3. Types Of Networks
•
LAN: Local Area Network
For Small Business
•
MAN: Metropolitan area network
For Cities or Campus
•
WAN: Wide Area Network
Regional or National Networks
4. Devices Used By Networks
•
Bridges (Old type of Switches)
•
Switches (For LAN basically connect Systems)
•
Routers (For inter- network communication)
10. Juniper Exams
•
JNCIA - Juniper Networks Certified Internet
Associate (10 exams)
•
JNCIP - Juniper Networks Certified Internet
Professional (8 exams)
•
JNCIE - Juniper Networks Certified Internet Expert
(6 exams)
•
JNCIS - Juniper Networks Certified Internet
Specialist (13 exams)
11. Network Operating System
•
A networking operating system (NOS), also
referred to as the Dialoguer, is the software
that runs on a server and enables the server to
manage data, users, groups, security,
applications, and other networking functions.
•
Cisco: Cisco IOS (Internetwork Operating
System) (C/C++)
•
Juniper: JUNOS (C/C++)
12. Types Of Security
•
Internet Security (In between Client and
Server)
•
Network Security (Inside the Network)
•
Application Security( Application SDLC)
13. Internet Security
•
Network Layer Security: By Cryptography on TCP/IP including
SSL & TLS.
•
IPsec Protocol: Including Authentication Header &
Encapsulating Security payload.
•
Security Token: Online Sites Providing 6-digit code changing
randomly in 30-60 Sec.
•
Electronic Mail security (Email): Using PGP (Pretty Good
Privacy) for encrypting.
•
Message Authentication Code: Encrypting message by using
Code.
14. •Firewalls: Screening Network Traffic
Types of Firewalls
•Packet Filters: Processing Data Packet by Packet
•Circuit-Level Gateways: Operates at network level
•Application-Level Gateways: Operates at application level.
15. •
Malicious Software & Antivirus
•
Malware: User is tricked to download a
software
•
Virus: Code to steal data
•
Trojan Horse: Pretends as secure but
malicious (Keygen)
•
Spyware: Monitor Activites
16. Application Security
•
Measures taken throughout application life-
cycle to prevent flaws in Security Policies.
Includes
•
Input Validation
•
Authentication
•
Authorization
•
Configuration Mgmt.
•
Exception Management
•
Logging
17. Network Security
It consists of the provisions and policies adopted
by a network administrator to prevent and
monitor unauthorized access, misuse,
modification, or denial of a computer network.
Key Things:
Policies, Administrator, monitor, network,misuse,
modification