SlideShare a Scribd company logo
1 of 40
Module-1
Information Security Devices
Module-1: Information Security
Devices
• Identity and Access Management (IdAM)
• Networks (Wired And Wireless) Devices
• Endpoints/Edge Devices
• Storage Devices
• Infrastructure Devices (e.g. Routers, Firewall
Services)
• Computer Assets, Servers and Storage
Networks
• Content management
• IDS/IPS
Identity and Access Management
(IdAM)
• Identity and access management (IAM or
IdAM for short) is a way to tell who a user is
and what they are allowed to do.
• IAM is like the bouncer at the door of a
nightclub with a list of who is allowed in, who
isn't allowed in, and who is able to access the
VIP area.
• IAM is also called identity management (IdM).
Identify and Access Management
(IdAM)
• In more technical terms, IAM is a means of
managing a given set of users' digital
identities, and the privileges associated with
each identity.
• Within an organization, IAM may be a single
product, or it may be a combination of
processes, software products, cloud services,
and hardware that give administrators
visibility and control over the organizational
data that individual users can access.
Identify and Access Management
(IdAM)
• Identity in the context of computing
– A person's entire identity cannot be uploaded and
stored in a computer, so "identity" in a computing
context means a certain set of properties that can
be conveniently measured and recorded digitally.
– Think of an ID card or a passport: not every fact
about a person is recorded in an ID card, but it
contains enough personal characteristics that a
person's identity can quickly be matched to the ID
card.
Identify and Access Management
(IdAM)
• Identity in the context of computing
– To verify identity, a computer system will assess a
user for characteristics that are specific to them.
– If they match, the user's identity is confirmed.
These characteristics are also known as
"authentication factors,“.
– The three most widely used authentication factors
are:
• Something the user knows
• Something the user has
• Something the user is
Identify and Access Management
(IdAM)
• Identity in the context of computing
– Something the user Knows:
• This factor refers to a valid password, Secret Key etc.
Identify and Access Management
(IdAM)
• Identity in the context of computing
– Something the user has:
• This factor refers to possession of a physical token that
is issued to authorized users.
• The most basic example of this authentication factor is
the use of a physical house key to enter one's home.
The assumption is that only someone who owns, rents,
or otherwise is allowed into the house will have a key.
Identify and Access Management
(IdAM)
• Identity in the context of computing
– Something the user is:
• This refers to a physical property of one's body.
• A common example of this authentication factor in
action is Face ID, the feature offered by many modern
smartphones. Fingerprint scanning is another example.
• Less common methods used by some high-security
organizations include retina scans and blood tests.
Identify and Access Management
(IdAM)
• Access management
– "Access" refers to what data a user can see and what
actions they can perform once they log in.
– Once John logs into his email, he can see all the emails he
has sent and received.
– However, he should not be able to see the emails sent and
received by Tracy, his coworker.
What is a network device?
• Components used to connect computers as
well as other electrical devices together in
order to share resources such as printers and
fax machines.
Devices used in Networking
• Hubs
• Switches
• Routers
• Network bridges
• Gateways
• Firewalls
• Wireless AP (Access Points)
What is a Hub?
• A small rectangular box that joins computers
together through ports on the back of the hub.
J
Ethernet hub – Wikipedia. [online image]. Available en.wikipedia.org/wiki/Ethernet hub
How does a Hub work?
• A hub receives data packets and passes on all
the Information it receives to all the other
computers connected to the hub.
• Information is also sent to the computer that
sent the information
• Example:
– if computer 1 wants to communicate with
computer 3, the data will be sent to all the
computers on the network since hubs do not
know the destination of the information it
receives.
Diagram of a hub network
Main PC
Hub PC 1
PC 2
Ethernet
Additional Information about Hubs
• Most hubs contain 4 ports some have 5 or
more ports.
• Hubs can be used for a smaller network such
as a home network or a small office network.
• Hubs are not that expensive most range for
less than $30.
• Hubs may not be the best option for
sophisticated or complex networks.
What is a Switch?
• Switches look similar to hubs in that they are
rectangular in shape.
• Manageable switches are usually a little bigger
than unmanageable switches.
• A switch also has ports on the back.
Network switch – net gear.[online image]. Available http://www.senasum.blogspot.com, July 9, 2013
How does a Switch work?
• Switches work about the same way as hubs.
Unlike hubs, switches can identify the destination
of a packet.
• Switches send information only to the computer
that is suppose to receive the information.
• Switches can also send and retrieve information
at the same time which makes sending
information faster to retrieve than hubs.
Diagram of a Switch Network
Switch Diagram. LindyConnectionPerfection.[online image]. Available http://www.lindy-international.com, July 9, 2013
Additional Information about Switches
• Switches are a better option than hubs for
larger networks or home networks with 4 or
more connected computers.
• Switches can range in price from $30 up to
$100 or more depending on if the switch is
manageable or unmanageable, usually
unmanageable switches are less in price
versus managed switches.
What is a Router?
• A specialized computer programmed to interface
between different networks.
• Netgear-wndr4000-ddwrt-450 – Most Popular VPN Service Providers & DD-WRT Routers. [online image]. www.flashrouters.com, July 12, 2013.
Diagram of a Router
Additional Information about Routers
• Routers make sure data sent over the Internet
goes where it needs to go and not where it is not
needed.
• Acts like a traffic controller, working to cut down
congestion throughout the network and keeps
everything flowing smoothly along the best path.
• Routers are the only type of equipment that looks
at every single packet passing by on the network.
• Home network router including wireless routers
can cost anywhere from $40 to $150 or higher.
What is a Bridge?
• A hardware device used to create a connection
between two separate computer networks or to
divide one network into two.
• Filters data traffic at a network boundary and
reduces the amount of traffic on a LAN dividing it
into two segments.
• I -4E to Ethernet (10/100M) Network Bridge. [online image]. Network Bridge. Available at www.freewtc.com. July 12, 2013.
How does a Bridge work?
• Each bridge consist of a MAC address and
operates at layer 2 of the OSI model
• When a packet is received on the bridge ports the
forwarding table including the MAC address is
automatically updated to map the source MAC
address to the network port from which the
packet originated
• The gateway then process the received packet
according to the packet’s type.
Diagram of a Bridge
Additional Information about Bridges
• A bridge examines each message on a LAN
and passes the ones known to be within the
same LAN.
• Computer addresses have no relationship to
location in a bridging network.
• A bridge is sometimes referred to as a brouter.
• Wireless network bridges can costs anywhere
from $100 to $1000 or more depending on
the type of bridge purchased.
What is a Gateway?
• A communication device that provides a remote
network with connectivity to the host network.
• Gateway Network Communications [online image]. Available www.hiwtc.com
How a Gateway Works?
• The gateway node acts like a proxy server and
firewall
• The gateway uses forwarding tables to
determine where packet are to be sent
Gateway Diagram
Additional Information about
Gateways
• On the Internet a node or stopping point can
be a gateway.
• The computers controlling traffic within a
network are gateway nodes.
• A gateway is also associated with a router.
What is a Firewall?
• Hardware or software device that protects a computer
network from unauthorized access.
• Firewall Sling Secure Smartphone. [online image]. Available www.slingsecure.com
How a Firewall works
• Firewalls filters the information coming
through the Internet connection into a user
private network.
• To control traffic in and out of the network
firewalls one or more of the three methods
are used including:
– Packet filtering
– Proxy service
– Stateful inspection
Diagram of Firewall
Additional Information about Firewalls
• Most home network routers have built in firewall.
• The term “firewall” originated from firefighting, where
a firewall is a barrier established to prevent the spread
of a fire.
• A firewall works with the proxy server making request
on behalf of workstation users.
• There are a number of features firewalls can include
from logging and reporting to setting alarms of an
attack.
• Costs for host based firewalls usually costs around
$100 or less. Some may costs more depending on
different things such as features included or if its an
enterprise based system.
What is a Wireless Access Point?
• A small hardware device featuring built-in network
adapter, antenna, and radio signals.
• Configured nodes on a WLAN.
• Wireless Access Points, Page 2. [online image]. Available compnetworking.about.com
How a Wireless Access Point works?
• Operates using radio frequency technology
• Broadcast wireless signals computers can
detect and use
• A wireless network adapter is implemented
while using a wireless access point, most
computers today already have network
adapters built into the computer.
Diagram of Wireless Access Point
RxNT – The eprescribing System. [online image]. Available www.rxnt.com
Additional Information about Access
Points
• The access point usually connects to the
router
• A hotspot is a application wireless users can
connect to the Internet.
• Aps are used throughout a home network,
usually through only one AP.
• Wireless access points can cost anywhere
from $30 and up depending on the type
purchased.
Endpoint/Edge Devices
• Endpoint point devices (PCs, laptops, mobile
devices and servers)
• An edge device is any piece of hardware that
controls data flow at the boundary between
two networks.
• Examples include routers, routing switches,
integrated access devices, multiplexers, and a
variety of metropolitan area network and
wide area network access devices

More Related Content

Similar to Lect_2.pptx

unit 4 cds computer networking notesnotes.pdf
unit 4 cds computer networking notesnotes.pdfunit 4 cds computer networking notesnotes.pdf
unit 4 cds computer networking notesnotes.pdfshubhangisonawane6
 
Lecture 2 types of network
Lecture 2 types of networkLecture 2 types of network
Lecture 2 types of networkAlbert Abbosey
 
CSIT108 Module-2.ppt
CSIT108 Module-2.pptCSIT108 Module-2.ppt
CSIT108 Module-2.pptUndeadban2
 
KRISHNA_COMPUTER_PROJECT.pptx
KRISHNA_COMPUTER_PROJECT.pptxKRISHNA_COMPUTER_PROJECT.pptx
KRISHNA_COMPUTER_PROJECT.pptxADITYAKUMAR554673
 
From the Internet of Things to Intelligent Systems: A Developer's Primer
From the Internet of Things to Intelligent Systems: A Developer's PrimerFrom the Internet of Things to Intelligent Systems: A Developer's Primer
From the Internet of Things to Intelligent Systems: A Developer's PrimerRick G. Garibay
 
Introduction to Network Devices & Addressing Schemes
Introduction to Network Devices &  Addressing SchemesIntroduction to Network Devices &  Addressing Schemes
Introduction to Network Devices & Addressing SchemesMuhammadRizaHilmi
 
From the Internet of Things to Intelligent Systems A Developer's Primer - Gar...
From the Internet of Things to Intelligent Systems A Developer's Primer - Gar...From the Internet of Things to Intelligent Systems A Developer's Primer - Gar...
From the Internet of Things to Intelligent Systems A Developer's Primer - Gar...Rick G. Garibay
 
windows server installation procedure or
windows server installation procedure orwindows server installation procedure or
windows server installation procedure orYogeshKumar187055
 
Section c group2_firewall_ final
Section c group2_firewall_ finalSection c group2_firewall_ final
Section c group2_firewall_ finalpg13tarun_g
 
Firewall ( Cyber Security)
Firewall ( Cyber Security)Firewall ( Cyber Security)
Firewall ( Cyber Security)Jainam Shah
 
Network defenses
Network defensesNetwork defenses
Network defensesG Prachi
 
Networks-Internet-and-Internet-Protocols.pptx
Networks-Internet-and-Internet-Protocols.pptxNetworks-Internet-and-Internet-Protocols.pptx
Networks-Internet-and-Internet-Protocols.pptxHaythanSunday
 
iot enabling technologies for IOT subject
iot enabling technologies for IOT subjectiot enabling technologies for IOT subject
iot enabling technologies for IOT subjectKotiBabu7
 
IoT Enabling Technologies
IoT Enabling TechnologiesIoT Enabling Technologies
IoT Enabling TechnologiesPrakash Honnur
 

Similar to Lect_2.pptx (20)

Isd&d networks
Isd&d networksIsd&d networks
Isd&d networks
 
Networks: The Big Picture
Networks: The Big PictureNetworks: The Big Picture
Networks: The Big Picture
 
unit 4 cds computer networking notesnotes.pdf
unit 4 cds computer networking notesnotes.pdfunit 4 cds computer networking notesnotes.pdf
unit 4 cds computer networking notesnotes.pdf
 
lecture 7.pptx
lecture 7.pptxlecture 7.pptx
lecture 7.pptx
 
Lecture 2 types of network
Lecture 2 types of networkLecture 2 types of network
Lecture 2 types of network
 
CSIT108 Module-2.ppt
CSIT108 Module-2.pptCSIT108 Module-2.ppt
CSIT108 Module-2.ppt
 
KRISHNA_COMPUTER_PROJECT.pptx
KRISHNA_COMPUTER_PROJECT.pptxKRISHNA_COMPUTER_PROJECT.pptx
KRISHNA_COMPUTER_PROJECT.pptx
 
From the Internet of Things to Intelligent Systems: A Developer's Primer
From the Internet of Things to Intelligent Systems: A Developer's PrimerFrom the Internet of Things to Intelligent Systems: A Developer's Primer
From the Internet of Things to Intelligent Systems: A Developer's Primer
 
Introduction to Network Devices & Addressing Schemes
Introduction to Network Devices &  Addressing SchemesIntroduction to Network Devices &  Addressing Schemes
Introduction to Network Devices & Addressing Schemes
 
From the Internet of Things to Intelligent Systems A Developer's Primer - Gar...
From the Internet of Things to Intelligent Systems A Developer's Primer - Gar...From the Internet of Things to Intelligent Systems A Developer's Primer - Gar...
From the Internet of Things to Intelligent Systems A Developer's Primer - Gar...
 
windows server installation procedure or
windows server installation procedure orwindows server installation procedure or
windows server installation procedure or
 
Section c group2_firewall_ final
Section c group2_firewall_ finalSection c group2_firewall_ final
Section c group2_firewall_ final
 
unit-3.pptx
unit-3.pptxunit-3.pptx
unit-3.pptx
 
Firewall ( Cyber Security)
Firewall ( Cyber Security)Firewall ( Cyber Security)
Firewall ( Cyber Security)
 
CN-Unit 1.pptx
CN-Unit 1.pptxCN-Unit 1.pptx
CN-Unit 1.pptx
 
Network defenses
Network defensesNetwork defenses
Network defenses
 
Networks-Internet-and-Internet-Protocols.pptx
Networks-Internet-and-Internet-Protocols.pptxNetworks-Internet-and-Internet-Protocols.pptx
Networks-Internet-and-Internet-Protocols.pptx
 
Unit Iv
Unit IvUnit Iv
Unit Iv
 
iot enabling technologies for IOT subject
iot enabling technologies for IOT subjectiot enabling technologies for IOT subject
iot enabling technologies for IOT subject
 
IoT Enabling Technologies
IoT Enabling TechnologiesIoT Enabling Technologies
IoT Enabling Technologies
 

More from Senthil Vit

Switching Problems.pdf
Switching Problems.pdfSwitching Problems.pdf
Switching Problems.pdfSenthil Vit
 
AsymptoticNotations.ppt
AsymptoticNotations.pptAsymptoticNotations.ppt
AsymptoticNotations.pptSenthil Vit
 
First Best and Worst Fit.pptx
First Best and Worst Fit.pptxFirst Best and Worst Fit.pptx
First Best and Worst Fit.pptxSenthil Vit
 
File Implementation Problem.pptx
File Implementation Problem.pptxFile Implementation Problem.pptx
File Implementation Problem.pptxSenthil Vit
 
Design Issues of an OS.ppt
Design Issues of an OS.pptDesign Issues of an OS.ppt
Design Issues of an OS.pptSenthil Vit
 
Operating Systems – Structuring Methods.pptx
Operating Systems – Structuring Methods.pptxOperating Systems – Structuring Methods.pptx
Operating Systems – Structuring Methods.pptxSenthil Vit
 
Virtualization.pptx
Virtualization.pptxVirtualization.pptx
Virtualization.pptxSenthil Vit
 
Traffic-Monitoring.ppt
Traffic-Monitoring.pptTraffic-Monitoring.ppt
Traffic-Monitoring.pptSenthil Vit
 
ALPHA_BETA_EXAMPLE_PROB
ALPHA_BETA_EXAMPLE_PROBALPHA_BETA_EXAMPLE_PROB
ALPHA_BETA_EXAMPLE_PROBSenthil Vit
 

More from Senthil Vit (14)

Switching Problems.pdf
Switching Problems.pdfSwitching Problems.pdf
Switching Problems.pdf
 
Big Oh.ppt
Big Oh.pptBig Oh.ppt
Big Oh.ppt
 
AsymptoticNotations.ppt
AsymptoticNotations.pptAsymptoticNotations.ppt
AsymptoticNotations.ppt
 
snort.ppt
snort.pptsnort.ppt
snort.ppt
 
First Best and Worst Fit.pptx
First Best and Worst Fit.pptxFirst Best and Worst Fit.pptx
First Best and Worst Fit.pptx
 
File Implementation Problem.pptx
File Implementation Problem.pptxFile Implementation Problem.pptx
File Implementation Problem.pptx
 
Design Issues of an OS.ppt
Design Issues of an OS.pptDesign Issues of an OS.ppt
Design Issues of an OS.ppt
 
Operating Systems – Structuring Methods.pptx
Operating Systems – Structuring Methods.pptxOperating Systems – Structuring Methods.pptx
Operating Systems – Structuring Methods.pptx
 
deadlock.ppt
deadlock.pptdeadlock.ppt
deadlock.ppt
 
Virtualization.pptx
Virtualization.pptxVirtualization.pptx
Virtualization.pptx
 
Traffic-Monitoring.ppt
Traffic-Monitoring.pptTraffic-Monitoring.ppt
Traffic-Monitoring.ppt
 
6. Deadlock.ppt
6. Deadlock.ppt6. Deadlock.ppt
6. Deadlock.ppt
 
os4-2_cop.ppt
os4-2_cop.pptos4-2_cop.ppt
os4-2_cop.ppt
 
ALPHA_BETA_EXAMPLE_PROB
ALPHA_BETA_EXAMPLE_PROBALPHA_BETA_EXAMPLE_PROB
ALPHA_BETA_EXAMPLE_PROB
 

Recently uploaded

NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...Amil baba
 
Linux Systems Programming: Inter Process Communication (IPC) using Pipes
Linux Systems Programming: Inter Process Communication (IPC) using PipesLinux Systems Programming: Inter Process Communication (IPC) using Pipes
Linux Systems Programming: Inter Process Communication (IPC) using PipesRashidFaridChishti
 
Hostel management system project report..pdf
Hostel management system project report..pdfHostel management system project report..pdf
Hostel management system project report..pdfKamal Acharya
 
Ground Improvement Technique: Earth Reinforcement
Ground Improvement Technique: Earth ReinforcementGround Improvement Technique: Earth Reinforcement
Ground Improvement Technique: Earth ReinforcementDr. Deepak Mudgal
 
AIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech studentsAIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech studentsvanyagupta248
 
457503602-5-Gas-Well-Testing-and-Analysis-pptx.pptx
457503602-5-Gas-Well-Testing-and-Analysis-pptx.pptx457503602-5-Gas-Well-Testing-and-Analysis-pptx.pptx
457503602-5-Gas-Well-Testing-and-Analysis-pptx.pptxrouholahahmadi9876
 
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdfAldoGarca30
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayEpec Engineered Technologies
 
Digital Communication Essentials: DPCM, DM, and ADM .pptx
Digital Communication Essentials: DPCM, DM, and ADM .pptxDigital Communication Essentials: DPCM, DM, and ADM .pptx
Digital Communication Essentials: DPCM, DM, and ADM .pptxpritamlangde
 
Basic Electronics for diploma students as per technical education Kerala Syll...
Basic Electronics for diploma students as per technical education Kerala Syll...Basic Electronics for diploma students as per technical education Kerala Syll...
Basic Electronics for diploma students as per technical education Kerala Syll...ppkakm
 
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
COST-EFFETIVE  and Energy Efficient BUILDINGS ptxCOST-EFFETIVE  and Energy Efficient BUILDINGS ptx
COST-EFFETIVE and Energy Efficient BUILDINGS ptxJIT KUMAR GUPTA
 
DC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equationDC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equationBhangaleSonal
 
Computer Networks Basics of Network Devices
Computer Networks  Basics of Network DevicesComputer Networks  Basics of Network Devices
Computer Networks Basics of Network DevicesChandrakantDivate1
 
Online electricity billing project report..pdf
Online electricity billing project report..pdfOnline electricity billing project report..pdf
Online electricity billing project report..pdfKamal Acharya
 
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...Call Girls Mumbai
 
Introduction to Data Visualization,Matplotlib.pdf
Introduction to Data Visualization,Matplotlib.pdfIntroduction to Data Visualization,Matplotlib.pdf
Introduction to Data Visualization,Matplotlib.pdfsumitt6_25730773
 
School management system project Report.pdf
School management system project Report.pdfSchool management system project Report.pdf
School management system project Report.pdfKamal Acharya
 
PE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and propertiesPE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and propertiessarkmank1
 
fitting shop and tools used in fitting shop .ppt
fitting shop and tools used in fitting shop .pptfitting shop and tools used in fitting shop .ppt
fitting shop and tools used in fitting shop .pptAfnanAhmad53
 

Recently uploaded (20)

NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
 
Linux Systems Programming: Inter Process Communication (IPC) using Pipes
Linux Systems Programming: Inter Process Communication (IPC) using PipesLinux Systems Programming: Inter Process Communication (IPC) using Pipes
Linux Systems Programming: Inter Process Communication (IPC) using Pipes
 
Hostel management system project report..pdf
Hostel management system project report..pdfHostel management system project report..pdf
Hostel management system project report..pdf
 
Ground Improvement Technique: Earth Reinforcement
Ground Improvement Technique: Earth ReinforcementGround Improvement Technique: Earth Reinforcement
Ground Improvement Technique: Earth Reinforcement
 
AIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech studentsAIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech students
 
457503602-5-Gas-Well-Testing-and-Analysis-pptx.pptx
457503602-5-Gas-Well-Testing-and-Analysis-pptx.pptx457503602-5-Gas-Well-Testing-and-Analysis-pptx.pptx
457503602-5-Gas-Well-Testing-and-Analysis-pptx.pptx
 
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
 
Digital Communication Essentials: DPCM, DM, and ADM .pptx
Digital Communication Essentials: DPCM, DM, and ADM .pptxDigital Communication Essentials: DPCM, DM, and ADM .pptx
Digital Communication Essentials: DPCM, DM, and ADM .pptx
 
Basic Electronics for diploma students as per technical education Kerala Syll...
Basic Electronics for diploma students as per technical education Kerala Syll...Basic Electronics for diploma students as per technical education Kerala Syll...
Basic Electronics for diploma students as per technical education Kerala Syll...
 
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
COST-EFFETIVE  and Energy Efficient BUILDINGS ptxCOST-EFFETIVE  and Energy Efficient BUILDINGS ptx
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
 
DC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equationDC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equation
 
Computer Networks Basics of Network Devices
Computer Networks  Basics of Network DevicesComputer Networks  Basics of Network Devices
Computer Networks Basics of Network Devices
 
Online electricity billing project report..pdf
Online electricity billing project report..pdfOnline electricity billing project report..pdf
Online electricity billing project report..pdf
 
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
 
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
 
Introduction to Data Visualization,Matplotlib.pdf
Introduction to Data Visualization,Matplotlib.pdfIntroduction to Data Visualization,Matplotlib.pdf
Introduction to Data Visualization,Matplotlib.pdf
 
School management system project Report.pdf
School management system project Report.pdfSchool management system project Report.pdf
School management system project Report.pdf
 
PE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and propertiesPE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and properties
 
fitting shop and tools used in fitting shop .ppt
fitting shop and tools used in fitting shop .pptfitting shop and tools used in fitting shop .ppt
fitting shop and tools used in fitting shop .ppt
 

Lect_2.pptx

  • 2. Module-1: Information Security Devices • Identity and Access Management (IdAM) • Networks (Wired And Wireless) Devices • Endpoints/Edge Devices • Storage Devices • Infrastructure Devices (e.g. Routers, Firewall Services) • Computer Assets, Servers and Storage Networks • Content management • IDS/IPS
  • 3. Identity and Access Management (IdAM) • Identity and access management (IAM or IdAM for short) is a way to tell who a user is and what they are allowed to do. • IAM is like the bouncer at the door of a nightclub with a list of who is allowed in, who isn't allowed in, and who is able to access the VIP area. • IAM is also called identity management (IdM).
  • 4. Identify and Access Management (IdAM) • In more technical terms, IAM is a means of managing a given set of users' digital identities, and the privileges associated with each identity. • Within an organization, IAM may be a single product, or it may be a combination of processes, software products, cloud services, and hardware that give administrators visibility and control over the organizational data that individual users can access.
  • 5. Identify and Access Management (IdAM) • Identity in the context of computing – A person's entire identity cannot be uploaded and stored in a computer, so "identity" in a computing context means a certain set of properties that can be conveniently measured and recorded digitally. – Think of an ID card or a passport: not every fact about a person is recorded in an ID card, but it contains enough personal characteristics that a person's identity can quickly be matched to the ID card.
  • 6. Identify and Access Management (IdAM) • Identity in the context of computing – To verify identity, a computer system will assess a user for characteristics that are specific to them. – If they match, the user's identity is confirmed. These characteristics are also known as "authentication factors,“. – The three most widely used authentication factors are: • Something the user knows • Something the user has • Something the user is
  • 7. Identify and Access Management (IdAM) • Identity in the context of computing – Something the user Knows: • This factor refers to a valid password, Secret Key etc.
  • 8. Identify and Access Management (IdAM) • Identity in the context of computing – Something the user has: • This factor refers to possession of a physical token that is issued to authorized users. • The most basic example of this authentication factor is the use of a physical house key to enter one's home. The assumption is that only someone who owns, rents, or otherwise is allowed into the house will have a key.
  • 9. Identify and Access Management (IdAM) • Identity in the context of computing – Something the user is: • This refers to a physical property of one's body. • A common example of this authentication factor in action is Face ID, the feature offered by many modern smartphones. Fingerprint scanning is another example. • Less common methods used by some high-security organizations include retina scans and blood tests.
  • 10. Identify and Access Management (IdAM) • Access management – "Access" refers to what data a user can see and what actions they can perform once they log in. – Once John logs into his email, he can see all the emails he has sent and received. – However, he should not be able to see the emails sent and received by Tracy, his coworker.
  • 11. What is a network device? • Components used to connect computers as well as other electrical devices together in order to share resources such as printers and fax machines.
  • 12. Devices used in Networking • Hubs • Switches • Routers • Network bridges • Gateways • Firewalls • Wireless AP (Access Points)
  • 13. What is a Hub? • A small rectangular box that joins computers together through ports on the back of the hub. J Ethernet hub – Wikipedia. [online image]. Available en.wikipedia.org/wiki/Ethernet hub
  • 14. How does a Hub work? • A hub receives data packets and passes on all the Information it receives to all the other computers connected to the hub. • Information is also sent to the computer that sent the information • Example: – if computer 1 wants to communicate with computer 3, the data will be sent to all the computers on the network since hubs do not know the destination of the information it receives.
  • 15. Diagram of a hub network Main PC Hub PC 1 PC 2 Ethernet
  • 16. Additional Information about Hubs • Most hubs contain 4 ports some have 5 or more ports. • Hubs can be used for a smaller network such as a home network or a small office network. • Hubs are not that expensive most range for less than $30. • Hubs may not be the best option for sophisticated or complex networks.
  • 17. What is a Switch? • Switches look similar to hubs in that they are rectangular in shape. • Manageable switches are usually a little bigger than unmanageable switches. • A switch also has ports on the back. Network switch – net gear.[online image]. Available http://www.senasum.blogspot.com, July 9, 2013
  • 18. How does a Switch work? • Switches work about the same way as hubs. Unlike hubs, switches can identify the destination of a packet. • Switches send information only to the computer that is suppose to receive the information. • Switches can also send and retrieve information at the same time which makes sending information faster to retrieve than hubs.
  • 19. Diagram of a Switch Network Switch Diagram. LindyConnectionPerfection.[online image]. Available http://www.lindy-international.com, July 9, 2013
  • 20. Additional Information about Switches • Switches are a better option than hubs for larger networks or home networks with 4 or more connected computers. • Switches can range in price from $30 up to $100 or more depending on if the switch is manageable or unmanageable, usually unmanageable switches are less in price versus managed switches.
  • 21. What is a Router? • A specialized computer programmed to interface between different networks. • Netgear-wndr4000-ddwrt-450 – Most Popular VPN Service Providers & DD-WRT Routers. [online image]. www.flashrouters.com, July 12, 2013.
  • 22. Diagram of a Router
  • 23. Additional Information about Routers • Routers make sure data sent over the Internet goes where it needs to go and not where it is not needed. • Acts like a traffic controller, working to cut down congestion throughout the network and keeps everything flowing smoothly along the best path. • Routers are the only type of equipment that looks at every single packet passing by on the network. • Home network router including wireless routers can cost anywhere from $40 to $150 or higher.
  • 24. What is a Bridge? • A hardware device used to create a connection between two separate computer networks or to divide one network into two. • Filters data traffic at a network boundary and reduces the amount of traffic on a LAN dividing it into two segments. • I -4E to Ethernet (10/100M) Network Bridge. [online image]. Network Bridge. Available at www.freewtc.com. July 12, 2013.
  • 25. How does a Bridge work? • Each bridge consist of a MAC address and operates at layer 2 of the OSI model • When a packet is received on the bridge ports the forwarding table including the MAC address is automatically updated to map the source MAC address to the network port from which the packet originated • The gateway then process the received packet according to the packet’s type.
  • 26. Diagram of a Bridge
  • 27. Additional Information about Bridges • A bridge examines each message on a LAN and passes the ones known to be within the same LAN. • Computer addresses have no relationship to location in a bridging network. • A bridge is sometimes referred to as a brouter. • Wireless network bridges can costs anywhere from $100 to $1000 or more depending on the type of bridge purchased.
  • 28. What is a Gateway? • A communication device that provides a remote network with connectivity to the host network. • Gateway Network Communications [online image]. Available www.hiwtc.com
  • 29. How a Gateway Works? • The gateway node acts like a proxy server and firewall • The gateway uses forwarding tables to determine where packet are to be sent
  • 31. Additional Information about Gateways • On the Internet a node or stopping point can be a gateway. • The computers controlling traffic within a network are gateway nodes. • A gateway is also associated with a router.
  • 32. What is a Firewall? • Hardware or software device that protects a computer network from unauthorized access. • Firewall Sling Secure Smartphone. [online image]. Available www.slingsecure.com
  • 33. How a Firewall works • Firewalls filters the information coming through the Internet connection into a user private network. • To control traffic in and out of the network firewalls one or more of the three methods are used including: – Packet filtering – Proxy service – Stateful inspection
  • 35. Additional Information about Firewalls • Most home network routers have built in firewall. • The term “firewall” originated from firefighting, where a firewall is a barrier established to prevent the spread of a fire. • A firewall works with the proxy server making request on behalf of workstation users. • There are a number of features firewalls can include from logging and reporting to setting alarms of an attack. • Costs for host based firewalls usually costs around $100 or less. Some may costs more depending on different things such as features included or if its an enterprise based system.
  • 36. What is a Wireless Access Point? • A small hardware device featuring built-in network adapter, antenna, and radio signals. • Configured nodes on a WLAN. • Wireless Access Points, Page 2. [online image]. Available compnetworking.about.com
  • 37. How a Wireless Access Point works? • Operates using radio frequency technology • Broadcast wireless signals computers can detect and use • A wireless network adapter is implemented while using a wireless access point, most computers today already have network adapters built into the computer.
  • 38. Diagram of Wireless Access Point RxNT – The eprescribing System. [online image]. Available www.rxnt.com
  • 39. Additional Information about Access Points • The access point usually connects to the router • A hotspot is a application wireless users can connect to the Internet. • Aps are used throughout a home network, usually through only one AP. • Wireless access points can cost anywhere from $30 and up depending on the type purchased.
  • 40. Endpoint/Edge Devices • Endpoint point devices (PCs, laptops, mobile devices and servers) • An edge device is any piece of hardware that controls data flow at the boundary between two networks. • Examples include routers, routing switches, integrated access devices, multiplexers, and a variety of metropolitan area network and wide area network access devices