chapter-2 telecommunications & network security

100
Chapter 2: Telecommunications & Network Security Page 1 of 100 Firewalls :

Upload: nrpradhan

Post on 03-Apr-2018

227 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Chapter-2 Telecommunications & Network Security

7/28/2019 Chapter-2 Telecommunications & Network Security

http://slidepdf.com/reader/full/chapter-2-telecommunications-network-security 1/100

Chapter 2: Telecommunications & Network Security

Page 1 of 100

Firewalls :

Page 2: Chapter-2 Telecommunications & Network Security

7/28/2019 Chapter-2 Telecommunications & Network Security

http://slidepdf.com/reader/full/chapter-2-telecommunications-network-security 2/100

Chapter 2: Telecommunications & Network Security

Page 2 of 100

Page 3: Chapter-2 Telecommunications & Network Security

7/28/2019 Chapter-2 Telecommunications & Network Security

http://slidepdf.com/reader/full/chapter-2-telecommunications-network-security 3/100

Chapter 2: Telecommunications & Network Security

Page 3 of 100

Page 4: Chapter-2 Telecommunications & Network Security

7/28/2019 Chapter-2 Telecommunications & Network Security

http://slidepdf.com/reader/full/chapter-2-telecommunications-network-security 4/100

Chapter 2: Telecommunications & Network Security

Page 4 of 100

Screened Subnet firewall is most secure and act as a Perimeter network. Access

o Primary Firewall Administratoro Backup Firewall Administratoro Network service Manager.

Boundary Controls eg . – Fences and firewalls State Packet Filter Firewall – is simple , inexpensive and quick to implement. Firewall – eg. Boundary access control. Static packet filter firewall – low-risk computing environment. Hybrid gateway firewall- medium to high-risk computing environment. Stateful and dynamic filter firewall- high risk computing environment. A rulebase – facilities implementing security controls in a firewalls. Firewall on a packet – Accept/Deny and Discard.

Best backup strategy – Day Zero Backup. Firewalls- protected for fail-safe performance. RPC,NFS and SNMP – should always be blocked and FTP should be restricted. Provide a “Line of perimeter defense” against attacks – Traffic to and from the Internet. Firewall Compromised – correct steps to rebuild the Firewll.

o Bring down the primary firewallo Deploy the secondary Firewallo Reconfigure the primary Firewallo Restore the primary firewall.

Packet filtering firewall are most vulnerable to attack.

Page 5: Chapter-2 Telecommunications & Network Security

7/28/2019 Chapter-2 Telecommunications & Network Security

http://slidepdf.com/reader/full/chapter-2-telecommunications-network-security 5/100

Chapter 2: Telecommunications & Network Security

Page 5 of 100

Primary component of Fiewallso Protocol filteringo Application gatewayso Extended logging capability.

Firewall implementations is a by-product of administering the security policy. Firewall is an effective security control over an Internet.

Attacks:

Denial of Service Attack :

DOS name Type Description Counter Measure

Land MalformedPacket

The land attack uses a spoofed SYN packetthat includes the victim’s IP address andTCP port as both source and destination.This attack targets the TCP/IP stack of olderunpatched windows system.

Smurf ResourceExhaustion

A smurf attck involves ICMP flooding. Theattacker sends ICMP Echo Request messageswith spoofed source addresses of the victimto the directed broadcast address of a

network known to be a Smurf amplifier. ASmurf amplifier is a public facing networkthat is misconfigured such that it willforward packets sent to the networkbroadcast address to each host in thenetwork. Assuming a /24 Smurf amplifier,this means that for every single spoofedICMP Echo Request sent the victim couldreceive up to 254 ICMP Echo Responses. Aswith most of resource exhaustion denial of service attack, prevention involves having

infrastructure that can filter the DOS traffic

Page 6: Chapter-2 Telecommunications & Network Security

7/28/2019 Chapter-2 Telecommunications & Network Security

http://slidepdf.com/reader/full/chapter-2-telecommunications-network-security 6/100

Chapter 2: Telecommunications & Network Security

Page 6 of 100

and /or an ISP that can provide assistance inthe traffic.

SYN Flood ResourceExhaustion

SYN Floods are the most basic type of resource exhaustion attacks, and involve anattacker , or attacker controlled machines,

initiating many connections to the victim,but not responding to the victim’s SYN/ACKpackets. The vicitim’s connection queue willeventually be unable to process any morenew connections. Configuring a system tomore quickly recycle half-open connectionscan help with this technique. As with mostof the resource exhaustion denial of serviceattacks, prevention involves havinginfrastructure that can filter the DOS trafficand/or an ISP that can provide assistance in

filtering the traffic.Teardrop Malformed

PacketThe teardrop attack is a malformed packetattack that targets issues with systems’fragmentation reassembly. The attackinvolves sending packets with overlappingfragment offsets, which can cause a systemattempting to reassemble the fragmentsissues.

Ping of Death MalformedPacket

The Ping of Death denial of service involvedsending a malformed ICMP Echo Request(ping) that was larger than the maximum

size of an IP packet. Historically, sending thePing of Death would crash systems.

Patching the TCP/IPstacks of systemsremoved the

vulnerability of thisDOS attack.

Fraggle ResourceExhaustion

The Fraggle attack is a variation of thesmurf’s attack. The main difference betweensmurf and fraggle leverages UDP for therequest portion, and stimulates, most likely,and ICMP Port Unreachable message beingsent to the victim rather than an ICMP EchoResponse.

DNSReflection

A more recent denial of service techniquethat, like the smurf attack, leverages a third

party is the DNS reflection attack. Theattacker who has poorly configured thirdparty DNS server query an attacker-controlled DNS server and cache theresponse(a maximum-size DNS record).Once the large record is cached by manythird party DNS Servers, the attacker sendsDNS requests for those records with aspoofed source of the victim. This causesthese extremely large DNS records to besent to the victim in response. As with most

of resource exhaustion denial of service

Page 7: Chapter-2 Telecommunications & Network Security

7/28/2019 Chapter-2 Telecommunications & Network Security

http://slidepdf.com/reader/full/chapter-2-telecommunications-network-security 7/100

Chapter 2: Telecommunications & Network Security

Page 7 of 100

attacks, prevention involves havinginfrastructure that can filter the DOS trafficand/or an ISP that can provide assistance infiltering the traffic.

Computer VirusCommon virus Malicious

CodeA malicious code that replicates using a hostprogram.An effective defence against computerviruses does not include –Virus scanningprograms.

Boot SectorVirus

The boot sector virus works duringcomputer booting , where the master bootsector and boot sector code are read andexecuted.

Worm A worm is a self-replicating program that isself-contained and does not require a hostprogram. The worm searches the networkfor idle computing resources and uses themto execute the program in small segments.

Multi-partite A multi-partite virus combines both sectorand file infector virus.

Cookies Web It raises privacy issues such as whatinformation is collected and how it is used.Internet privacy is not enhanced when thecookies file is delted. Deleting cookies filewill not protect the user since a new file iscreated by the browser therefore, thecookies file is a security concern on theinternet.

Link Viruses Manipulate the directory structure of themedia on which they are stored pointing tothe OS to virus code instead of legitimatecode.

Macro Stored in a spread sheet or word processingdocument. Maximum number of encounters.it is difficult to detect.

Attacks :Data leakageattack

Data leakage is removal of data from asystem by covert means. It might beconducted through the use of Trojan horse,logic bomb, or scavenging methods.

Asynchronousattacks

Are indirect attacks on a computer programthat act by altering legitimate data or codesat a time when the programs is idle, thencausing the changes to be added to thetarget program at later execution.

Inference An inference attack is where a user or an Access controls

Page 8: Chapter-2 Telecommunications & Network Security

7/28/2019 Chapter-2 Telecommunications & Network Security

http://slidepdf.com/reader/full/chapter-2-telecommunications-network-security 8/100

Chapter 2: Telecommunications & Network Security

Page 8 of 100

Attack intruder is able to deduce information towhich he had no privilege from informationto which he has privilege.Data & Information

Hidden code

attacks

Based on data and information Use layered protection

and disable active-content code.(e.g. Active-X and Javascript) from the Webbrowser are effectivecontrols against suchattacks.

Trapdoorattacks

Trapdoors are entry points built into aprogram created by programmers fordebugging purposes.Major Risks: software disconnection and

hacker entry.Back door is wide open for hackersThe vendor can modify the software at willwithout the user’s knowledge or permission.

War dialling software

Spoofingattacks

Firewall

TOC/TOU is ane.g. of asynchronousattacks

It takes advantage of timing differencesbetween two events.

Applying tasksequence rules.Apply encryption tools

Traffic analysis

Attack

Traffic padding

techniqueCG Scriptvulnerable

Because it can be interpreted.

Logic bomb A time bomb is a part of a logic bomb. Atime bomb is a Trojan horse set to trigger ata particular time while the logic bomb is setto trigger at a particular condition ,event orcommand.

Nak attack Is a penetration technique capitalizing on apotential weakness in an OS that does nothandle asynchronous interrupts properly,

thus leaving the system in an unprotectedstate during such interrupts.

Trojan horse Maliciouscode

It is a program that performs a usefulfunction and an unexpected action as well asa form of virus.DAC is most vulnerable to Trojan horseattack.Back Office is a Trojan horse in windows OS.

ComputerVirus

Maliciouscode

Computer viruses affect integrity, availabilityand usability.e-mail server is the best place to check for

computer virus.

Page 9: Chapter-2 Telecommunications & Network Security

7/28/2019 Chapter-2 Telecommunications & Network Security

http://slidepdf.com/reader/full/chapter-2-telecommunications-network-security 9/100

Chapter 2: Telecommunications & Network Security

Page 9 of 100

Applets Maliciouscode

Applets are small application programswritten in various programming languagesthat are automatically downloaded andexecuted by applet-enabled web browsers.

Antivirus

Methods

Malicious

code

Anti-virus software scans every boot-up

Polymorphicvirus

Maliciouscode

Uses a mutation engine to transform simpleviruses into polymorphic ones forproliferation purposes.

Maliciouscode defn.

“Remove” and “Clean” are usedinterchangeably.

Stealth virus It’s a resident virus.Active-Xcontrols

Can be easily exploited when executingbehind firewalls.Forms the basic component technology of the Active-X fram ework for Microsoft’s

software component technology , it isplatform specific in that Active-X contentscan be executed by only a 32-bit windowsplatform . it is language independent can bewritten in C,C++,VisualBasic and Java.

Java applets Has a sound security model to preventmalicious code behaviour.

ComputerVirus

Maliciouscode

An effective means of preventing anddetecting computer virus on a network .Technical measures to defend againstcomputer virus.

Certify all disks prior totheir use.Access controls , Audittrails, Least PrivilegePrinciple.

Eavesdroppingattack fromremote accessto Firewall s

Session encryption isused to encrypt databetween applicationsand end users. Thisprovides strongauthentication. Streamencryption encryptsand decryptsarbitrarily sized

messages, not a strongauthentication

Cryptographicattacks

Focus on Cryptographic parameters(CSPs-critical security parameters) contain keys ,passwords, PINs.

Ciphertext-only attack

The most common attack againstcryptographic.

Replay anearliersuccessfulauthenticationexchange

A time-stamp ,Asequence number, Anunpredictable value.

Page 10: Chapter-2 Telecommunications & Network Security

7/28/2019 Chapter-2 Telecommunications & Network Security

http://slidepdf.com/reader/full/chapter-2-telecommunications-network-security 10/100

Chapter 2: Telecommunications & Network Security

Page 10 of 100

Attacks Counter MeasureEavesdropping and loss of confidentialityEavesdropping also known assniffing or snooping of network traffic.

Encrypting the contents of the message or encryptingthe contents of thechannel over which it istransmitted.

Telephone cloning Electronic SignaturesCall-screening SystemDigital technologies

Telephone Tumbling attack Pre-Call Validation systemTumbling Attack Analog Cellular PhoneA technique used toperpetrate wireless Fraud

Cloning

Login Spoofing Providing a secure channelbetween the user and thesystem.Installing a hardware resetbuttonImplementing acryptographicauthentication techniques.

Session hijacking andEavesdropping (intrusion)Session hijacking : An attacker connecting acovert computer terminal toa data communication linebetween the authorizedterminal and the computer.Eavesdropping : A source of eavesdropping on the WWWweb server is : System logs

SSL

E-mail Spoofing Pretty good Privacy (PGP)-for the protection of computer files andelectronic mail.

Page 11: Chapter-2 Telecommunications & Network Security

7/28/2019 Chapter-2 Telecommunications & Network Security

http://slidepdf.com/reader/full/chapter-2-telecommunications-network-security 11/100

Chapter 2: Telecommunications & Network Security

Page 11 of 100

Confidentiality protection.Reprograms a Cellular phonewith an ESN/MIN Pair fromanother phone

Cloners

IP Address Spoofing : e.g.

session hijacking attacks.Not detected & reported byIDS.

User Firewall,Disable

active-content, use time-stamps.

TCP session hijacking Remove default accounts,install software patches,use encryption tools.

Cloning of Cellular phones Voice encryptionSniffers Use secure shell protocol,

apply end-to-endencryption, andImplement robust

authentication techniques.Flooding attacks Use packet filters

Brute Force Attack Every possible key will be tried. This issimilar to a known plain text attack.

Change keys and increasein key length.

Network Attack Prevent and Intervene-best approach

Mail bombings Caused by Temporaryaccounts setup by the ISP

Tunnelling AttackTo exploit a weakness in asystem that exists at a levelbelow the developer’s designlevel (such as throughoperating system code versusapplication code).Active Attack: NonPreventable and detectableE.g. – Active Threats :1.Denial of message service2.Masquerding.3.Modification of messageservice.

Cryptography

Passive Attack: Preventablebut difficult to detecte.g.1. Listing to a systempassword when the usertypes it.2. Release of messagecontents and traffic analysis.

Cryptography

Asynchronous Attacks Take the advantage of dynamic

Page 12: Chapter-2 Telecommunications & Network Security

7/28/2019 Chapter-2 Telecommunications & Network Security

http://slidepdf.com/reader/full/chapter-2-telecommunications-network-security 12/100

Chapter 2: Telecommunications & Network Security

Page 12 of 100

system actions and the ability tomanipulate the timing of thoseactions.

Hackers-trying to login tocomputer systems

Dial-back modems andfirewalls

Password sniffing One-time passwords andencryption.One – time passwords arenot susceptible toeavesdropping.

Voice hacker : Attack modem pools and access datanetworks through the private branchexchange (PBX) system.

Data hacker : Can steal information and damagecomputer systems.

Voice mail fraud A Call-accounting system

provides hacking patterns.Voice mail fraud preventioncontrols can be counterproductive and counterbalancing.

1.Turning off direct inwardsystem access(DISA) portsduring nonworking hours.2. disconnecting dial-inmaintenance ports.

Spoofing attack :- Is tempering activity – active attackImpersonating a user or systemSpoofing synonymous :Mimcking,impersonating,Masquerding

Firewalls

Spamming :

Posting indentical messagesto multiple unrelatednewsgroup on the internet.

E-mail filters are effective.

Sniffing or snooping :observing packet’s passing byon the network.Sniffing precedes SpoofingIs a surveillance activity and isa passive attack.Scanning,snooping andsniffing are lead to

penetration attacks.Sniffing is monitoringnetwork traffic.Hiddencode,Inference andTraffice analysis are based ondata and information.

Hidden code – 1. Use layered protections.2. Disable active-contentcode.

Bufferoverflow – eg. Of inputvalidation error.Ping of death e.g. –Bufferoverflow attack, a part of

Denial of service attack

Page 13: Chapter-2 Telecommunications & Network Security

7/28/2019 Chapter-2 Telecommunications & Network Security

http://slidepdf.com/reader/full/chapter-2-telecommunications-network-security 13/100

Chapter 2: Telecommunications & Network Security

Page 13 of 100

Denial of service attack Example :Flow exploitation attacks, Floodingattack,Distributed attacks,Smurf attack, SYN flood attack, Sendmailattack

It compromise Availability propertiesof information systems.Most malicious Internet-based attack.Connection clogging –denial-of-serviceattacks is less common in occurance.

1.Use faster hardware2.use packet filters.3. it can be prevented byRedundancy

MIM attacks 1.Implement digitalsignatures2.use split knowledgeprocedures.

Locking-based attacks-Degradation of service.

Shoulder surfing 1.promoting educationand awareness2.preventing passwordguessing.3.Asking people not towatch while password isbeing typed.Packet spoofing :Is the most sophisticatedtool or technique thatattackers use against

computer systems.

Packet replay Packet-time stamping andpacket-sequence counting.

Impersonation :can beachieved byForgery , Relay andInterception.

Masquerading attacks Detective controls :Reporting of the last time

user accessed the system.Analysing audit logs and

journalsPassive detectionmethods, logs are notreviewed unless there is asuspicion.

Attacks plus breach A PenetrationTCP Sequence number check

– e.g. Session hijacking attack.Piggyback attack :An intruder gainsunauthorized access to a

system by using a valid user’s

Page 14: Chapter-2 Telecommunications & Network Security

7/28/2019 Chapter-2 Telecommunications & Network Security

http://slidepdf.com/reader/full/chapter-2-telecommunications-network-security 14/100

Chapter 2: Telecommunications & Network Security

Page 14 of 100

connection.Teardrop attack :Freezes vulnerablewindows95 and linux hosts byexploiting a bug in the

fragemented packet rea-assembly routines.Locking attack :Prevents users from accessingand running shared programssuch as those found inMicrosoft office.Boot Sector :During computer booting,where the master bootsector and boot sector code

are read and executed.Worm : A worm is self replicating program

that is self-contained and does notrequire a host program.Searches the network for the idlecomputing resources and executes theprogram in small segments.

Multi-partite virus :Combines both sector and fileinfector viruses.

Antivirus software : eg. of both preventive anddetective control.Audit Trails : DetectivecontrolPolicies and procedure :directive controlsContingency plan : recoverycontrols.Data leakage attacks : is

removal of data from asystem by covert means.itmight be conducted throughthe use of Trojan horse,logicbombs, or scavengingmethods.

Inference attacks are basedon : Data and informationLink viruses : manipulate thedirectory structure of the

media on which they are

Page 15: Chapter-2 Telecommunications & Network Security

7/28/2019 Chapter-2 Telecommunications & Network Security

http://slidepdf.com/reader/full/chapter-2-telecommunications-network-security 15/100

Chapter 2: Telecommunications & Network Security

Page 15 of 100

stored, pointing the operatingsystem to virus code insteadof legitimate code.Macro virus – are stored In a spreadsheet or word

processing document.

Had the maximum number of encounters.It is difficult to detect .It resides in documents.

Trapdoor Programmers frequently create entrypoints into a program for debuggingpurposes and/or insertion of newprogram codes at a later date.its alsocalled as hooks and back doors.Software disconnection and hackerentry are major risk.

War dialing software

Time-of-check to time-of-use(TOC/TOU) e.g. of Asynchronous attack

1.Apply task sequencerules.2.Apply encryption rules.

Traffic analysis attack Traffic padding techniqueData inference attacks Access controlsLogic bomb(time bomb) : A malicious unauthorized act that is

triggered upon information of apredefined event or condition andresides within a computer program isknown as .A time bomb is a Trojan horse set to

trigger at a particular time while thelogic bomb is set to trigger at aparticular condition,event orcommand. The Logic bomb could be acomputer program or a codefragment.

Trojan horse It is a program that performs a usefulfunction and unexpected action aswell a form of virus.Discretionary access control – mostvulnerable to Trojan horse attack.

Backoffice – is a Trojan horse in aWindows operating system.

Computer Virues Affect – integrity,availability anduseability.Remove and Clean are usedinterchangeably.Password : technical measure .

Antivirus method Anti-virus software scans evry boot-up.

e-Mail Server Best place to check for Computervirus.

A Polymorphic Virus Used A Mutation Engine

Page 16: Chapter-2 Telecommunications & Network Security

7/28/2019 Chapter-2 Telecommunications & Network Security

http://slidepdf.com/reader/full/chapter-2-telecommunications-network-security 16/100

Page 17: Chapter-2 Telecommunications & Network Security

7/28/2019 Chapter-2 Telecommunications & Network Security

http://slidepdf.com/reader/full/chapter-2-telecommunications-network-security 17/100

Chapter 2: Telecommunications & Network Security

Page 17 of 100

Active Wiretapping Message stream modifications,including delay, duplication, deletion,or counterfeiting.

Tools :1. Packet spoofing :Is the most sophisticated toolor technique that attackersuse against computersystems.2.Nmap is a sophisticatednetwork-scanning tool.

Ping : Tells the location of a phone user. Merit Protection :

o Privacy of location and privacy of transmission of contents. Secure

o Digital systems are inherently more secure that analog cellular telephony because of their digital formats and error-checking and correction protocols.

Page 18: Chapter-2 Telecommunications & Network Security

7/28/2019 Chapter-2 Telecommunications & Network Security

http://slidepdf.com/reader/full/chapter-2-telecommunications-network-security 18/100

Chapter 2: Telecommunications & Network Security

Page 18 of 100

o TDMA or CDMA use spread spectrum much more effectively than analog cellular andother traditional systems.

o CDMA is inherently efficient and difficult to intercept. Its more efficient and securethan TDMA because its uses spread spectrum technology more efficiently. Its moredifficult to crack because the coding scheme changes with each conversation and isgiven only once at the beginning of the transmission.

RSA - Voice encryption schemes are based on RSA algorithm to provide privacy protectionover mobile or cellular phones.

As per the U.S. lawo when scanner is used with intent to defraud is illegal. Possession or sale of

electronic serial number (ESN) altering software is currently legal.o Phone cloning and call selling – illegal.

Remote Access:

RAS – Provides a security service in authenticating a remote network access.

Protocols:

Protocols CharacteristicsSSL Session-oriented protocol

Public key (digital certificates) + symmetric key(DES) cryptography to perform

Page 19: Chapter-2 Telecommunications & Network Security

7/28/2019 Chapter-2 Telecommunications & Network Security

http://slidepdf.com/reader/full/chapter-2-telecommunications-network-security 19/100

Chapter 2: Telecommunications & Network Security

Page 19 of 100

authentication and encryption. It has become the de facto standard for securecommunication on the internet.Strong authentication for Web server.All the Web network traffic dealing with a Firewall system is secured.TLS supports the SSL to perform client-to-server authentication process.

PPTP Hiding capabilities and is useful to implement end-to-end VPNIPSEC- Supersedes PPTPAuthentication at end nodes(limitations)

IPSEC Implemented on a Firewall for VPNs.Ethernet Connectionless data communications.X.25 Connection –oriented data communication.TCP Connection –oriented data communication.WAN Connection –oriented data communication.WTLS Communications protocol that allows a cellular phones to send and receive encrypted

information over the internet.WTP Wireless transaction protocolWSP Wireless session protocolWDP Wireless datagram protocolWAP Wireless access protocol is an internet protocol that defines the way in which cell

phones and similar devices can access the internet.SecureRPC

Diffie-Hellman key – each user has a private/public key.The authentication servers provides public/private keys to servers and clients.Provides authentication service.

ARP Provides a dynamic mapping of a 32 bit IP Address to a 48-bit physical hardwareaddress.

X.509 PEM standard for secure e-mail on the internet that support services such asencryption, digital signatures and digital certificates.

X3.93 Data encryption algorithmX9.9 Message authenticationX9.17 Cryptographic key management for financial institution key management.X.25FrameRelay

Packet switching

X9.63 Key establishment schemes that employ asymmetric techniques.X9.44 Is transport of symmetric algorithm keys using reversible public key cryptography.X.75 Public packet switched communications between network hubs.SET Secure transactions over the internet in terms of buying and selling of goods and

services.TLS Prevent Eavesdropping , tampering or message forgery. Communication privacy and

data integrity over the internet.CHAP Re-authenticationSLIP Does not provide error detection or correction mechanism.ICMP Function-Redirecting messages is used to trick routers and hosts.

Checking remote hosts function of ICMP of TCP/IP cause a buffer overflow on thetarget machine.

TCP Used by the InternetSNA Used by IBMDECnet Used by Digital Equipment Corporation

MAP Manufacturing Automation Protocol.

Page 20: Chapter-2 Telecommunications & Network Security

7/28/2019 Chapter-2 Telecommunications & Network Security

http://slidepdf.com/reader/full/chapter-2-telecommunications-network-security 20/100

Page 21: Chapter-2 Telecommunications & Network Security

7/28/2019 Chapter-2 Telecommunications & Network Security

http://slidepdf.com/reader/full/chapter-2-telecommunications-network-security 21/100

Chapter 2: Telecommunications & Network Security

Page 21 of 100

SSL : Strong authentication for the Web Server.

VPN :

A VPN creates a secure , private network over the internet – Encryption, Packet tunnelling ,

Firewalls. Make only one entry point to a company’s network from the internet.

Intranet:

The integration of personal computers, LAN, WAN , mainframe legacy systems, and externalsystems.

It can be used to link employees together , thus enabling easy communication, collaboration,and workflow.

Help in resolving document distribution problems and in increasing employee productivity in

an organization.

Communications and Network Security :

Bypass Switch Fallback Switch Crossover Switch Matrix Switch

Page 22: Chapter-2 Telecommunications & Network Security

7/28/2019 Chapter-2 Telecommunications & Network Security

http://slidepdf.com/reader/full/chapter-2-telecommunications-network-security 22/100

Chapter 2: Telecommunications & Network Security

Page 22 of 100

Page 23: Chapter-2 Telecommunications & Network Security

7/28/2019 Chapter-2 Telecommunications & Network Security

http://slidepdf.com/reader/full/chapter-2-telecommunications-network-security 23/100

Chapter 2: Telecommunications & Network Security

Page 23 of 100

Page 24: Chapter-2 Telecommunications & Network Security

7/28/2019 Chapter-2 Telecommunications & Network Security

http://slidepdf.com/reader/full/chapter-2-telecommunications-network-security 24/100

Chapter 2: Telecommunications & Network Security

Page 24 of 100

Page 25: Chapter-2 Telecommunications & Network Security

7/28/2019 Chapter-2 Telecommunications & Network Security

http://slidepdf.com/reader/full/chapter-2-telecommunications-network-security 25/100

Chapter 2: Telecommunications & Network Security

Page 25 of 100

Page 26: Chapter-2 Telecommunications & Network Security

7/28/2019 Chapter-2 Telecommunications & Network Security

http://slidepdf.com/reader/full/chapter-2-telecommunications-network-security 26/100

Chapter 2: Telecommunications & Network Security

Page 26 of 100

Page 27: Chapter-2 Telecommunications & Network Security

7/28/2019 Chapter-2 Telecommunications & Network Security

http://slidepdf.com/reader/full/chapter-2-telecommunications-network-security 27/100

Page 28: Chapter-2 Telecommunications & Network Security

7/28/2019 Chapter-2 Telecommunications & Network Security

http://slidepdf.com/reader/full/chapter-2-telecommunications-network-security 28/100

Page 29: Chapter-2 Telecommunications & Network Security

7/28/2019 Chapter-2 Telecommunications & Network Security

http://slidepdf.com/reader/full/chapter-2-telecommunications-network-security 29/100

Chapter 2: Telecommunications & Network Security

Page 29 of 100

Page 30: Chapter-2 Telecommunications & Network Security

7/28/2019 Chapter-2 Telecommunications & Network Security

http://slidepdf.com/reader/full/chapter-2-telecommunications-network-security 30/100

Chapter 2: Telecommunications & Network Security

Page 30 of 100

Page 31: Chapter-2 Telecommunications & Network Security

7/28/2019 Chapter-2 Telecommunications & Network Security

http://slidepdf.com/reader/full/chapter-2-telecommunications-network-security 31/100

Chapter 2: Telecommunications & Network Security

Page 31 of 100

Page 32: Chapter-2 Telecommunications & Network Security

7/28/2019 Chapter-2 Telecommunications & Network Security

http://slidepdf.com/reader/full/chapter-2-telecommunications-network-security 32/100

Chapter 2: Telecommunications & Network Security

Page 32 of 100

Page 33: Chapter-2 Telecommunications & Network Security

7/28/2019 Chapter-2 Telecommunications & Network Security

http://slidepdf.com/reader/full/chapter-2-telecommunications-network-security 33/100

Page 34: Chapter-2 Telecommunications & Network Security

7/28/2019 Chapter-2 Telecommunications & Network Security

http://slidepdf.com/reader/full/chapter-2-telecommunications-network-security 34/100

Chapter 2: Telecommunications & Network Security

Page 34 of 100

Page 35: Chapter-2 Telecommunications & Network Security

7/28/2019 Chapter-2 Telecommunications & Network Security

http://slidepdf.com/reader/full/chapter-2-telecommunications-network-security 35/100

Chapter 2: Telecommunications & Network Security

Page 35 of 100

Page 36: Chapter-2 Telecommunications & Network Security

7/28/2019 Chapter-2 Telecommunications & Network Security

http://slidepdf.com/reader/full/chapter-2-telecommunications-network-security 36/100

Chapter 2: Telecommunications & Network Security

Page 36 of 100

Page 37: Chapter-2 Telecommunications & Network Security

7/28/2019 Chapter-2 Telecommunications & Network Security

http://slidepdf.com/reader/full/chapter-2-telecommunications-network-security 37/100

Chapter 2: Telecommunications & Network Security

Page 37 of 100

Page 38: Chapter-2 Telecommunications & Network Security

7/28/2019 Chapter-2 Telecommunications & Network Security

http://slidepdf.com/reader/full/chapter-2-telecommunications-network-security 38/100

Chapter 2: Telecommunications & Network Security

Page 38 of 100

Page 39: Chapter-2 Telecommunications & Network Security

7/28/2019 Chapter-2 Telecommunications & Network Security

http://slidepdf.com/reader/full/chapter-2-telecommunications-network-security 39/100

Chapter 2: Telecommunications & Network Security

Page 39 of 100

Page 40: Chapter-2 Telecommunications & Network Security

7/28/2019 Chapter-2 Telecommunications & Network Security

http://slidepdf.com/reader/full/chapter-2-telecommunications-network-security 40/100

Chapter 2: Telecommunications & Network Security

Page 40 of 100

Page 41: Chapter-2 Telecommunications & Network Security

7/28/2019 Chapter-2 Telecommunications & Network Security

http://slidepdf.com/reader/full/chapter-2-telecommunications-network-security 41/100

Chapter 2: Telecommunications & Network Security

Page 41 of 100

Page 42: Chapter-2 Telecommunications & Network Security

7/28/2019 Chapter-2 Telecommunications & Network Security

http://slidepdf.com/reader/full/chapter-2-telecommunications-network-security 42/100

Page 43: Chapter-2 Telecommunications & Network Security

7/28/2019 Chapter-2 Telecommunications & Network Security

http://slidepdf.com/reader/full/chapter-2-telecommunications-network-security 43/100

Chapter 2: Telecommunications & Network Security

Page 43 of 100

Page 44: Chapter-2 Telecommunications & Network Security

7/28/2019 Chapter-2 Telecommunications & Network Security

http://slidepdf.com/reader/full/chapter-2-telecommunications-network-security 44/100

Chapter 2: Telecommunications & Network Security

Page 44 of 100

Page 45: Chapter-2 Telecommunications & Network Security

7/28/2019 Chapter-2 Telecommunications & Network Security

http://slidepdf.com/reader/full/chapter-2-telecommunications-network-security 45/100

Chapter 2: Telecommunications & Network Security

Page 45 of 100

Page 46: Chapter-2 Telecommunications & Network Security

7/28/2019 Chapter-2 Telecommunications & Network Security

http://slidepdf.com/reader/full/chapter-2-telecommunications-network-security 46/100

Chapter 2: Telecommunications & Network Security

Page 46 of 100

Page 47: Chapter-2 Telecommunications & Network Security

7/28/2019 Chapter-2 Telecommunications & Network Security

http://slidepdf.com/reader/full/chapter-2-telecommunications-network-security 47/100

Chapter 2: Telecommunications & Network Security

Page 47 of 100

Page 48: Chapter-2 Telecommunications & Network Security

7/28/2019 Chapter-2 Telecommunications & Network Security

http://slidepdf.com/reader/full/chapter-2-telecommunications-network-security 48/100

Chapter 2: Telecommunications & Network Security

Page 48 of 100

Page 49: Chapter-2 Telecommunications & Network Security

7/28/2019 Chapter-2 Telecommunications & Network Security

http://slidepdf.com/reader/full/chapter-2-telecommunications-network-security 49/100

Chapter 2: Telecommunications & Network Security

Page 49 of 100

Page 50: Chapter-2 Telecommunications & Network Security

7/28/2019 Chapter-2 Telecommunications & Network Security

http://slidepdf.com/reader/full/chapter-2-telecommunications-network-security 50/100

Chapter 2: Telecommunications & Network Security

Page 50 of 100

Page 51: Chapter-2 Telecommunications & Network Security

7/28/2019 Chapter-2 Telecommunications & Network Security

http://slidepdf.com/reader/full/chapter-2-telecommunications-network-security 51/100

Chapter 2: Telecommunications & Network Security

Page 51 of 100

Page 52: Chapter-2 Telecommunications & Network Security

7/28/2019 Chapter-2 Telecommunications & Network Security

http://slidepdf.com/reader/full/chapter-2-telecommunications-network-security 52/100

Chapter 2: Telecommunications & Network Security

Page 52 of 100

Page 53: Chapter-2 Telecommunications & Network Security

7/28/2019 Chapter-2 Telecommunications & Network Security

http://slidepdf.com/reader/full/chapter-2-telecommunications-network-security 53/100

Chapter 2: Telecommunications & Network Security

Page 53 of 100

Page 54: Chapter-2 Telecommunications & Network Security

7/28/2019 Chapter-2 Telecommunications & Network Security

http://slidepdf.com/reader/full/chapter-2-telecommunications-network-security 54/100

Page 55: Chapter-2 Telecommunications & Network Security

7/28/2019 Chapter-2 Telecommunications & Network Security

http://slidepdf.com/reader/full/chapter-2-telecommunications-network-security 55/100

Chapter 2: Telecommunications & Network Security

Page 55 of 100

Page 56: Chapter-2 Telecommunications & Network Security

7/28/2019 Chapter-2 Telecommunications & Network Security

http://slidepdf.com/reader/full/chapter-2-telecommunications-network-security 56/100

Chapter 2: Telecommunications & Network Security

Page 56 of 100

Page 57: Chapter-2 Telecommunications & Network Security

7/28/2019 Chapter-2 Telecommunications & Network Security

http://slidepdf.com/reader/full/chapter-2-telecommunications-network-security 57/100

Chapter 2: Telecommunications & Network Security

Page 57 of 100

Page 58: Chapter-2 Telecommunications & Network Security

7/28/2019 Chapter-2 Telecommunications & Network Security

http://slidepdf.com/reader/full/chapter-2-telecommunications-network-security 58/100

Chapter 2: Telecommunications & Network Security

Page 58 of 100

Page 59: Chapter-2 Telecommunications & Network Security

7/28/2019 Chapter-2 Telecommunications & Network Security

http://slidepdf.com/reader/full/chapter-2-telecommunications-network-security 59/100

Chapter 2: Telecommunications & Network Security

Page 59 of 100

Page 60: Chapter-2 Telecommunications & Network Security

7/28/2019 Chapter-2 Telecommunications & Network Security

http://slidepdf.com/reader/full/chapter-2-telecommunications-network-security 60/100

Chapter 2: Telecommunications & Network Security

Page 60 of 100

Page 61: Chapter-2 Telecommunications & Network Security

7/28/2019 Chapter-2 Telecommunications & Network Security

http://slidepdf.com/reader/full/chapter-2-telecommunications-network-security 61/100

Chapter 2: Telecommunications & Network Security

Page 61 of 100

Page 62: Chapter-2 Telecommunications & Network Security

7/28/2019 Chapter-2 Telecommunications & Network Security

http://slidepdf.com/reader/full/chapter-2-telecommunications-network-security 62/100

Chapter 2: Telecommunications & Network Security

Page 62 of 100

Page 63: Chapter-2 Telecommunications & Network Security

7/28/2019 Chapter-2 Telecommunications & Network Security

http://slidepdf.com/reader/full/chapter-2-telecommunications-network-security 63/100

Chapter 2: Telecommunications & Network Security

Page 63 of 100

Page 64: Chapter-2 Telecommunications & Network Security

7/28/2019 Chapter-2 Telecommunications & Network Security

http://slidepdf.com/reader/full/chapter-2-telecommunications-network-security 64/100

Chapter 2: Telecommunications & Network Security

Page 64 of 100

Page 65: Chapter-2 Telecommunications & Network Security

7/28/2019 Chapter-2 Telecommunications & Network Security

http://slidepdf.com/reader/full/chapter-2-telecommunications-network-security 65/100

Chapter 2: Telecommunications & Network Security

Page 65 of 100

Page 66: Chapter-2 Telecommunications & Network Security

7/28/2019 Chapter-2 Telecommunications & Network Security

http://slidepdf.com/reader/full/chapter-2-telecommunications-network-security 66/100

Chapter 2: Telecommunications & Network Security

Page 66 of 100

Page 67: Chapter-2 Telecommunications & Network Security

7/28/2019 Chapter-2 Telecommunications & Network Security

http://slidepdf.com/reader/full/chapter-2-telecommunications-network-security 67/100

Chapter 2: Telecommunications & Network Security

Page 67 of 100

Page 68: Chapter-2 Telecommunications & Network Security

7/28/2019 Chapter-2 Telecommunications & Network Security

http://slidepdf.com/reader/full/chapter-2-telecommunications-network-security 68/100

Chapter 2: Telecommunications & Network Security

Page 68 of 100

Page 69: Chapter-2 Telecommunications & Network Security

7/28/2019 Chapter-2 Telecommunications & Network Security

http://slidepdf.com/reader/full/chapter-2-telecommunications-network-security 69/100

Chapter 2: Telecommunications & Network Security

Page 69 of 100

Page 70: Chapter-2 Telecommunications & Network Security

7/28/2019 Chapter-2 Telecommunications & Network Security

http://slidepdf.com/reader/full/chapter-2-telecommunications-network-security 70/100

Page 71: Chapter-2 Telecommunications & Network Security

7/28/2019 Chapter-2 Telecommunications & Network Security

http://slidepdf.com/reader/full/chapter-2-telecommunications-network-security 71/100

Chapter 2: Telecommunications & Network Security

Page 71 of 100

Page 72: Chapter-2 Telecommunications & Network Security

7/28/2019 Chapter-2 Telecommunications & Network Security

http://slidepdf.com/reader/full/chapter-2-telecommunications-network-security 72/100

Page 73: Chapter-2 Telecommunications & Network Security

7/28/2019 Chapter-2 Telecommunications & Network Security

http://slidepdf.com/reader/full/chapter-2-telecommunications-network-security 73/100

Chapter 2: Telecommunications & Network Security

Page 73 of 100

Page 74: Chapter-2 Telecommunications & Network Security

7/28/2019 Chapter-2 Telecommunications & Network Security

http://slidepdf.com/reader/full/chapter-2-telecommunications-network-security 74/100

Chapter 2: Telecommunications & Network Security

Page 74 of 100

Page 75: Chapter-2 Telecommunications & Network Security

7/28/2019 Chapter-2 Telecommunications & Network Security

http://slidepdf.com/reader/full/chapter-2-telecommunications-network-security 75/100

Chapter 2: Telecommunications & Network Security

Page 75 of 100

Page 76: Chapter-2 Telecommunications & Network Security

7/28/2019 Chapter-2 Telecommunications & Network Security

http://slidepdf.com/reader/full/chapter-2-telecommunications-network-security 76/100

Chapter 2: Telecommunications & Network Security

Page 76 of 100

Page 77: Chapter-2 Telecommunications & Network Security

7/28/2019 Chapter-2 Telecommunications & Network Security

http://slidepdf.com/reader/full/chapter-2-telecommunications-network-security 77/100

Chapter 2: Telecommunications & Network Security

Page 77 of 100

Page 78: Chapter-2 Telecommunications & Network Security

7/28/2019 Chapter-2 Telecommunications & Network Security

http://slidepdf.com/reader/full/chapter-2-telecommunications-network-security 78/100

Chapter 2: Telecommunications & Network Security

Page 78 of 100

Page 79: Chapter-2 Telecommunications & Network Security

7/28/2019 Chapter-2 Telecommunications & Network Security

http://slidepdf.com/reader/full/chapter-2-telecommunications-network-security 79/100

Chapter 2: Telecommunications & Network Security

Page 79 of 100

Page 80: Chapter-2 Telecommunications & Network Security

7/28/2019 Chapter-2 Telecommunications & Network Security

http://slidepdf.com/reader/full/chapter-2-telecommunications-network-security 80/100

Chapter 2: Telecommunications & Network Security

Page 80 of 100

Page 81: Chapter-2 Telecommunications & Network Security

7/28/2019 Chapter-2 Telecommunications & Network Security

http://slidepdf.com/reader/full/chapter-2-telecommunications-network-security 81/100

Chapter 2: Telecommunications & Network Security

Page 81 of 100

Page 82: Chapter-2 Telecommunications & Network Security

7/28/2019 Chapter-2 Telecommunications & Network Security

http://slidepdf.com/reader/full/chapter-2-telecommunications-network-security 82/100

Chapter 2: Telecommunications & Network Security

Page 82 of 100

Page 83: Chapter-2 Telecommunications & Network Security

7/28/2019 Chapter-2 Telecommunications & Network Security

http://slidepdf.com/reader/full/chapter-2-telecommunications-network-security 83/100

Chapter 2: Telecommunications & Network Security

Page 83 of 100

Page 84: Chapter-2 Telecommunications & Network Security

7/28/2019 Chapter-2 Telecommunications & Network Security

http://slidepdf.com/reader/full/chapter-2-telecommunications-network-security 84/100

Chapter 2: Telecommunications & Network Security

Page 84 of 100

Page 85: Chapter-2 Telecommunications & Network Security

7/28/2019 Chapter-2 Telecommunications & Network Security

http://slidepdf.com/reader/full/chapter-2-telecommunications-network-security 85/100

Chapter 2: Telecommunications & Network Security

Page 85 of 100

Page 86: Chapter-2 Telecommunications & Network Security

7/28/2019 Chapter-2 Telecommunications & Network Security

http://slidepdf.com/reader/full/chapter-2-telecommunications-network-security 86/100

Chapter 2: Telecommunications & Network Security

Page 86 of 100

Page 87: Chapter-2 Telecommunications & Network Security

7/28/2019 Chapter-2 Telecommunications & Network Security

http://slidepdf.com/reader/full/chapter-2-telecommunications-network-security 87/100

Chapter 2: Telecommunications & Network Security

Page 87 of 100

Page 88: Chapter-2 Telecommunications & Network Security

7/28/2019 Chapter-2 Telecommunications & Network Security

http://slidepdf.com/reader/full/chapter-2-telecommunications-network-security 88/100

Chapter 2: Telecommunications & Network Security

Page 88 of 100

Page 89: Chapter-2 Telecommunications & Network Security

7/28/2019 Chapter-2 Telecommunications & Network Security

http://slidepdf.com/reader/full/chapter-2-telecommunications-network-security 89/100

Chapter 2: Telecommunications & Network Security

Page 89 of 100

Page 90: Chapter-2 Telecommunications & Network Security

7/28/2019 Chapter-2 Telecommunications & Network Security

http://slidepdf.com/reader/full/chapter-2-telecommunications-network-security 90/100

Chapter 2: Telecommunications & Network Security

Page 90 of 100

Page 91: Chapter-2 Telecommunications & Network Security

7/28/2019 Chapter-2 Telecommunications & Network Security

http://slidepdf.com/reader/full/chapter-2-telecommunications-network-security 91/100

Chapter 2: Telecommunications & Network Security

Page 91 of 100

Page 92: Chapter-2 Telecommunications & Network Security

7/28/2019 Chapter-2 Telecommunications & Network Security

http://slidepdf.com/reader/full/chapter-2-telecommunications-network-security 92/100

Chapter 2: Telecommunications & Network Security

Page 92 of 100

Page 93: Chapter-2 Telecommunications & Network Security

7/28/2019 Chapter-2 Telecommunications & Network Security

http://slidepdf.com/reader/full/chapter-2-telecommunications-network-security 93/100

Chapter 2: Telecommunications & Network Security

Page 93 of 100

Page 94: Chapter-2 Telecommunications & Network Security

7/28/2019 Chapter-2 Telecommunications & Network Security

http://slidepdf.com/reader/full/chapter-2-telecommunications-network-security 94/100

Chapter 2: Telecommunications & Network Security

Page 94 of 100

Page 95: Chapter-2 Telecommunications & Network Security

7/28/2019 Chapter-2 Telecommunications & Network Security

http://slidepdf.com/reader/full/chapter-2-telecommunications-network-security 95/100

Chapter 2: Telecommunications & Network Security

Page 95 of 100

Page 96: Chapter-2 Telecommunications & Network Security

7/28/2019 Chapter-2 Telecommunications & Network Security

http://slidepdf.com/reader/full/chapter-2-telecommunications-network-security 96/100

Chapter 2: Telecommunications & Network Security

Page 96 of 100

Page 97: Chapter-2 Telecommunications & Network Security

7/28/2019 Chapter-2 Telecommunications & Network Security

http://slidepdf.com/reader/full/chapter-2-telecommunications-network-security 97/100

Chapter 2: Telecommunications & Network Security

Page 97 of 100

Page 98: Chapter-2 Telecommunications & Network Security

7/28/2019 Chapter-2 Telecommunications & Network Security

http://slidepdf.com/reader/full/chapter-2-telecommunications-network-security 98/100

Chapter 2: Telecommunications & Network Security

Page 98 of 100

Page 99: Chapter-2 Telecommunications & Network Security

7/28/2019 Chapter-2 Telecommunications & Network Security

http://slidepdf.com/reader/full/chapter-2-telecommunications-network-security 99/100

Chapter 2: Telecommunications & Network Security

Page 99 of 100

Page 100: Chapter-2 Telecommunications & Network Security

7/28/2019 Chapter-2 Telecommunications & Network Security

http://slidepdf.com/reader/full/chapter-2-telecommunications-network-security 100/100

Chapter 2: Telecommunications & Network Security