tailieunhanh - TCP/IP from a Security Standpoint

You don’t have to know all of the details You do need to know your system What services it is providing What protocols are involved What vulnerabilities is has How to minimize the risks | TCP/IP from a Security Standpoint CS-480b Dick Steflik TCP/IP Guru-ism You don’t have to know all of the details You do need to know your system What services it is providing What protocols are involved What vulnerabilities is has How to minimize the risks Why TCP/IP ? Packet based Provides decentralized control Devices are peers Its routable Independent of transmission medium Open standard Free Robust Flexible Pragmatic Physical Layer Three major categories based on connection behavior Dial-up temporary point-to-point WAN and MAN premanent point-to-point LAN two or more devices communicating over a shared broadcast media Dial-up Dial-up (and modems) Temporarily connected point-to-point uses telephone infrastructure audio frequency modems vulnerabilities Cannot provide physical security along entire communications path Cables are usually run through public infrastructure making physical security almost impossible Peel back the insulation on the wire and connect alligator clips Telephone connection panel in basements of buildings Easy to just clip on to the connections Punch panels Screw terminal connections WAN and MAN WAN and MAN Constantly connected point-to-point uses telephone backbone, microwave, radio, fiber optic dedicated digital leased lines specially conditioned telephone lines (guaranteed quality) 56Kbps - Gbps T1 - 56Kbps T2 - Mbps T3 Mbps OC1 Mbps OC48 - 2488 Mbps OC192 - Gbps CSU/DSU - Carrier Set Unit / Data Set Unit (connection device) can be routed like a layer 3 protocol WAN and MAN (more) Vulnerabilities Because much is done using radio and microwave links interception by a third party is pretty easy (especially radio), laser communication is harder to intercept but is overall less reliable due to environmental issues Remedy Encrypt the data before placing it on an unsecured links like radio, microwave laser LAN Two or more network devices communicating over a shared broadcast media local area, shared communications | TCP/IP from a Security Standpoint CS-480b Dick Steflik TCP/IP Guru-ism You don’t have to know all of the details You do need to know your system What services it is providing What protocols are involved What vulnerabilities is has How to minimize the risks Why TCP/IP ? Packet based Provides decentralized control Devices are peers Its routable Independent of transmission medium Open standard Free Robust Flexible Pragmatic Physical Layer Three major categories based on connection behavior Dial-up temporary point-to-point WAN and MAN premanent point-to-point LAN two or more devices communicating over a shared broadcast media Dial-up Dial-up (and modems) Temporarily connected point-to-point uses telephone infrastructure audio frequency modems vulnerabilities Cannot provide physical security along entire communications path Cables are usually run through public infrastructure making physical security almost impossible Peel back the insulation on the wire and connect alligator clips .

TỪ KHÓA LIÊN QUAN
TÀI LIỆU MỚI ĐĂNG
crossorigin="anonymous">
Đã phát hiện trình chặn quảng cáo AdBlock
Trang web này phụ thuộc vào doanh thu từ số lần hiển thị quảng cáo để tồn tại. Vui lòng tắt trình chặn quảng cáo của bạn hoặc tạm dừng tính năng chặn quảng cáo cho trang web này.