230 likes | 393 Views
Networking and security. Teaching material accompanying chapter 2.1, 2.2 and 2.3 of Enterprise Knowledge Infrastructures. Classification of networks. physical – according to the medium used (fiber, copper, radio, light) structural - according to the topology (ring, bus, star)
E N D
Networking and security Teaching material accompanying chapter 2.1, 2.2 and 2.3 of Enterprise Knowledge Infrastructures
Classification of networks • physical – according to the medium used (fiber, copper, radio, light) • structural - according to the topology (ring, bus, star) • geographic - according to the reach (PAN, LAN, MAN, WAN) • organizational - according to the network owner: public vs. private (Internet, company networks, value added networks) • user driven - according to the user group: Intranet, Extranet, Internet • conceptual - according to the transmission algorithms (ATM, Token Ring, Ethernet) • functional - according to the function/target group: end-user - front-end, server - back-end, network – backbone • performance – according to bandwidth: low (e.g., up to 1 MBit/s), medium (e.g., up to 1 GBit/s), high speed (e.g., > 1 GBit/s) source: Maier, Hädrich, Peinl: Enterprise Knowledge Infrastructures, p. 84
Network topologies I • Peer-to-peer networks: there are separate transmission ways between data stations; single network nodes receive messages and forward them in case that they are not the final recipient • star network • loop network • tree network • mesh network source: Maier, Hädrich, Peinl: Enterprise Knowledge Infrastructures, p. 87
Network topologies II • Broadcast networks: all nodes are connected to the same physical transmission medium. Each node has access to every message • bus network • ring network source: Maier, Hädrich, Peinl: Enterprise Knowledge Infrastructures, p. 86
Network classes personal area network (PAN) local area network (LAN) metropolitan area network (MAN) wide area network (WAN) the Internet source: Maier, Hädrich, Peinl: Enterprise Knowledge Infrastructures, p. 87
ISO OSI layered architecture source: Maier, Hädrich, Peinl: Enterprise Knowledge Infrastructures, p. 89
Overview of network standards source: Maier, Hädrich, Peinl: Enterprise Knowledge Infrastructures, p. 91
Classification of transmission protocols source: Maier, Hädrich, Peinl: Enterprise Knowledge Infrastructures, p. 99
Concrete network protocols and the OSI model source: Maier, Hädrich, Peinl: Enterprise Knowledge Infrastructures, p. 120
Network packets • A Packet consists of payload and header • Every layer adds an additional header • A packet on a higher layer becomes the payload on the next lower layer source: Maier, Hädrich, Peinl: Enterprise Knowledge Infrastructures, p. 104
Internet layer • IP protocol (IPv4) • IP address = world-wide unique address to identify a network participant (at least unique for public IP addresses) • Length: 32 Bit (4 octets) • Network classes • finer partition with a subnet mask possible since 1985 • reserved addresses for private use: • 0.0.0.0 - 10.255.255.255 (10 class A network ranges) • 172.16.0.0 - 172.31.255.255 (16 class B network ranges) • 192.168.0.0 - 192.168.255.255 (256 class C network ranges) • localhost 127.0.0.1 01000101 00011000 00000011 00010001 binary decimal 141 48 3 17 network mask 255.0.0.0 255.255.0.0 255.255.255.0 possible hosts 16,7 million 65.536 256 Class A 63 48 3 17 Class B 137 48 140 19 Class C 223 150 7 170 network address host address
Address translation • logical address (DNS): e.g., www.wiwi.uni-halle.de • Internet address (IP): e.g., 141.48.204.242 • physical address (MAC): e.g., 00-00-39-4C-46-C9 DNS ARP MAC = Media Access Control, unique identification of a network card consists of 24 Bit manufacturer number and 24 Bit serial number e.g., 08-00-20-AE-FD-7E (or 080020AEFD7E)
Demarcation between Internet, Intranet and Extranet DMZ = DeMilitarized Zone PSTN = Public Switched Telephone Network source: Maier, Hädrich, Peinl: Enterprise Knowledge Infrastructures, p. 120
Requirements for secure communication • confidentialityMessage is not accessible for third persons • authenticitySender of a message is uniquely identifiable • integrityMessage has not been changed on its way to the receiver • liabilitySender cannot deny authorship of the message,receiver cannot deny receipt of the message
Potential security threats • Data loss: important data was intentionally deleted or lost by accident • Data manipulation: intentionally falsifying documents, e.g., balance sheets or software code • Unauthorized access: business secrets get into the hands of third parties • Abuse of ressources: hard- or software of a company gets used for improper purposes, e.g., using the company Internet access to download private music files • Downtime: infrastructural services that are needed permanently are not available so that financial (e.g., by loosing productive work time) or image damage occurs (e.g., through unavailability of the Web site) • Concrete attacks: e.g., denial-of-service, viruses, spam source: Maier, Hädrich, Peinl: Enterprise Knowledge Infrastructures, p. 127ff
Conceptual comparison of PPTP and IP Sec source: Maier, Hädrich, Peinl: Enterprise Knowledge Infrastructures, p. 133ff
Example of asymmetric encryption Alice (sender) Bob (receiver) message is unchanged and sent by Alice message message signature private key Alice comparison public key Alice message message decryption encryption private key Bob public key Bob transmission insecure transmission channel 0&§(1§/=1 0&§(1§/=1
Example: tasks of a certification authority (CA) revocation list - …………. - …………. certification authority 1 apply for a certificate 8 verify certificate 2 issue certificate Bob (receiver) Alice (sender) 3a put private key into a safe place (key store) 3b put public key on home page certificate is valid and not revoked 6 download certificate HP message is unchanged and sent by Alice 7 verify signature 4 write and sign the message 5 send message
Message- and channel-encryption • To guarantee secure transmission of a message either the message itself or the transmission channel can be encrypted • Message encryption with PGP: • Pretty Good Privacy (PGP) is a software program used to encrypt emails • Since emails are transmitted over several relay stations without establishing an end-to-end connection from sender to receiver only message encryption is applicable • An asymmetric encryption algorithm is used • Channel encryption with SSL: • Secure Sockets Layer (SSL) is used to encrypt e.g., HTTP connections (HTTP + SSL = HTTPS) • HTTPS is used widely in the Internet to secure transaction for online banking and online shopping
Abbreviations A-H • AES: Advanced Encryption Standard • ARP: Address Resolution Protocol • ATM: Asynchronous Transfer Mode • BAN: Body Area Network • DES: Data Encryption Standard • DHCP: Dynamic Host Configuration Protocol • DNS: Domain Name System • DSL: Digital Subscriber Line (symmetric SDSL or asymmetric ADSL) • FDDI: Fiber Distributed Data Interface • FTP: File Transport Protocol • HTML: Hypertext Markup Language • HTTP: Hypertext Transport Protocol
Abbreviations I-N • IMAP: Interactive Mail Access Protocol • IP: Internet Protocol • IPX: Internetwork Packet Exchange • IrDA: Infrared Data Association • ISDN: Integrated Service Digital Network • ISO: International Standardization Organization • LDAP: Lightweight Directory Access Protocol • LPD: Line Printer Demon (UNIX) • MAC: Media Access Control (-Address) • NAT: Network Address Translation • NetBEUI: NetBIOS Extended User Interface • NetBIOS: Network Basic Input/Output System • NIC: Network Interface Card • NLSP: NetWare Link Services Protocol (NW Link) • NNTP: Network News Transfer Protocol
Abbreviations O-S • OSI: Open Systems Interconnection • OSPF: Open Shortest Path First Protocol • PAN: Personal Area Network • POP3: Post Office Protocol version 3 • PPP: Point-to-Point Protocol • PPTP: Point-to-Point Tunneling Protocol • RIP: Routing Information Protocol • RSA: Encryption developed by Rivest, Shamir and Adleman • SGML: Standard Generalized Markup Language • (s)sh: (secure) shell • SMB: Server Message Blocks • SMTP: Simple Mail Transport Protocol • SNMP: Simple Network Management Protocol • SPX: Sequenced Packet Exchange • SSL: Secure Socket Layer
Abbreviations T-Z • TCP: Transport Control Protocol • UDP: User Datagram Protocol • USB: Universal Serial Bus • URL: Uniform Resource Locator • WEP: Wireless Encryption Protocol (for WLAN) • WPA: Wi-Fi Protected Access • WLAN: Wireless LAN • WML: Wireless Markup Language • XML: eXtensible Markup Language