Sei sulla pagina 1di 24

ISOL 532

Telecommunications and Network Security

Week 1: Introduction to Network


Security
Agenda
Introduction
My background
My goals for you
Syllabus Review
Network Security Basics
Syllabus Review
Course Description
Course Objectives
Course Structure
Materials
Evaluation and Grading
Course Expectations
Tentative Course Outline
Course Description
Various network security-related issues are introduced
and examined. Different types of VPNs for securing data
in an organizational setup are discussed as well as the
benefits and architecture of a VPN and how to
implement a VPN.
Other topics include the utility of firewalls in tackling
security problems and the limitations of a firewall. In
addition, instruction is also given on how to construct,
configure, and administer a firewall and the
functionality of a firewall.
Course Objectives and Structure
Course Objectives
Listed in syllabus
Course Structure
Watch weekly lecture
Participate in class discussion via iLearn forums
Reading assigned texts
Complete quizzes based on assigned reading and lecture
Complete cases based upon a given scenario
Complete homework assignments from the text and
other sources
Course Materials

Textbook(s) Required:
Stewart, James M. Network Security, Firewalls,
and VPNs, 2nd ed. Burlington, MA: Jones &
Bartlett, 2014
Virtual Labs
Other books, professional links & journals
Evaluation and Grading

Exams (2)- 40% (Midterm and Final are 20% each).


Labs - 10%
Homework - 8%
Class discussion - 2%
Residency Day Project - 40% (Written 25%,
Presentation 15%)
Assignment Information
Masters level course expected
APA format is required
Deadlines and Due Dates
Most work with the exceptions being Exams and the
Residency Weekend Project will be assigned 2 weeks
before the due date
With the two week window, there is no reason why
the assignments cannot be completed by the due date
Residency Weekend Attendance Mandatory
Friday September 29th Sunday October 1st
Course Expectations

Class Participation
Students are expected to:
1. Be fully prepared for each class session by studying the
assigned reading material and preparation of the material
assigned.
2. Participate in group discussions, assignments, and panel
discussions.
3. Complete specific assignments when due and in a
professional manner.
4. Take exams when specified on the attached course
schedule
Course Expectations

Academic Integrity
At a Christian liberal arts University committed to the pursuit of truth and
understanding, any act of academic dishonesty is especially distressing and cannot be
tolerated. In general, academic dishonesty involves the abuse and misuse of
information or people to gain an undeserved academic advantage or evaluation. The
common forms of academic dishonesty include:
cheating - using deception in the taking of tests or the preparation of written work, using
unauthorized materials, copying another persons work with or without consent, or assisting
another in such activities
lyingfalsifying, fabricating, or forging information in either written, spoken, or video
presentations
plagiarismusing the published writings, data, interpretations, or ideas of another without
proper documentation

Episodes of academic dishonesty are reported to the Vice President for Academic
Affairs. The potential penalty for academic dishonesty includes a failing grade on a
particular assignment, a failing grade for the entire course, or charges against the
student with the appropriate disciplinary body.
Graduate International Students
English Help
Office of International Academic Services
These services are specifically designed and run to help international
students improve their writing (essays, research, projects, etc.) and can
also be used to improve reading, listening and speaking skills. Most
importantly, our tutoring services are very easy to access because they
are open to graduate students ONLINE.
Online tutoring help on Blackboard, on the home page under
Organizations.
In a recent on-campus survey, our international students noted that our
services helped them improve their grades, and would recommend our
help to others.
Resources:
Sarah Hammond (sarah.hammond@ucumberlands.edu)
Julie Deyrup - Director, International Academic Services
(julie.deyrup@ucumberlands.edu)
Plagiarism
All of the following are considered plagiarism:
turning in someone else's work as your own
copying words or ideas from someone else without giving credit
failing to put a quotation in quotation marks
giving incorrect information about the source of a quotation
changing words but copying the sentence structure of a source
without giving credit
copying so many words or ideas from a source that it makes up
the majority of your work, whether you give credit or not
Most cases of plagiarism can be avoided, however, by citing
sources. Simply acknowledging that certain material has been
borrowed and providing your audience with the information
necessary to find that source is usually enough to prevent
plagiarism.
SafeAssign
Pulls from a large number of sources, including all
submitted writings both past and present classes
Highlights sources with only a few or no words
changed
Considers usage on another paper the highest priority
when isolating/identifying plagiarism
If SafeAssign flags it pulled almost directly from other
sources, the grade will be a 0
Following slides are taken directly from
http://www.plagiarism.org/plagiarism-101/what-
is-plagiarism (with some formatting changes)
Terms
OSI Model: Open Systems Interconnect network
Model
TCP Model Model similar to OSI, but older and
less complex
Scanners: Commercial or freeware software tools
used to scan against a system to determine
open ports where data can be transmitted and
received through, which could be a vulnerability
that allows an attacker to exploit
Network Tap: Devices used to collect data flows
through a network for monitoring purposes
Network Entities (AKA: the 7 domains of a
typical IT infrastructure) pages 9 - 21
Workgroups
SOHO networks
Client/Server networks
LAN (Local Area Network)
WAN (Wide Area Network)
Thin Clients/Remote Desktop
Remote Control, Remote Access and VPN
Boundary Network (DMZ, Extranet, Honeynet)
Networking: Things to Consider
Redundancy
Single Point of Failure
Chokepoints
Access Controls
Budget
The Information Security Triad
Primary goals of Information Security
Security Objectives
Confidentiality
Protection against unauthorized access while
providing authorized users access to resources
Integrity
Protection against unauthorized changes while
allowing authorized changes to be made by
authorized users
Availability
Protection against downtime, loss of data and blocked
access while providing consistent uptime, protecting
data and supported authorized access to resources
Basic Functions of Telecommunications
and Network Security
Message protection Telecommunications
security is focused on the protection of data in
transport
Non-repudiaton Is the assurance that a specific
author actually did create and send a specific
item to a specific recipient, and that it was
successfully received
Redundancy Is very important if systems are to
remain highly available
Defense-in-depth Series of hurdles
Collection of Controls
Any one of these alone has its vulnerabilities
and can be circumvented
When taken together as a holistic system,
however, breaking in becomes much more
difficult and requires significantly greater
resources
Network-based Attacks
Attackers may be motivated by profit or gain, recognition (ego),
revenge, etc.
Active attacks change or damage systems; they exploit
vulnerabilities, infiltrate networks, launch malicious code, or deny
service
Passive attacks wiretap or eavesdrop on data flows using spyware
Attacks such as man-in-the-middle attacks intercept data streams
Network as a channel for attacks
Network as the target of attack
Denial of Service (DoS) attack
Distributed Denial of Service (DDoS) attack
Network Security and Risks
Network attacks
Attack trees
Path of least resistance
Attack Steps
Target Acquisition
(discovery)

Target Analysis
(enumeration)

Target Access
(vulnerability mapping)

Target Appropriation
(exploitation)
This Week
Read chapters 1, 2, 4 and NIST SP 800-30:
Guide for Conducting Risk Assessments
(http://csrc.nist.gov/publications/PubsSPs.ht
ml) use the latest version
Labs 1, 2 and 3 due Sunday, September 3rd
Discussion board post

Potrebbero piacerti anche