A Need of Information Security for Network Infrastructure



Similar documents
ADSL or Asymmetric Digital Subscriber Line. Backbone. Bandwidth. Bit. Bits Per Second or bps

WAN Technology. Heng Sovannarith

Networks 2. Gabriela Ochoa University of Stirling CSCU9B1 Essential Skills for the Information Age. Content

Local Area Networks (LANs) Blueprint (May 2012 Release)

1 Which network type is a specifically designed configuration of computers and other devices located within a confined area? A Peer-to-peer network

DISASTER RECOVERY AND NETWORK REDUNDANCY WHITE PAPER

Technical Glossary from Frontier

Data Communication Networks and Converged Networks

The OSI and TCP/IP Models. Lesson 2

Data Communication Networks

Overview of Computer Networks

Evolution of telecom network infrastructure for broadcast and interactive applications

Chapter 4 Connecting to the Internet through an ISP

Comprehensive geospatial network management based on MapInfo. Supporting both physical and logical network resource management

Computer Networks CS321

Optimizing Networks for NASPI

Network System Design Lesson Objectives

Network Security 網 路 安 全. Lecture 1 February 20, 2012 洪 國 寶

Institute of Telecom Technology and Management (A Unit of MTNL, Delhi) Shadipur Telephone Exchange Building, Pandav Nagar, New Delhi

Public Network. 1. Relatively long physical distance 2. Requiring a service provider (carrier) Branch Office. Home. Private Network.

COMPUTERS ARE YOUR FUTURE CHAPTER 7 NETWORKS: COMMUNICATING AND SHARING RESOURCES

Lecture 1. Lecture Overview. Intro to Networking. Intro to Networking. Motivation behind Networking. Computer / Data Networks

TL 9000 Product Categories R4.2 vs. Likely NACE Codes

Chapter 5. Data Communication And Internet Technology

IP Networking. Overview. Networks Impact Daily Life. IP Networking - Part 1. How Networks Impact Daily Life. How Networks Impact Daily Life

Network Security. Vorlesung Kommunikation und Netze SS 10 E. Nett

Networking Technology Online Course Outline

FBLA: NETWORKING CONCEPTS. Competency: General Network Terminology and Concepts

Chapter 9A. Network Definition. The Uses of a Network. Network Basics

Draft ITU-T Recommendation X.805 (Formerly X.css), Security architecture for systems providing end-to-end communications

What s a protocol? What s a protocol? A closer look at network structure: What s the Internet? What s the Internet? What s the Internet?

Chapter 1 Instructor Version

3.1 TELECOMMUNICATIONS, NETWORKS AND THE INTERNET

Avancerede Datanet. Ole Brun Madsen Professor Department of Control Engineering University of Aalborg. Infrastruktur

Communication Networks. MAP-TELE 2011/12 José Ruela

Certified Telecommunications & Network Professional (CTNP) Syllabus. Version 1.0

Introduction cont. Some Structure in the Chaos. Packet switching versus circuit switching. Access networks and physical media

Telecommunications, Networks, and Wireless Computing

PLANEAMENTO E GESTÃO DE REDES INFORMÁTICAS COMPUTER NETWORKS PLANNING AND MANAGEMENT

White paper. Reliable and Scalable TETRA networks

Chapter 8: Computer Networking. AIMS The aim of this chapter is to give a brief introduction to computer networking.

Computer Networking Networks

Network Concepts. IT 4823 Information Security Concepts and Administration. The Network Environment. Resilience. Network Topology. Transmission Media

Computer Networks. Definition of LAN. Connection of Network. Key Points of LAN. Lecture 06 Connecting Networks

MANAGEMENT INFORMATION SYSTEMS 8/E

Network Technology CMP-354-TE. TECEP Test Description

8/27/2014. What is a computer network? Introduction. Business Applications (1) Uses of Computer Networks. Business Applications (2)

Page 1 of 7. Computer Networking

Chapter 11: WAN. Abdullah Konak School of Information Sciences and Technology Penn State Berks. Wide Area Networks (WAN)

Chapter 7: Computer Networks, the Internet, and the World Wide Web. Invitation to Computer Science, C++ Version, Third Edition

SBB TELEMACH GROUP ABSOLUT OK DATA CENTER

CCNA 1: Networking Basics. Cisco Networking Academy Program Version 3.0

WANs and Routers. M.Sc. Aleksandra Kanevce M.Sc. Aleksandra Bogojeska

DL TC72 Communication Protocols: HDLC, SDLC, X.25, Frame Relay, ATM

An Introduction to Computer Networking

Schools and Libraries Universal Service Support Mechanism Eligible Services List

Network Design. Yiannos Mylonas

Layered protocol (service) architecture

Introduction to Optical Networks

ISO IEC ( ) INFORMATION SECURITY AUDIT TOOL

Overview of WAN Connections Module 1

Chapter 2 from Tanenbaum - modified. The Physical Layer. Ref: A.S. Tanenbaum, Computer Networks, 4 th Ed., Prentice-Hall, 2003, ISBN:

TAXONOMY OF TELECOM TERMS

November Defining the Value of MPLS VPNs

Networks. Connecting Computers. Measures for connection speed. Ethernet. Collision detection. Ethernet protocol

Overview. Securing TCP/IP. Introduction to TCP/IP (cont d) Introduction to TCP/IP

Current access technologies overview

Local Area Network. OSI Seven Layer Model. Whole Building Network

Are you getting the speed that you pay for? Understanding Internet Speeds

WAN. Introduction. Services used by WAN. Circuit Switched Services. Architecture of Switch Services

CSE 3461 / 5461: Computer Networking & Internet Technologies

1.264 Lecture 37. Telecom: Enterprise networks, VPN

11/22/

Computer Networks - Xarxes de Computadors

Think! Think! Data communications. Long-Distance. Modems: to analog and back. Transmission Media. The last mile is the hardest for digital information

A General Glossary of Telecommunications Terminology

Intranet Security Solution

YOUR WHOLESALE PARTNER IN PORTUGAL

Cabling LANs and WANs

Annex D: Technological developments

This course has been retired. View the schedule of current <a href=

Residential Broadband: Technologies for High-Speed Access To Homes

Data Communication Networks Introduction

R2. The word protocol is often used to describe diplomatic relations. How does Wikipedia describe diplomatic protocol?

ICTNPL5071A Develop planning strategies for core network design

Mobility and cellular networks

Component 4: Introduction to Information and Computer Science

Fundamentals of Network Security Graphic Symbols

The data can be transmitted through a variety of different communications platforms such as:

1.264 Lecture 34. Telecom: Connecting wired LAN, WAN. Next class: Green chapter 17. Exercise due before class

By: Mohsen Aminifar Fall 2014

Overview of Communication Network Evolution

TELECOMMUNICATION SYSTEM HAZARD MITIGATION STRATEGIC PLANNING

ICTTEN6172A Design and configure an IP- MPLS network with virtual private network tunnelling

Outline. CSc 466/566. Computer Security. 18 : Network Security Introduction. Network Topology. Network Topology. Christian Collberg

Exploration on Security System Structure of Smart Campus Based on Cloud Computing. Wei Zhou

UTMB INFORMATION RESOURCES PRACTICE STANDARD

Transcription:

A Need of Information Security for Network Infrastructure June 4, 2008 YUKINO Kunio JICA Expert (ICT Planning) In NiDA (National ICT Development Agency) Phnompenh, Cambodia

What is Telecommunication Network Telecommunication Network=Links + Node Link Node Node Link User User Node Link LAN User Node (User) Backbone network : Nodes to Nodes Access network : Node to Users Network Infrastructure & Security 2

OSI and Network Infrastructure OSI (Open System Interconnection Basic Reference Model): Design policy of data network architecture between different types of computers Host layers Data Unit Data Segment Datagram OSI Reference Model Layer 7.Application 6.Presentation 5.Session 4.Transport Function Network process to application Data representation and encryption Interhost communication End to end connections and reliability (TCP) Network infrastructure: Network infrastructure is indicated as media layers of the right table. However, it is also referred to as physical layers for transmission in a limited sense. Media layers Packet Frame Bit 3.Network 2.Data link 1.Physical Patch determination and logical addressing Physical addressing (MAC & LLC) Media, signal and binary transmission Network Infrastructure & Security 3

Category of Network Public Network (Optical Fiber, Microwave, Satellite, etc) ISP The Internet LAN Private Network (Leased circuits, IP-VPN,etc) ISP or Telecom Carrier Network Infrastructure & Security 4

Classification of Network Classification Service Function Technology Description of system Public telephone, Data communication, Facsimile service, Computer communication, Personal computer communication, Mobile phone Public Switched Telephone Network (PSTN), Packet switched network, Leased lines Analogue network, Digital network, SDH network, Satellite communication, IP packet network Various Kinds of Network NGN (New Generation Network) Network Infrastructure & Security 5

Backbone and Access Network Backbone :between Node and Node Metallic cable Optical fiber cable (ATM, DWDM, CWDM) Microwave radio system Satellite communication system Access Line :between Node and User Metallic cable (Voice, ISDN, ADSL) Optical Fiber Cable (FTTH, FTTC, FTTB) Wireless Access System (WLL, Wi-Fi, WiMA) Mobile-Phone System (GSMC, 3G CDMA) Network Infrastructure & Security 6

Security Measures for Network Concept of Security Confidentiality : Leakage of information shall be protected to unacceptable party Integrity : Control and maintenance of information shall be kept Availability : Effective use of information shall be kept Physical security measures :Hardware Logical security measures :Computer Security with software Human security measures :Operation & Maintenance (Policy and Manual), :Attention to users/operator Reliability of network infrastructures Network Infrastructure & Security 7

Classification of Risks and Damages Risk Factor External aggression Internal leak of information Disappearance and blocking of Information due to system failure Invalid operation for e-commerce Malware Description DoS (Denial of Service) Unauthorized access Wiretapping and/or leakage System/equipment clash Natural disaster (earthquake, flood, fire) Man-made accident Masquerading, spoofing and/or Phising Server break down, suspension of business Tapping, leak and tampering of information System break down, Virus infection, The Trojan horse (Trojan code), The Internet bots Spilling out information carelessly Information loss Damage Loss of money as result of invalid access Network Infrastructure & Security 8

Security for Network (System and Components) Preparation for stand-by system and components in network Preparation of emergency power source such as fixed engine generator or mobile engine generator Preparation of back-up lines in back-bone network Route diversity (Physical diversity) Cable route and Wireless route (microwave, satellite) Media diversity Use of plural telecom carriers lines Applying both leased circuits and the Internet Fire precautions, quakeproof and staunch structure (floor load) in equipment room/building design Preparation of measures (electric shielding) against electromagnetic induction and/or electrostatic induction to copper cable, components and equipment Network Infrastructure & Security 9

Security of OSP considering Natural Environment OSP (Outside Plant) means network facilities installed outside of telecom buildings such as cable, distribution terminals and cable conduits including antenna and its tower. Enviro. Temperature Sunshine Humidity Rainfall Wind Snow Lightning Briny air Hot spring earthquake Grand sinkage Land slide Rock fall OSP aerial pollution Harmful birds, insects & animals Aerial Cable :strongest :stronger :OK Underground cable : not strong Cable Conduits Antenna tower Measures against damages in natural environment Selection of : Material System Construction Method O & M Network Infrastructure & Security 10

Security and Reliability on OSP Construction Period Proper Design (For example) Avoid power line contact to network Keep a certain distance between aerial cable Proper grounding, whenever needed Proper materials Documentation (As-built drawings, O&M Manual, etc) Site investigation for hidden spots and taking photo evidence Confirmation for completion of work at site and recording results O&M Period Establishment of an O&M team and center Regular patrol Watching and caution to the third parties construction sites O&M measuring and test equipment such as OFC supervisory system Even if outsourcing for O&M, a proprietor should be aware of essential aspects of OSP and O&M work Network Infrastructure & Security 11

Hoping you to understand that network infrastructure (Physical part) is also one of essential aspects in the information security Thank you for working with us today!