destination
• At source: • Covers both network and administrative
3. Network Hardware: addresses, and other info).
• Manage local network traffic (LAN). management
• Switches:
• Sends packet to data link layer.
• Operate at Ethernet level (Layer 2). • Adopted globally via IEEE
• Receives packet from data link layer.
• Connect devices physically. • Focuses on LAN/MAN management
• Cables: 4. IEEE LAN/MAN Model:
1. Packetizing: • At destination: • Decapsulates it.
• Examples: Fiber optic, twisted pair, etc. • Strongly based on OSI
• Delivers the payload to the appropriate
upper layer protocol. • Concerned with OSI layers 1 & 2
1. Configuration
• Managed
Organization Model: • Objects can be:
• Unmanaged
Three-tier Model:
• Manager ↔Agent/Manager ↔ Agent ↔
Managed Objects