COMPUTER NETWORKS
PREVIEW <ul><li>What is Networking. </li></ul><ul><li>Imp Terms. </li></ul><ul><li>Types of Networks. </li></ul><ul><li>LA...
COMPUTER NETWORK A COLLECTION OF CMPTRS INTER-CONNECTED WITH THE HELP OF A MEDIA (WIRE,OFC,SATL etc..) IN SUCH A WAY THAT ...
ADVANTAGES OF NETWORKING <ul><li>COMN  </li></ul><ul><li>RELATIVE PRICE OF CMPTRS VS COMN. </li></ul><ul><li>SHARING OF IN...
IMP TERMS <ul><li>Bandwidth . The amount of data that can be transmitted in a fixed amount of time.  </li></ul><ul><li>Bro...
IMP TERMS <ul><li>Domain .  A gp of networked computer that share a single Security Accounts Manager (SAM).  </li></ul><ul...
<ul><li>Protocol .   A predefined set of rules that dictates how cmptrs or devices communicate and exchange data on the ne...
<ul><li>Gateway .   The hardware and software needed to connect two separate network environment so that comn can occur. <...
<ul><li>Ping.   A TCP/IP utility used to test whether another host is reachable.  An request is sent to the host, who resp...
TYPES OF NETWORKS <ul><li>SERVER BASED  (SERVER TO CLIENT)   Contain clients and the servers that support them. </li></ul>...
WINDOWS NETWORK OS <ul><li>Windows NT(New Technology) </li></ul><ul><li>Windows 2000 Server </li></ul><ul><li>Windows 2000...
CLIENT-SERVER <ul><li>FILE SERVER </li></ul><ul><li>CLIENTS </li></ul><ul><li>NETWK OS IN FILE SERVER. </li></ul><ul><li>C...
CLIENT-SERVER <ul><li>Advantages </li></ul><ul><li>Strong central security. </li></ul><ul><li>Central file storage. </li><...
PEER TO PEER <ul><li>NO NETWK OS. EACH MACHINE HAS OS. </li></ul><ul><li>INDEP MACHINES PHYSICALLY CONNECTED TO EACH OTHER...
PEER TO PEER   <ul><li>Advantages </li></ul><ul><li>No extra investment in server HW and SW reqd. </li></ul><ul><li>Easy s...
HYBRID NETWORKS   <ul><li>Advantages </li></ul><ul><li>Advantages of server  based networking . </li></ul><ul><li>Many of ...
NETWORK COMPUTERS CAN ALSO SHARE  <ul><li>FAX MODEM. </li></ul><ul><li>SCANNERS. </li></ul><ul><li>HDD. </li></ul><ul><li>...
APPLICATIONS OF NETWORKING <ul><li>E MAIL </li></ul><ul><li>E CHAT </li></ul><ul><li>VIDEO CONFERENCE </li></ul><ul><li>FI...
PRE-REQUISITES <ul><li>CONNECTIVITY (HW) </li></ul><ul><li>SW  </li></ul>
TYPES OF CMPTR NETWKS  BASED ON TRANSMISSION TECHNOLOGY <ul><li>BROADCAST  NETWORKS </li></ul><ul><li>PT-TO-PT  NETWORKS <...
BROADCAST NETWORKS <ul><li>SINGLE COMN CH SHARED BY ALL CMPTRS ON NW. </li></ul><ul><li>PACKETS SEND BY ONE CMPTR RECEIVED...
PT TO PT  NETWORKS <ul><li>MANY CONNECTIONS BETWEEN INDL PAIRS OF CMPTRS. </li></ul><ul><li>PACKETS VISIT ONE OR MORE INTE...
TYPES OF COMPUTER NETWKS BASED ON GEOGRAPHICAL SPREAD <ul><li>LAN </li></ul><ul><li>MAN </li></ul><ul><li>WAN </li></ul><u...
LOCAL AREA NETWORKS <ul><li>PRIVATELY OWNED. </li></ul><ul><li>WITHIN SAME BLDG/ CAMPUS – UPTO A FEW KMs. </li></ul><ul><l...
METROPOLITAN AREA NETWORKS <ul><li>BIGGER VERSION OF LAN. </li></ul><ul><li>USES SIMILAR TECH AS LAN. </li></ul><ul><li>MA...
WIDE AREA NETWORKS <ul><li>SPANS LARGER GEOGRAPHICAL AREA. </li></ul><ul><li>COLLECTION OF CMPTRS RUNNING APPLICATION PROG...
INTER-NETWORKS <ul><li>CONNECTING DIFFERENT NETWORKS WITH DIFFERING TOPOLOGIES / INCOMPATIBILITIES </li></ul><ul><li>CONNE...
WIRELESS NETWORKS <ul><li>LOW SPEEDS 1-2 Mbps </li></ul><ul><li>HIGH ERROR RATES </li></ul><ul><li>LIABLE TO INTERFERENCE ...
LAN TOPOLOGIES <ul><li>TOPOLOGY THE GEOMETRIC ARRANGEMENT OF DEVICES IN A NETWORK. </li></ul><ul><li>TYPES OF TOPOLOGIES <...
LAN – STAR TOPOLOGY
LAN – RING TOPOLOGY
LAN – BUS TOPOLOGY
LAN – HYBRID TOPOLOGY
DESIGNING: UNIT LEVEL LAN
DESIGN OF A LAN <ul><li>NETWORK PLG  – NO OF CLIENTS, FUTURE GROWTH, NW COMPONENTS, NO OF SERVERS, TYPE OF CABLING. </li><...
<ul><li>DESIGNATE SYS ADMINISTRATOR. </li></ul><ul><li>KEEP RECORD OF  –  </li></ul><ul><ul><li>SERVER CONFIG </li></ul></...
SUGGESTED LAYOUT OF UNIT LAN SERVER ADJT QM 2IC CO DOCU  CELL PAY & ALLCES CELL D COY A COY B COY C COY G BR PRI  Q BR A BR
CYBER SECURITY
INFO SECURITY
GUIDING PRINCIPLE <ul><li>Cyber Security in Army is based on the guiding principle that the person who is generating info ...
INFO ASSETS <ul><li>Hardware </li></ul><ul><li>Software </li></ul><ul><li>Documentation </li></ul><ul><li>Information </li...
<ul><li>MOST SECURITY BREACHES OCCUR DUE TO : - </li></ul><ul><ul><li>POOR PASSWORD MGMT. </li></ul></ul><ul><ul><li>NON A...
 
LIKELY BREACHES <ul><li>PERSONAL SECURITY </li></ul><ul><li>PHYSICAL SECURITY  </li></ul><ul><li>HARDWARE SECURITY </li></...
PERSONAL SECURITY <ul><li>ALLOW ACCESS TO ONLY AUTH & TRAINED PERS. </li></ul><ul><li>TRG CAPSULES. </li></ul><ul><li>RECO...
 
PHYSICAL SECURITY <ul><li>OLD FASHIONED LOCK & KEY. </li></ul><ul><li>EACH CMPTR, PRINTER, PERIPHERAL IS RESP OF INDL OFFR...
HARDWARE SECURITY (Protection against crashes/breakdown) <ul><li>LOGICAL PARTITIONS. </li></ul><ul><li>BACKUP DATA (PC/SER...
 
SOFTWARE SECURITY <ul><li>ONLY LICENSED SW. </li></ul><ul><li>LATEST SOFTWARE PATCHES. </li></ul><ul><li>REVIEW DEFAULT SE...
 
DATABASE SECURITY <ul><li>DATA HIGHER THAN RESTD’ NOT TO BE HOSTED ON SERVER. </li></ul><ul><li>SERVER / NAS PASSWORD  - S...
MGMT OF REMOVABLE MEDIA <ul><li>EXTERNAL MARKING. </li></ul><ul><li>LOCK & KEY. </li></ul><ul><li>INCOMING /OUTGOING MEDIA...
NETWORK SECURITY <ul><li>IP addresses. </li></ul><ul><li>Remote Login. </li></ul><ul><li>Perimeter  Defence. </li></ul>
PROCEDURAL SECURITY MSR <ul><li>LAN / SYS ADMINISTRATOR. </li></ul><ul><li>SECURITY ADMINISTRATOR. </li></ul><ul><li>NETWO...
 
SECURITY OF CL DOCU <ul><li>Top Secret/Secret/Confd docu . </li></ul><ul><ul><li>Holding in Electronic from. </li></ul></u...
 
SECURITY WHILE USING ARMY INTERNET <ul><li>DIAL UP ACCESS NOT PERMITTED. </li></ul><ul><li>ONLY UNCLAS INFO TO BE TRANSMIT...
NEVER CONNECT THE INTERNET PC TO YOUR OFFICE LAN OR ARMY INTRANET
SECURITY MSR WHILE USING INTERNET <ul><li>ONLY STAND ALONE PC TO BE USED. </li></ul><ul><li>HDD NOT TO HAVE OFFICIAL DATA....
<ul><li>PERIPHERALS ON INTERNET NOT TO BE SHARED FOR OFFICIAL WK. </li></ul><ul><li>MAINT USAGE REGISTER IN INTERNET LAB. ...
VIRUS PROTECTION <ul><li>REGULAR CHECK OF HDD. </li></ul><ul><li>USE ONLY LEGAL SOFTWARE. </li></ul><ul><li>RUN AV SOFTWAR...
 
REPAIR & MAINT <ul><li>AS FAR AS POSSIBLE, IN-SITU REPAIRS. </li></ul><ul><li>STN WKSP RESP FOR REPAIRS AFTER WARRANTY. RE...
THANK YOU
Upcoming SlideShare
Loading in...5
×

COMPUTER NETWORKS

1,122

Published on

COMPTER NEWROKS WITH LAN & WAN

Published in: Technology
0 Comments
3 Likes
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total Views
1,122
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
163
Comments
0
Likes
3
Embeds 0
No embeds

No notes for slide
  • This module covers the very basics of internetworking. We’ll start with a little history that describes how the networking industry evolved. We’ll then move on to a section that describes how a LAN is built: essentially the necessary components (like NIC cards and cables). We then cover LAN topologies. And finally we’ll discuss the key networking devices: hubs, bridges, switches, and routers. This module is an overview only. It will familiarize you with much of the vocabulary you hear with regards to networking. Some of these concepts are covered in more detail in later modules.
  • COMPUTER NETWORKS

    1. 1. COMPUTER NETWORKS
    2. 2. PREVIEW <ul><li>What is Networking. </li></ul><ul><li>Imp Terms. </li></ul><ul><li>Types of Networks. </li></ul><ul><li>LAN/MAN/WAN </li></ul><ul><li>Topologies. </li></ul>
    3. 3. COMPUTER NETWORK A COLLECTION OF CMPTRS INTER-CONNECTED WITH THE HELP OF A MEDIA (WIRE,OFC,SATL etc..) IN SUCH A WAY THAT EXCHANGE OF DATA/INFO TAKES PLACE.
    4. 4. ADVANTAGES OF NETWORKING <ul><li>COMN </li></ul><ul><li>RELATIVE PRICE OF CMPTRS VS COMN. </li></ul><ul><li>SHARING OF INFO </li></ul><ul><li>SHARING OF RESOURCES </li></ul><ul><li>SHARING OF APPLNS/PGMES </li></ul><ul><li>HIGH RELIABILITY. </li></ul><ul><li>IMPROVED COMNS (MAILING). </li></ul><ul><li>WEB SERVICES. </li></ul><ul><li>DATA SERVICES AND MAINT CENTRALIZED </li></ul>
    5. 5. IMP TERMS <ul><li>Bandwidth . The amount of data that can be transmitted in a fixed amount of time. </li></ul><ul><li>Broadband . A type of data transmission in which a single medium (wire) can carry several channels at once. Cable TV, for example, uses broadband transmission. </li></ul>
    6. 6. IMP TERMS <ul><li>Domain . A gp of networked computer that share a single Security Accounts Manager (SAM). </li></ul><ul><li>Fiber Optic . A type of network cable that uses a central glass or plastic core surrounded by a plastic coating. </li></ul>
    7. 7. <ul><li>Protocol . A predefined set of rules that dictates how cmptrs or devices communicate and exchange data on the network. </li></ul><ul><li>Firewall . A combination of hardware and software that protect a network from attack by hackers that could gain access through public networks, incl the Internet. </li></ul>IMP TERMS
    8. 8. <ul><li>Gateway . The hardware and software needed to connect two separate network environment so that comn can occur. </li></ul><ul><li>TCP/IP (Txn Control Protocol/Internet Protocol) Address An address used by the Internet Protocol that identifies the device's loc on the network. </li></ul>IMP TERMS
    9. 9. <ul><li>Ping. A TCP/IP utility used to test whether another host is reachable. An request is sent to the host, who responds with a reply if it is reachable. The request timed out if the host is not reachable. </li></ul><ul><li>Server. A computer that provides resources to the clients on the network. </li></ul>IMP TERMS
    10. 10. TYPES OF NETWORKS <ul><li>SERVER BASED (SERVER TO CLIENT) Contain clients and the servers that support them. </li></ul><ul><li>PEER TO PEER Has no server and uses the network to share resources among indep peers. </li></ul><ul><li>HYBRID NETWORK . A client–server network that also has peers sharing resources. Most net works are actually hybrid networks . </li></ul>
    11. 11. WINDOWS NETWORK OS <ul><li>Windows NT(New Technology) </li></ul><ul><li>Windows 2000 Server </li></ul><ul><li>Windows 2000 Advanced Server </li></ul><ul><li>Windows 2003 Server (Standard, Enterprise Editions) </li></ul>
    12. 12. CLIENT-SERVER <ul><li>FILE SERVER </li></ul><ul><li>CLIENTS </li></ul><ul><li>NETWK OS IN FILE SERVER. </li></ul><ul><li>CLIENTS HAVE THEIR OWN OS. </li></ul><ul><li>CENTRALISED SERVICES—SECURITY,AND etc.. </li></ul>
    13. 13. CLIENT-SERVER <ul><li>Advantages </li></ul><ul><li>Strong central security. </li></ul><ul><li>Central file storage. </li></ul><ul><li>Eqpt sharing. </li></ul><ul><li>Dedicated, faster than peer to peer </li></ul><ul><li>Easy manageability of large No of cmptrs. </li></ul><ul><li>Disadvantage </li></ul><ul><li>Expensive Dedicated Hardware. </li></ul><ul><li>Expensive network operating system and client license. </li></ul><ul><li>A dedicated network administrator reqd. </li></ul>
    14. 14. PEER TO PEER <ul><li>NO NETWK OS. EACH MACHINE HAS OS. </li></ul><ul><li>INDEP MACHINES PHYSICALLY CONNECTED TO EACH OTHER. </li></ul><ul><li>RESOURCES ARE SHARED AMONG EQUALS. </li></ul><ul><li>NO CENTRAL CONTROLLING AUTH. </li></ul><ul><li>ALL MACHINES HAVE EQUAL RIGHTS. </li></ul><ul><li>GIVES SHARE LEVEL SECURITY. </li></ul>
    15. 15. PEER TO PEER <ul><li>Advantages </li></ul><ul><li>No extra investment in server HW and SW reqd. </li></ul><ul><li>Easy setup. </li></ul><ul><li>No network Admin reqd. </li></ul><ul><li>Lower cost for small network. </li></ul><ul><li>Sharing allowed. </li></ul><ul><li>Disadvantages </li></ul><ul><li>Inability of peers to handle many NW connections as servers. </li></ul><ul><li>No central pt for file storing. </li></ul><ul><li>Admin for all cmptrs. </li></ul><ul><li>Weak security. </li></ul><ul><li>Lack of management which makes large peer networks hard to work. </li></ul>
    16. 16. HYBRID NETWORKS <ul><li>Advantages </li></ul><ul><li>Advantages of server based networking . </li></ul><ul><li>Many of the advantages of peer based NW. </li></ul><ul><li>Ability of users and network administrators to control security based on the imp of the shared resources. </li></ul><ul><li>Disadvantage </li></ul><ul><li>Hybrid computing shares the disadvantages of server based NW. </li></ul><ul><li>Expensive Dedicated Hardware. </li></ul><ul><li>Expensive network operating system and client license. </li></ul><ul><li>A dedicated network administrator reqd. </li></ul>
    17. 17. NETWORK COMPUTERS CAN ALSO SHARE <ul><li>FAX MODEM. </li></ul><ul><li>SCANNERS. </li></ul><ul><li>HDD. </li></ul><ul><li>FDD. </li></ul><ul><li>CD-ROMS/DVD. </li></ul><ul><li>PLOTTERS. </li></ul>
    18. 18. APPLICATIONS OF NETWORKING <ul><li>E MAIL </li></ul><ul><li>E CHAT </li></ul><ul><li>VIDEO CONFERENCE </li></ul><ul><li>FILE TFR </li></ul><ul><li>INTERNET </li></ul>
    19. 19. PRE-REQUISITES <ul><li>CONNECTIVITY (HW) </li></ul><ul><li>SW </li></ul>
    20. 20. TYPES OF CMPTR NETWKS BASED ON TRANSMISSION TECHNOLOGY <ul><li>BROADCAST NETWORKS </li></ul><ul><li>PT-TO-PT NETWORKS </li></ul>
    21. 21. BROADCAST NETWORKS <ul><li>SINGLE COMN CH SHARED BY ALL CMPTRS ON NW. </li></ul><ul><li>PACKETS SEND BY ONE CMPTR RECEIVED BY ALL OTHERS. </li></ul><ul><li>ADDRESS FD IN PACKET- SPECIFIES FOR WHOM INTENDED. </li></ul><ul><li>PACKET CAN ALSO BE ADDRESSED TO ALL CMPTRS (BROADCAST). </li></ul>
    22. 22. PT TO PT NETWORKS <ul><li>MANY CONNECTIONS BETWEEN INDL PAIRS OF CMPTRS. </li></ul><ul><li>PACKETS VISIT ONE OR MORE INTERMEDIATE MACHINES. </li></ul><ul><li>MULTIPLE ROUTES . </li></ul><ul><li>SMALLER NETWORKS – BROADCAST </li></ul><ul><li>LARGER NETWORKS – PT TO PT </li></ul>
    23. 23. TYPES OF COMPUTER NETWKS BASED ON GEOGRAPHICAL SPREAD <ul><li>LAN </li></ul><ul><li>MAN </li></ul><ul><li>WAN </li></ul><ul><li>INTERNET </li></ul>
    24. 24. LOCAL AREA NETWORKS <ul><li>PRIVATELY OWNED. </li></ul><ul><li>WITHIN SAME BLDG/ CAMPUS – UPTO A FEW KMs. </li></ul><ul><li>SPEED 10/100/1000 Mbps. </li></ul><ul><li>NORMALLY BROADCAST TYPE / SWITCHED - STATIC, DYNAMIC </li></ul><ul><li>TRANSMISSION TECHNOLOGY - SINGLE CABLE. </li></ul><ul><li>TOPOLOGY (BUS , RING) </li></ul><ul><li>SIMPLE NETWORK MGT </li></ul>
    25. 25. METROPOLITAN AREA NETWORKS <ul><li>BIGGER VERSION OF LAN. </li></ul><ul><li>USES SIMILAR TECH AS LAN. </li></ul><ul><li>MAY COVER A CITY. </li></ul><ul><li>CAN BE PRIVATELY OWNED OR PUBLIC. </li></ul><ul><li>NO SWITCHING ELEMENTS (SIMPLE DESIGN). </li></ul>
    26. 26. WIDE AREA NETWORKS <ul><li>SPANS LARGER GEOGRAPHICAL AREA. </li></ul><ul><li>COLLECTION OF CMPTRS RUNNING APPLICATION PROGRAMS (HOSTS). </li></ul><ul><li>SUBNET - CARRY MSGS FROM HOST TO HOST. </li></ul><ul><li>SWITCHING ELEMENTS (ROUTERS). </li></ul><ul><li>PACKET SENT FROM ROUTER TO ROUTER. (STORE AND FWD / PT TO PT) </li></ul><ul><li>PT TO PT TOPOLOGIES </li></ul>
    27. 27. INTER-NETWORKS <ul><li>CONNECTING DIFFERENT NETWORKS WITH DIFFERING TOPOLOGIES / INCOMPATIBILITIES </li></ul><ul><li>CONNECTED THROUGH GATEWAYS </li></ul>
    28. 28. WIRELESS NETWORKS <ul><li>LOW SPEEDS 1-2 Mbps </li></ul><ul><li>HIGH ERROR RATES </li></ul><ul><li>LIABLE TO INTERFERENCE </li></ul>
    29. 29. LAN TOPOLOGIES <ul><li>TOPOLOGY THE GEOMETRIC ARRANGEMENT OF DEVICES IN A NETWORK. </li></ul><ul><li>TYPES OF TOPOLOGIES </li></ul><ul><ul><li>STAR TOPOLOGY </li></ul></ul><ul><ul><li>RING TOPOLOGY </li></ul></ul><ul><ul><li>BUS TOPOLOGY </li></ul></ul><ul><ul><li>HYBRID TOPOLOGY </li></ul></ul>
    30. 30. LAN – STAR TOPOLOGY
    31. 31. LAN – RING TOPOLOGY
    32. 32. LAN – BUS TOPOLOGY
    33. 33. LAN – HYBRID TOPOLOGY
    34. 34. DESIGNING: UNIT LEVEL LAN
    35. 35. DESIGN OF A LAN <ul><li>NETWORK PLG – NO OF CLIENTS, FUTURE GROWTH, NW COMPONENTS, NO OF SERVERS, TYPE OF CABLING. </li></ul><ul><li>NETWORK DESIGN – LOC OF SERVERS, TOPOLOGY, PHYSICAL LAYOUT, SOFTWARE USAGE ETC. </li></ul><ul><li>BOTTOM LINE; MAKE A BLUE PRINT . </li></ul><ul><li>IMPLEMENTATION AND FINE TUNING. </li></ul><ul><li>PHYSICAL AUDIT – TYPE OF MACHINE, REGD NOS, HARDWARE USERS, OS INSTALLED WITH VER, CD OF OS & OTHER APPLICATIONS. </li></ul><ul><li>Contd… </li></ul>
    36. 36. <ul><li>DESIGNATE SYS ADMINISTRATOR. </li></ul><ul><li>KEEP RECORD OF – </li></ul><ul><ul><li>SERVER CONFIG </li></ul></ul><ul><ul><li>NIC CONFIG </li></ul></ul><ul><ul><li>TCP/IP ADDRESS </li></ul></ul><ul><ul><li>USER NAMES & PASSWORDS </li></ul></ul><ul><ul><li>EMAIL CLIENT CONFIG </li></ul></ul><ul><ul><li>NW SERVICES (PRINTERS, FILE SHARING, PERMISSIONS ETC) </li></ul></ul>
    37. 37. SUGGESTED LAYOUT OF UNIT LAN SERVER ADJT QM 2IC CO DOCU CELL PAY & ALLCES CELL D COY A COY B COY C COY G BR PRI Q BR A BR
    38. 38. CYBER SECURITY
    39. 39. INFO SECURITY
    40. 40. GUIDING PRINCIPLE <ul><li>Cyber Security in Army is based on the guiding principle that the person who is generating info is also resp for its security. </li></ul>
    41. 41. INFO ASSETS <ul><li>Hardware </li></ul><ul><li>Software </li></ul><ul><li>Documentation </li></ul><ul><li>Information </li></ul>
    42. 42. <ul><li>MOST SECURITY BREACHES OCCUR DUE TO : - </li></ul><ul><ul><li>POOR PASSWORD MGMT. </li></ul></ul><ul><ul><li>NON ACCTG OF REMOVABLE MAGNETIC MEDIA. </li></ul></ul><ul><ul><li>STORING OF CLASSIFIED INFO ON CMPTR HDD. </li></ul></ul><ul><ul><li>POOR NETWORK ADMIN. </li></ul></ul><ul><ul><li>UNACCTD COPYING OF DATA ON REMOVABLE MEDIA </li></ul></ul><ul><ul><li>WEAK AUTHENTICATION PROCEDURES & ACCESS CONTROL. </li></ul></ul><ul><ul><li>VULNERABILITY OF OP SYS & COTS SOFTWARE. </li></ul></ul><ul><ul><li>ABSENCE OF ADEQUATE TOOLS & STD FOR DATA ENCRYPTION </li></ul></ul>CAUSES OF SECURITY BREACHES
    43. 44. LIKELY BREACHES <ul><li>PERSONAL SECURITY </li></ul><ul><li>PHYSICAL SECURITY </li></ul><ul><li>HARDWARE SECURITY </li></ul><ul><li>SOFTWARE SECURITY </li></ul><ul><li>DATABASE SECURITY </li></ul>
    44. 45. PERSONAL SECURITY <ul><li>ALLOW ACCESS TO ONLY AUTH & TRAINED PERS. </li></ul><ul><li>TRG CAPSULES. </li></ul><ul><li>RECORD OF PERS WITH ACCESS TO CMPTR. </li></ul><ul><li>SURPRISE CHECKS. </li></ul>
    45. 47. PHYSICAL SECURITY <ul><li>OLD FASHIONED LOCK & KEY. </li></ul><ul><li>EACH CMPTR, PRINTER, PERIPHERAL IS RESP OF INDL OFFR/OR/CLK. </li></ul><ul><li>RESTRICT ENTRY TO AUTH PERS. </li></ul><ul><li>PASSWORD PROTECTION FOR ALL CMPTRS. </li></ul><ul><li>SCREEN SAVER PASSWORD. </li></ul><ul><li>FIRE PROTECTION. </li></ul>
    46. 48. HARDWARE SECURITY (Protection against crashes/breakdown) <ul><li>LOGICAL PARTITIONS. </li></ul><ul><li>BACKUP DATA (PC/SERVERS) </li></ul><ul><li>HOT STANDBY SERVERS </li></ul><ul><li>STABILISED POWER SUP. </li></ul><ul><li>ACCTG OF SECONDARY STORAGE MEDIA. </li></ul><ul><li>ELECTRIC EARTHING. </li></ul><ul><li>LIGHTENING PROTECTION. </li></ul><ul><li>STRONG CABLING IN CONDUITS. </li></ul><ul><li>PERIPHERAL ACCOUNTABILITY BY NAME. </li></ul><ul><li>FAX. LOCK/UNLOCK CODES. </li></ul><ul><li>PHOTOCOPY RECORD. </li></ul>
    47. 50. SOFTWARE SECURITY <ul><li>ONLY LICENSED SW. </li></ul><ul><li>LATEST SOFTWARE PATCHES. </li></ul><ul><li>REVIEW DEFAULT SETTING OF SOFTWARE. </li></ul>
    48. 52. DATABASE SECURITY <ul><li>DATA HIGHER THAN RESTD’ NOT TO BE HOSTED ON SERVER. </li></ul><ul><li>SERVER / NAS PASSWORD - SYS ADMIN. </li></ul><ul><li>SYS ADMIN TO DEFINE ACCESS CONTROL LISTS, ACCESS RIGHTS. </li></ul><ul><li>CLIENT PC DATA - USER RESP. </li></ul><ul><li>BACKUP. </li></ul>
    49. 53. MGMT OF REMOVABLE MEDIA <ul><li>EXTERNAL MARKING. </li></ul><ul><li>LOCK & KEY. </li></ul><ul><li>INCOMING /OUTGOING MEDIA TO BE AUTH BY AN OFFR. </li></ul><ul><li>PHYSICAL CHECK OF MEDIA – ONCE A QTR. </li></ul><ul><li>USE OF USB / FLASH MEDIA IS PROHIBITED, ?? </li></ul><ul><li>LAPTOP/PDA. WILL NOT BE TAKEN HOME. SINCE USED FOR OFFICIAL WK, WILL NOT BE CONNECTED TO INTERNET. </li></ul>
    50. 54. NETWORK SECURITY <ul><li>IP addresses. </li></ul><ul><li>Remote Login. </li></ul><ul><li>Perimeter Defence. </li></ul>
    51. 55. PROCEDURAL SECURITY MSR <ul><li>LAN / SYS ADMINISTRATOR. </li></ul><ul><li>SECURITY ADMINISTRATOR. </li></ul><ul><li>NETWORK DOCUMENTATION. </li></ul><ul><li>DATA BACKUPS. </li></ul><ul><li>PVT SOFTWARE. </li></ul><ul><li>CHOOSING EFFECTIVE PASSWORDS . </li></ul>
    52. 57. SECURITY OF CL DOCU <ul><li>Top Secret/Secret/Confd docu . </li></ul><ul><ul><li>Holding in Electronic from. </li></ul></ul><ul><ul><li>Typing. </li></ul></ul><ul><ul><li>Txn. </li></ul></ul><ul><li>Restd/Unclas Docu. </li></ul><ul><ul><li>Storage </li></ul></ul><ul><ul><li>Reproduction & issue </li></ul></ul><ul><ul><li>Txn (LAN is unclas ??) </li></ul></ul>
    53. 59. SECURITY WHILE USING ARMY INTERNET <ul><li>DIAL UP ACCESS NOT PERMITTED. </li></ul><ul><li>ONLY UNCLAS INFO TO BE TRANSMITTED. </li></ul>
    54. 60. NEVER CONNECT THE INTERNET PC TO YOUR OFFICE LAN OR ARMY INTRANET
    55. 61. SECURITY MSR WHILE USING INTERNET <ul><li>ONLY STAND ALONE PC TO BE USED. </li></ul><ul><li>HDD NOT TO HAVE OFFICIAL DATA. </li></ul><ul><li>ACCESS TO INTERNET ONLY ON NEED BASIS. </li></ul><ul><li>LATEST AV SOFTWARE, CHECK ALL DOWNLOADS FOR VIRUSES. </li></ul><ul><li>FIREWALL PROTECTED. </li></ul><ul><li>IN CYBER LABS, PLACE PC BEHIND PROXY SERVER & FIREWALL. </li></ul>Contd/-
    56. 62. <ul><li>PERIPHERALS ON INTERNET NOT TO BE SHARED FOR OFFICIAL WK. </li></ul><ul><li>MAINT USAGE REGISTER IN INTERNET LAB. </li></ul><ul><li>BIOS, USER, SCREEN SERVER PASSWORD. </li></ul><ul><li>AVOID ENTICING SITES. </li></ul><ul><li>PCS AT HOME BEING USED FOR INTERNET - NO OFFICIAL DATA ON HDD. </li></ul><ul><li>DO NOT SURF THE NET ON AN ADMIN ACCT. </li></ul>
    57. 63. VIRUS PROTECTION <ul><li>REGULAR CHECK OF HDD. </li></ul><ul><li>USE ONLY LEGAL SOFTWARE. </li></ul><ul><li>RUN AV SOFTWARE WHEN OPENING ANY FILE. </li></ul>
    58. 65. REPAIR & MAINT <ul><li>AS FAR AS POSSIBLE, IN-SITU REPAIRS. </li></ul><ul><li>STN WKSP RESP FOR REPAIRS AFTER WARRANTY. REMOVE HDD BEFORE SENDING TO WKSP. </li></ul><ul><li>REPAIR THROUGH CIV FIRM DURING WARRANTY. </li></ul><ul><ul><li>IN SITU, PHYSICAL PRESENCE OF PERS DURING REPAIRS. </li></ul></ul><ul><ul><li>IF SYS TO BE MOVED OUT, REMOVE HDD. </li></ul></ul><ul><ul><li>UNREPAIRABLE HDD, GET CERTIFIED AS BER. PHYSICAL DESTRUCTION. </li></ul></ul>
    59. 66. THANK YOU
    1. A particular slide catching your eye?

      Clipping is a handy way to collect important slides you want to go back to later.

    ×