0 ratings0% found this document useful (0 votes) 46 views19 pagesCyber Security Unit 1
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content,
claim it here.
Available Formats
Download as PDF or read online on Scribd
UNIT-1'
Difference blew ast and tce/re:-
ost
OST yptesests open
Tee/xrpe
ao Tee/zte model re ants
SY¥Skm Inkerconnection the transmission
Contvo! — pretecal/ tnterne
pre teocal:
Wy oSz 18 generic , @vot@cal |ciis tce/te model deends
in dependent Standard or Standard protocals
Tt vs acting as an about which the
interaction gate way Computey network
Wish ikey . netisevis, ana has created - TE iy
USer + @ Connection protscal
thor ARS igns the
Network of the host:
Giz) The ost mode! was [did the protocals cere
developed first, and Created first aad
then pystreab were then boilk = the
crated to Frkt the tee/te model.
Netusovic » Corch s tectures
—te: Ws st deat pevie
y)
provides cyvality
Sewices.
the osx model
Teprasentonts admin ivty-
ation, interfaces and
Conven tions.
Ww
quality Sey vices -
TE doesn’t mention
bhe services interfaces
and protcals,(Wid TE is difficolk as
disting vished te
Tee/re
wid tt provides both
conneckiva & Connection-
Wy TE bs Simpilar than
ost.
wid se ervides connec Lia.
less teas mision,
vill) Th weg wed tia]
1 KPA OUch ¥
Gea, The 5 mmoullasd '”” ibe
Of tee/te header is
20 bykes.,
legs) ‘transmission.
wilh TL uses. ahevizsnt!
' al approach.
eo the smatlest Size
a af “ost header is
5 bytes Abeer
qin te
OSt “Model ©
Ter/ze Model
Application ‘ Layey
Presentation Layer
Session Layer
Transport Loyey
Network Layey
Detter. Link, Layey
“Application Layer
Transgovt Layer
Network Access’ "Layer
Physical Layer=
cybew / cyber crime / cyber secori ty: |
cyboer +
— > ‘tn the last latio’s the eves Cyke nekics
was coined by mothe matician Noy bey &
Wiener”.
> cyber is ao prefix! thot denotes a vela tionship
with It» Ctnrftymation — techho lag y).
> Any thing relating "bo _ Competing such as 2
ilintemet’s ! aun el technology : 2
> .Te can relate 4. ail Lhe aspects of
computing tncluding Stoving data, 1 PYekecting
dado, accessing data, PYECESSing dato. .
bransmitting data, and linking data:
D> the Bhree, amet — of Common ,, eymp, oof
cyber axes. /
@ cyber attack
© cyber crime
©... cyber: .8 paces
@ cyber ottackrs, This on “a ea ee te ‘disvopt,
disable, destroy Ce) Control aL com/py ter
envifenmenty oy cus soi ,
aD | i
© cyber crime i cyber crime js eny orme
which ts carried ovt using — infoymation
techno logy «© cyber space: cyber. space iy.» the
sto oye and caw
compe tex
where data
using ne twovlky occur:
Network devices CHub, Repeater By idge, switch
— = — TS Ve Oe
Rovtex, Gateways and Brouter)
= — —_
Network devices. Network devices also kknoton
Os Networking haydusore
7 xe; physical devices
that allow havdware on a Compotey
network to Communicate and interact
saith «ane, anather, \' poy “example “Repeater
1, Switch,
| Rovtevs) Gabewsiy, Brouky
eee ;
Ud Repeaber:t
>A “qepeater © operabes at the. physica! layer
si bl gee is bo, reg enevate ,, the , signal
over the = same network before, the
Signal becomes tec Weak Cor) crvepled
to extend lhe length to which the
Signo Con be transmitted over the
Sau @ Network:
— An important point ts that they de pot
ameli fy the signal:
> when the
signal become weal, they
copy fe be wy bre
aad regen evatt
ib Cater — topolagy
Cannectéors) «
Envivonm ent
Commoni cation4
DTH ba gat device’
o) Repeater! 7
diy tb ( : FSB
DA “the is a. basically multi - povtrep eater»
\
DA ‘We, connects > mulbiple’ |‘
from different branches.
—S Hubs Cannot
wives” “Comming
Filey data, a0 datd’ packets
are ginb te all Connected | dewies..
oN ‘they’ “do hot have the inklgece a
»iftind out PERE Bese Ace ty date
paces” ee } x
ty‘Types of tHhbt- ‘
=a = =
© | Active “hobs Mey
© Passive hob
© Intelligent hub
Srnseye nyse
—> these axe the hobs that: hhowyd>' eb / paula
aueely and can clean, boost, add relay
the "signal along cnith the .netwovk.
> zt Ser ees beth | Fepea bey + oa well as
coving Center. ee , j
=> These One ued te. extend.the ) maximum
» distaace bblea nodes.
© Pasbive hubs ,
> these core the hobs | thab collects waiving
from nodes aad power supply from the
active hob.
> They can’-be wed to extend the
distance blo Nodes.
© antelligent hub hae
> zt wos like aa active hob and
indudes vrem ote monayemen & capabili tie
They also prowile flexible data yates.
} t
but> Thales enables an admini gtyaldy be
monitor the tralFic passing. through
the hob.
Win, Bridge
> R dovidge — opeyates ak the data [ne
layer.
Ay levies’ yi Yepeaitr, coith add od
the “finctiona lily of “Fil bering conten
by reading the ‘mre addrey of the
Sorte ocad vi! destination , :
>t iy also used for inlconnectng two
o LANS » thovking: © on the same prstoca| .
PT bes Single thos g single output
ports ‘
Bridge
Tye of Bvlegei 1 al i
© Transparent Blidge
{ 1)
© soure Routing Bridge@ Trans parent Grid
cles
—> These are the bvidgye tn which Lhe!
Stations aye Completely Ome onawar of
the lovidlge & exit ence:
© Sevrce — Revting Bridges In these bridges,
youting operaticn is -eéyformed By She
SOX’ Statioa aad thes frame specifies
which
Qv> switchs
se
—> RF switch
cFrctency
> A switch,
>" The switch
“Behore fox
ote to follow,
Ts a Mm vlbipart —byidge Cee
aad pe¥formaace.
Us aiodabe. links -Layeyt? dove.
cag perform very ‘checking
warding data,Types of switcht
© unmanaged suuitch
Managed . switch
émavé switch
lope, 2 sunitches
layer 3 switches
PoE 5, Switches
SB8ea 609
Meo dulay saaitchey,
@onmanaged switchs,
> thee switche inn @ “simple pig -and-phy
design, addi) dow mots offer’ cdvaaced.
> they .,are dvituble 57 mall inebaaske
© Managed Switch! eo .
> thee switche offer advanced configovathe
option — such ay VANS |» @or and
link — aggregation.
A ORRty eke aultable Poy laygey more
,
Complex ea Netwoyky,
© Smoot switche They ore svituble toy Small
network they are gilable Pov
' small
to mediom vised networks——_—
@ Layer
Ee
2 switches:— These seitches operate
ot the ire laye of the osx
medel .cnd! ore responsible For Fevwording
data Slo devices oo the same were.
© layer @ switthes® These witches opevate
at the netusotle layer of the osr
and Can route datu bles
netoork
meder
different
Segmen ts. Cthey
© est switches.
more calvanced)
these switches have eo wer
over Ether net capabi li Evas
them +o sSerly
clevyces
cohich allows
power
ovey
to network
the Same cable. ‘
@ moedsluy — switches “these “alfews Fev ecasy
ea puasion.| + they: | Gre Svikable For lange
netwosiks +
QW Ro vter lL
mapas ta Gokeways are alsa
Convey beng and Cag
netuwyle — layey.
> Teakeway; _ gure _ Senerally mores, comple than
“guiftdhe, ON You Lens.
: 15. wtb arts pod wet
called 2% prstsce |
operate at anyqi’ Gasobey +
> tt cn
6 bayer GO network " layey.
> rb also [enown, eur the bovidging Torey,
Ww ao device that Combines the Feature
of bath bridge Cad . youters
“wore other ‘atthe data link
fosvvot
Computer netwoylet
ome 1
As Comp ober fniéturovk ia" & group of
comptes linked to euch othey bhat
enables the Compytty te Communicate
with another Compotey and share theiy
resources , data and applications.
TyPS af Comproler pnetworvle/
See —
A Computer netwowk can be
cutegovized trio fow lypes, They ares
u> LAN
ub man
Gi) WAN
tv PAN
Us LAN ClLocal axa netwoik)t
= = 7 = 44
=> lav wv a! grve of netwoyla connected
ty each other iN ymall — .aseas/,
Chuil ding. office, shoppiag).!os”
Connecting two © Move
> LAW WV used
compotey throygh ce Commonicet ton medio,
Clwiske a paiy, coaxial cable, etc...) ,
> x les. costly @y exPENsive , it 1,
uiht. Coikh Nevdwore such cs hubs
network > aclap bes,’ aad ebheyned cable ¢
> The data ty trans fevred at an 2x brem|
4,
fas ley vate in local Arta nebwoue,
> 2 provide highew. Secivi ty
pais ean C Pessoncal Are nckwort) Greet
> PAN iv "Ne tuoyie onrenged ovidhin ¢ a
aa pewon's” Covith! © inthe | “roage of 109)
rere> Thomas Zimmerman was the fir YEO cowch
secentvt to bring the Pde
> PAN covers ca area Of 80 feet.
> powonal Computer devils Claptop imbile
phones, media, player, wad. play vtetiyg)
that Ore wed ko develop Pa.
aypes of PAN!
a2 ? law
@© wied pan
© wiles ean
@ wired PAN! wired PAN netorik is crated
zs =
by using the sp.Owrlean PAW’ cwhrelest PAN “Nelwole ip
created by wifi, Bluetooth.
dip MAN *-, Crretrops |iissn Arce, network)
Stk yas netusovie) thet “covers a. leagesy
geographic rea | by | inlay conneck ing as
different LAN:
> Gevernment agencis use MAW bo Conn egy
te the citizens aod PYIVabe Mnduvieg
Te o/h
pK
‘e e iE aE
=> Tr man, various LAWS are Ccomected to
eath = olhey through in oa telephone pling,
> the mou l.- utdely,, ured Prstocal?
ty maw
re Rs232 ,AtTMm vy Ty SPWADDL.
2 des)
Exeumphe
> maw Movusedtans bre banks ey the ciby.
> Zt. canbe used» tye
Atv line Teseyvalion.
> Zt, Can be wed
Pn a ‘College with
in aw, chkya Sut _
: '
Wo WAN Cwide Aycu Netweyie) |.
ea = = =
DR WAN oi eaenetoorn 7 that ex lends
oe large , Seagrarhtce!! ove’, uth AS Shakey
“(EY ,, Comntyies. nel
aA WAW W not limited in single location,
> rt spaau through telephone imme,
Fiber active line (oy, satellite ‘link.
> the fntevnet 1s the one of the
biggest WAN in Ehe Woovid. '
> the WAW is wrdely wed in
dus iness gevemment and education.
&\ mobile byoad
fast.
band, private
” Aelworie CA
PAAR. Provider “private
Gomnech 4 OF Ficeg),
“Wetec” Led
Uri ds L,WIst.
=
> Nast ty ther, pabivaal ° tastity te “of Stande:,
§ technelogy, | at the U5, depart mend of
Cammerce+
Do the Nasr cybeyy. vecwity fame wstile
dumeser of all. sizer fav hedey onda,
stand , manage aad reduce the vik
proteck the date and networle,
Atos ‘
pn & Cate ge hes
The _ NIST. cyber, Secuvily Frameworky Ogun ize
RS Gove” matecall, PbS functions”
whith “are sub divided a
cotegovies - vite
uy rdeakity a pap
cls Protech anil tides 1}
UY Detect 7
dy, Respond , KV
w Rew very Pn
Wo ren tify), dyin of ,
=
Develop,“ the rorgaat 2a Lisadl ondentanding
% ne ree only vrisk to systems,
asvets |, datw Yaga “Capabibl fey 4Eqr Assege management, Businey envi von eat,
hovernane , RUK WHEeSsemend
my
aly Protect
Develop and implement the apprepivate
seafe quar ds to ensure delivery of Cvibi ca
infrastructure Seyvice +
E¥t Puthnetication and Acceyy contre,
Awarenys aod brainy 4 daba
| sewyity:
a deleckt
Develop and imel emeat the xppyopirabe
activities.
E¥* Anomalics a Events | Secwiby Continey
mon ite Ying.
Wo Respond t
Develop add implement the appropirate
actWNitis.
Eg Response planning, Commun? cation,
Pralwis, mizigetion:
OD Recover.
Develop aod implement the apprplrate
actNi#e ts lake — action regavdihga detected , cybersecuviby events,
EXt Response ‘planning |” i papiove nner