Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
Assignment 1 – 2010-11
2).
• To view a web site or a web page in a browser, you would either type in the URL or click on a
link and hit the Go button.
• Now, the page you have asked the browser to display would probably be located on a Server
computer far far away.
• The web browser program sends a request to a web server program running on the remote
computer. Newbies may be baffled here due to similarity of names... the computer on which
the web site is stored is called a Server and it runs a program also called a server .
• The server program, gathers the request from the web browser, tries to hunt for the web page
and then formulates a response.
• This response will differ depending on whether the server program was able to find the
requested web page or web file. Assuming, the server was able to locate the web page, it sends
the HTML file to the web browser. The browser picks up all the information coming in from
the server and does its best to display the web page.
• A typical web page not only has text but also images and these are separate files that need to be
transferred from the server to the browser. So the browser-server communication goes on till
all the files have been transferred to the browser. Once the files arrive at computer, the
browser-server connection is severed - cut - chopped!
Q4).
1. Adopt a risk management methodology – ou can't know what to protect and how much to
spend if you don't know what assets are at risk.
2. Layer your security measures – Complement firewalls with host and application security.
3. Compartmentalize your network and data –
4. Implement stronger authentication – Authentication is the enabler of all security,
5. Implement admission and endpoint controls – Only allow devices that pass admission criteria
to connect to our network.
6. Improve the granularity of your access controls –
7. Develop a secure software methodology – Secure code review and testing are as important to
Web applications as operating systems.
8. Be proactive with security – Routinely scan networks, servers and clients.
9. Develop an "attack anticipation" mentality – Prevention is better than detection.
10. Ensure information integrity, privacy, availability –
-------------------------------------
The OSI network management model categorizes five areas of function, sometimes referred to as the
FCAPS model:
[edit] Fault
The goal of fault management is to recognize, isolate, correct and log faults that occur in the
network.
Errors primarily occur in the areas of fault management and configuration management.
Fault management is concerned with detecting network faults, logging this information, contacting
the appropriate person, and ultimately fixing a problem. A common fault management technique is to
implement an SNMP-based network management system - such as HP OpenView or Sun Solstice
(formerly Net Manager) - to collect information about network devices. In turn, the management
station can be configured to make a network administrator aware of problems (by email, paging, or
on-screen messages), allowing appropriate action to be taken.
[edit] Configuration
[edit] Accounting
The goal is to gather usage statistics for users. Accounting management is concerned with tracking
network utilization information, such that individual users, departments, or business units can be
appropriately billed or charged for accounting purposes. While this may not be applicable to all
companies, in many larger organizations the IT department is considered a cost center that accrues
revenues according to resource utilization by individual departments or business units.
[edit] Performance
The goal is to both prepare the network for the future, as well as to determine the efficiency of the
current network. Performance management is focused on ensuring that network performance
remains at acceptable levels. This area is concerned with gathering regular network performance data
such as network response times, packet loss rates, link utilization, and so forth. This information is
usually gathered through the implementation of an SNMP management system, either actively
monitored, or configured to alert administrators when performance move above or below predefined
thresholds. Actively monitoring current network performance is an important step in identifying
problems before they occur, as part of a proactive network management strategy.....
[edit] Security
The goal of security management is to control access to assets in the network. It uses firewalls to
monitor and control external access points to one's network.Security management is not only
concerned with ensuring that a network environment is secure, but also that gathered security-related
information is analyzed regularly. Security management functions include managing network
authentication, authorization, and auditing, such that both internal and external users only have access
to appropriate network resources. Other common tasks include the configuration and management of
network firewalls, intrusion detection systems, and security policies such as access lists.