U2.4 LANs, MANs, WANs

Description

Masters Degree Network Security Mind Map on U2.4 LANs, MANs, WANs, created by Craig Parker on 21/04/2014.
Craig Parker
Mind Map by Craig Parker, updated more than 1 year ago More Less
jjanesko
Created by jjanesko almost 10 years ago
Craig Parker
Copied by Craig Parker almost 10 years ago
18
0

Resource summary

U2.4 LANs, MANs, WANs
  1. LAN
    1. security issues
      1. failures on backbone
        1. failures where backbone connects with each workgroup
          1. provides a point of access from a workgroup to the backbone
            1. provides a point of access to all data associated with a workgroup
            2. information flow control
              1. network management
                1. failure to manage leads to
                  1. network operation disruption
                    1. increased effort to identify problems
                      1. longer time to problem resolution
                  2. threats to CIA
                    1. eavesdropping
                      1. data corruption
                        1. backbone loss
                        2. protection measures
                          1. used dedicated switchers per workgroup
                            1. each switch should restrict the flow of data to the backbone
                              1. use firewalls where additional separation needed
                                1. use encryption
                              2. MAN
                                1. metropolitan area network
                                  1. a separate backbone connects the backbones of multiple networks in different buildings
                                  2. campus network
                                    1. additional security issues
                                      1. data travels outside the building
                                        1. non-physical links may need to be considered
                                          1. laser
                                            1. infrared
                                              1. microwave
                                              2. complexity
                                              3. protection measure
                                                1. network information center needed to manage and monitor health
                                              4. WAN
                                                1. threats
                                                  1. general
                                                    1. sensitive items more widely transmitted
                                                      1. network likely to be switched with multiple routes
                                                        1. more unmanned equipment rooms managed remotely
                                                          1. possibility for unauthorized access to network links higher
                                                          2. impact of errors from configuration much larger
                                                            1. variation per medium
                                                              1. fibre
                                                                1. minimal external radiation
                                                                  1. special tapping equipment needed
                                                                    1. taps tend to cause service disruption
                                                                    2. satellite, radio, microwave
                                                                      1. extensive external radiation
                                                                        1. easily available (but special) tapping equipment needed
                                                                          1. tapping does not disrupt service
                                                                            1. carrier MIGHT provide some encryption
                                                                        2. possible security measures
                                                                          1. partition networks, physical separation
                                                                            1. partition networks, logical separation
                                                                              1. achieved with permanent virtual circuits or crypto
                                                                              2. data confidentiality
                                                                                1. network partitioning
                                                                                  1. link encryption (layer 2)
                                                                                    1. end-to-end encryption (layer 4)
                                                                                    2. link encryption
                                                                                      1. for individual links betwee two points
                                                                                      2. Conditions of Connection (COC)
                                                                                        1. user must agree before getting access to network
                                                                                    3. Internet
                                                                                      1. security issues
                                                                                        1. route of sensitive data not guaranteed
                                                                                          1. availability of internet not guaranteed
                                                                                            1. denail of service real
                                                                                              1. any host can probe any other host
                                                                                            Show full summary Hide full summary

                                                                                            Similar

                                                                                            CCNA Security 210-260 IINS - Exam 1
                                                                                            Mike M
                                                                                            CCNA Security 210-260 IINS - Exam 2
                                                                                            Mike M
                                                                                            SY0-401 Part 1 (50 questions)
                                                                                            desideri
                                                                                            CCNA Security 210-260 IINS - Exam 1
                                                                                            Ricardo Nuñez
                                                                                            CCNA Security 210-260 IINS - Exam 3
                                                                                            irvin pastora
                                                                                            1.3 Network and Security Components
                                                                                            DJ Perrone
                                                                                            U1. OSI 7 Layer Reference Model
                                                                                            Craig Parker
                                                                                            Types of Attacks
                                                                                            River L.
                                                                                            CCNA Security 210-260 IINS - Exam 1
                                                                                            irvin pastora
                                                                                            Network Security Vocabulary
                                                                                            Shantal K Green
                                                                                            CCNA Security 210-260 IINS - Exam 2
                                                                                            irvin pastora