Chapter 5

You might also like

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 30

CHAPTER 5

NETWORK ACCESS AND


MANAGEMENT
Chapter Overview
• System Access
– Authentication Mechanisms
– Access Control
• System Management
– Virtual Servers
– Network Storage Systems
• Network Management Concepts
– Firewall
– IP Security
• IPsec Protocols
• Security Association ( SA)
• Encapsulating Security Payload (ESP)
• Authentication Header (AH)
• Key management
• Electronic Communications
5.1 System Access
• System access is described as the ability or
authority to interact with a computer system,
resulting in the transmission of data; a method of
obtaining data from a data source. Authorization
or proper clearance is required for access.
• Hacking or cracking is the act of interacting with a
computer or information system without
authority and it is a crime in many jurisdictions.
5.1.1. Authentication Mechanisms
• Authentication systems allow users to sign in to the
systems in a number of ways to gain access, and yet
they all operate differently.
• The access control mechanism is a process of
validation, which incorporates three common
variables: what you know, what you have, and who
you are.
Password based Authentication
Biometric authentication

Biometric Features
Token-based authentication
Multifactor Authentication
Contextual Authentication
• Contextual signals can be gathered using:
– Web pages used to authenticate
– Mobile devices having MFA.
– Application/Gateways used
– Sensors under user’s proximity
– Networking Hardware
5.1.2. Access Control
• Access control allows the users to log in to an organization's
trusted resources. Identification, authentication,
authorization, and accountability are the processes used to
define an access control system.
• The process of authorization is divided into three segments:
authorization of authentic users, authorization of group
members, and authorization across different systems, and
accountability, which is the act of keeping system logs.
• All successful and unsuccessful logins are recorded in the
system logs.
5.1.2. Access Control
• Elements of access control strategy:
– Subject verification is checking the user and determining
the permissions given
– User account management is about verification of the
identity known to the system using mechanisms such as
directories, password and other credential management
– Logging and analyzing access control operations to support
non-repudiation, and policy enforcement
Types of access control
• Three main types of access control systems
are:
– Discretionary Access Control (DAC),
– Role Based Access Control (RBAC), and
– Mandatory Access Control (MAC).
5.2 System Management
• Monitoring of the Application.
• Inventory of Assets Keep track of your hardware and software
assets
• Performance Analyses and Log Management
• Network Management and Monitoring
• Monitoring and management of servers, storage, databases,
virtualization, cloud, printers, PCs, and mobile devices are all
part of system administration.
• IT Compliance and Security Management of security
information and events
• Automation
• Management of the Help and Service Desk
5.2.1 Virtual Servers
• Virtualization is important in several areas of
planning:
– To expand business;
– Agile deployment and marketing;
– Standardized;
– Reduced cost and Consolidation efforts; and
– Increased utilization.
5.2.1 Virtual Servers
• A physical server may be subdivided into many virtual servers
in server virtualization.
• A virtual machine monitor, or hypervisor, is housed in a thin
layer of software that is put onto the hardware.
• Server virtualization is a technique of hiding server resources
from consumers.
• The quantity and identity of operating systems, CPUs, and
individual physical servers are some of the examples.
• The practice of separating a physical server into unique and
separated virtual servers using an application is known as
server virtualization.
• Each virtual server is capable of running its own operating
system.
Types of Server Virtualization
Virtual Server Management
• Adopting standard methods for virtual servers across
infrastructure
• Configuring policies to match network cybersecurity
and permissions posture
• Ability to monitor tools to assess performance and
health
• Having a backup and disaster recovery strategy in
place for handling data
5.2.1. Network Storage Systems

network-attached storage
NAS Protocols
• Common Internet File Services / Server
Message Block (CIFS/SMB). This is the protocol
that Windows usually uses.
• Network File System (NFS). NFS was first
developed for use with UNIX servers and is
also a common Linux protocol.
SAN Protocols
• Fibre Channel Protocol (FCP)
• Internet Small Computer System Interface
(iSCSI)
• Fibre Channel over Ethernet (FCoE)
• Non-Volatile Memory Express over Fibre
Channel (FC-NVMe)
SAN vs. NAS
• Both SAN and network-attached storage (NAS) are methods of
managing storage centrally and sharing that storage with
multiple hosts (servers).
• NAS is Ethernet-based, while SAN can use Ethernet and Fibre
Channel.
• SAN focuses on high performance and low latency, NAS
focuses on ease of use, manageability, scalability, and lower
total cost of ownership (TCO).
• Unlike SAN, NAS storage controllers partition the storage and
then own the file system.
• Effectively this makes a NAS server look like a Windows or
UNIX/Linux server to the server consuming the storage.
NAS Gateway
NAS File Systems
Network-Attached Secure Disks
• The sequence of a file access from the client to the discs:
– The client authenticates itself with the file management and requests
file access.
– If the client is authorized access to the file requested, the client is
given the network location and capabilities of NASD discs.
– If the client is accessing the disc for the first time, it is given a time-
limited key that allows secure connection with the disc to be
established.
– Using an independent channel, the file manager notifies the
corresponding disc.
– The client now has direct access to the NASD discs by granting the
capability, and all further data transfers are routed across the network,
bypassing the file manager.
5.3. Network Management Concepts
• Network management encompasses the entire
network process and monitoring in the event of a
problem at work, as well as serving as a handy tool
for administrators to obtain a thorough report on the
system's performance and network utilization.
– Fault management
– Configuration management
– Performance monitoring
– Security management
– Data logging and report
5.3.1. Firewall
• A firewall is a device used in network security to
monitor incoming and outgoing network traffic
and determine whether to allow or block it
based on a predetermined set of security rules.
– packet filtering firewall
– circuit-level gateway
– application-level gateway (aka proxy firewall)
– stateful inspection firewall
– next-generation firewall (NGFW)
5.3.2. IP Security
• IPsec (Internet Protocol Security) is a set of protocols
and techniques for safeguarding data sent over a
public network like the internet.
• The IPsec protocols were created by the Internet
Engineering Task Force (IETF) in the mid-1990s to
offer security at the IP layer by authenticating and
encrypting IP network packets.
• Authentication Header (AH) and Encapsulating
Security Payload (ESP) were the first two protocols
introduced by IPsec for safeguarding IP packets (ESP).
Encapsulating Security Payload (ESP) Header
format
AH Header Format
Electronic Communications
• Electronic communication is any form of
communication that's broadcast, transmitted, stored
or viewed using electronic media, such as computers,
phones, email and video.
– Email
– Instant messaging
– Websites and blogs
– SMS/text messaging
– Phone and voicemail
– Video

You might also like