0% found this document useful (0 votes)
27 views19 pages

Cyber Security Unit 1

Uploaded by

Akshitha S
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
0% found this document useful (0 votes)
27 views19 pages

Cyber Security Unit 1

Uploaded by

Akshitha S
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
You are on page 1/ 19
UNIT-1' Difference blew ast and tce/re:- ost OST yptesests open Tee/xrpe ao Tee/zte model re ants SY¥Skm Inkerconnection the transmission Contvo! — pretecal/ tnterne pre teocal: Wy oSz 18 generic , @vot@cal |ciis tce/te model deends in dependent Standard or Standard protocals Tt vs acting as an about which the interaction gate way Computey network Wish ikey . netisevis, ana has created - TE iy USer + @ Connection protscal thor ARS igns the Network of the host: Giz) The ost mode! was [did the protocals cere developed first, and Created first aad then pystreab were then boilk = the crated to Frkt the tee/te model. Netusovic » Corch s tectures —te: Ws st deat pevie y) provides cyvality Sewices. the osx model Teprasentonts admin ivty- ation, interfaces and Conven tions. Ww quality Sey vices - TE doesn’t mention bhe services interfaces and protcals, (Wid TE is difficolk as disting vished te Tee/re wid tt provides both conneckiva & Connection- Wy TE bs Simpilar than ost. wid se ervides connec Lia. less teas mision, vill) Th weg wed tia] 1 KPA OUch ¥ Gea, The 5 mmoullasd '”” ibe Of tee/te header is 20 bykes., legs) ‘transmission. wilh TL uses. ahevizsnt! ' al approach. eo the smatlest Size a af “ost header is 5 bytes Abeer qin te OSt “Model © Ter/ze Model Application ‘ Layey Presentation Layer Session Layer Transport Loyey Network Layey Detter. Link, Layey “Application Layer Transgovt Layer Network Access’ "Layer Physical Layer = cybew / cyber crime / cyber secori ty: | cyboer + — > ‘tn the last latio’s the eves Cyke nekics was coined by mothe matician Noy bey & Wiener”. > cyber is ao prefix! thot denotes a vela tionship with It» Ctnrftymation — techho lag y). > Any thing relating "bo _ Competing such as 2 ilintemet’s ! aun el technology : 2 > .Te can relate 4. ail Lhe aspects of computing tncluding Stoving data, 1 PYekecting dado, accessing data, PYECESSing dato. . bransmitting data, and linking data: D> the Bhree, amet — of Common ,, eymp, oof cyber axes. / @ cyber attack © cyber crime ©... cyber: .8 paces @ cyber ottackrs, This on “a ea ee te ‘disvopt, disable, destroy Ce) Control aL com/py ter envifenmenty oy cus soi , aD | i © cyber crime i cyber crime js eny orme which ts carried ovt using — infoymation techno logy « © cyber space: cyber. space iy.» the sto oye and caw compe tex where data using ne twovlky occur: Network devices CHub, Repeater By idge, switch — = — TS Ve Oe Rovtex, Gateways and Brouter) = — —_ Network devices. Network devices also kknoton Os Networking haydusore 7 xe; physical devices that allow havdware on a Compotey network to Communicate and interact saith «ane, anather, \' poy “example “Repeater 1, Switch, | Rovtevs) Gabewsiy, Brouky eee ; Ud Repeaber:t >A “qepeater © operabes at the. physica! layer si bl gee is bo, reg enevate ,, the , signal over the = same network before, the Signal becomes tec Weak Cor) crvepled to extend lhe length to which the Signo Con be transmitted over the Sau @ Network: — An important point ts that they de pot ameli fy the signal: > when the signal become weal, they copy fe be wy bre aad regen evatt ib Cater — topolagy Cannectéors) « Envivonm ent Commoni cation 4 DTH ba gat device’ o) Repeater! 7 diy tb ( : FSB DA “the is a. basically multi - povtrep eater» \ DA ‘We, connects > mulbiple’ |‘ from different branches. —S Hubs Cannot wives” “Comming Filey data, a0 datd’ packets are ginb te all Connected | dewies.. oN ‘they’ “do hot have the inklgece a »iftind out PERE Bese Ace ty date paces” ee } x ty ‘Types of tHhbt- ‘ =a = = © | Active “hobs Mey © Passive hob © Intelligent hub Srnseye nyse —> these axe the hobs that: hhowyd>' eb / paula aueely and can clean, boost, add relay the "signal along cnith the .netwovk. > zt Ser ees beth | Fepea bey + oa well as coving Center. ee , j => These One ued te. extend.the ) maximum » distaace bblea nodes. © Pasbive hubs , > these core the hobs | thab collects waiving from nodes aad power supply from the active hob. > They can’-be wed to extend the distance blo Nodes. © antelligent hub hae > zt wos like aa active hob and indudes vrem ote monayemen & capabili tie They also prowile flexible data yates. } t but > Thales enables an admini gtyaldy be monitor the tralFic passing. through the hob. Win, Bridge > R dovidge — opeyates ak the data [ne layer. Ay levies’ yi Yepeaitr, coith add od the “finctiona lily of “Fil bering conten by reading the ‘mre addrey of the Sorte ocad vi! destination , : >t iy also used for inlconnectng two o LANS » thovking: © on the same prstoca| . PT bes Single thos g single output ports ‘ Bridge Tye of Bvlegei 1 al i © Transparent Blidge { 1) © soure Routing Bridge @ Trans parent Grid cles —> These are the bvidgye tn which Lhe! Stations aye Completely Ome onawar of the lovidlge & exit ence: © Sevrce — Revting Bridges In these bridges, youting operaticn is -eéyformed By She SOX’ Statioa aad thes frame specifies which Qv> switchs se —> RF switch cFrctency > A switch, >" The switch “Behore fox ote to follow, Ts a Mm vlbipart —byidge Cee aad pe¥formaace. Us aiodabe. links -Layeyt? dove. cag perform very ‘checking warding data, Types of switcht © unmanaged suuitch Managed . switch émavé switch lope, 2 sunitches layer 3 switches PoE 5, Switches SB8ea 609 Meo dulay saaitchey, @onmanaged switchs, > thee switche inn @ “simple pig -and-phy design, addi) dow mots offer’ cdvaaced. > they .,are dvituble 57 mall inebaaske © Managed Switch! eo . > thee switche offer advanced configovathe option — such ay VANS |» @or and link — aggregation. A ORRty eke aultable Poy laygey more , Complex ea Netwoyky, © Smoot switche They ore svituble toy Small network they are gilable Pov ' small to mediom vised networks ——_— @ Layer Ee 2 switches:— These seitches operate ot the ire laye of the osx medel .cnd! ore responsible For Fevwording data Slo devices oo the same were. © layer @ switthes® These witches opevate at the netusotle layer of the osr and Can route datu bles netoork meder different Segmen ts. Cthey © est switches. more calvanced) these switches have eo wer over Ether net capabi li Evas them +o sSerly clevyces cohich allows power ovey to network the Same cable. ‘ @ moedsluy — switches “these “alfews Fev ecasy ea puasion.| + they: | Gre Svikable For lange netwosiks + QW Ro vter lL mapas ta Gokeways are alsa Convey beng and Cag netuwyle — layey. > Teakeway; _ gure _ Senerally mores, comple than “guiftdhe, ON You Lens. : 15. wtb arts pod wet called 2% prstsce | operate at any qi’ Gasobey + > tt cn 6 bayer GO network " layey. > rb also [enown, eur the bovidging Torey, Ww ao device that Combines the Feature of bath bridge Cad . youters “wore other ‘atthe data link fosvvot Computer netwoylet ome 1 As Comp ober fniéturovk ia" & group of comptes linked to euch othey bhat enables the Compytty te Communicate with another Compotey and share theiy resources , data and applications. TyPS af Comproler pnetworvle/ See — A Computer netwowk can be cutegovized trio fow lypes, They ares u> LAN ub man Gi) WAN tv PAN Us LAN ClLocal axa netwoik)t = = 7 = 44 => lav wv a! grve of netwoyla connected ty each other iN ymall — .aseas/, Chuil ding. office, shoppiag).! os” Connecting two © Move > LAW WV used compotey throygh ce Commonicet ton medio, Clwiske a paiy, coaxial cable, etc...) , > x les. costly @y exPENsive , it 1, uiht. Coikh Nevdwore such cs hubs network > aclap bes,’ aad ebheyned cable ¢ > The data ty trans fevred at an 2x brem| 4, fas ley vate in local Arta nebwoue, > 2 provide highew. Secivi ty pais ean C Pessoncal Are nckwort) Greet > PAN iv "Ne tuoyie onrenged ovidhin ¢ a aa pewon's” Covith! © inthe | “roage of 109) rere > Thomas Zimmerman was the fir YEO cowch secentvt to bring the Pde > PAN covers ca area Of 80 feet. > powonal Computer devils Claptop imbile phones, media, player, wad. play vtetiyg) that Ore wed ko develop Pa. aypes of PAN! a2 ? law @© wied pan © wiles ean @ wired PAN! wired PAN netorik is crated zs = by using the sp. Owrlean PAW’ cwhrelest PAN “Nelwole ip created by wifi, Bluetooth. dip MAN *-, Crretrops |iissn Arce, network) Stk yas netusovie) thet “covers a. leagesy geographic rea | by | inlay conneck ing as different LAN: > Gevernment agencis use MAW bo Conn egy te the citizens aod PYIVabe Mnduvieg Te o/h pK ‘e e iE aE = > Tr man, various LAWS are Ccomected to eath = olhey through in oa telephone pling, > the mou l.- utdely,, ured Prstocal? ty maw re Rs232 ,AtTMm vy Ty SPWADDL. 2 des) Exeumphe > maw Movusedtans bre banks ey the ciby. > Zt. canbe used» tye Atv line Teseyvalion. > Zt, Can be wed Pn a ‘College with in aw, chkya Sut _ : ' Wo WAN Cwide Aycu Netweyie) |. ea = = = DR WAN oi eaenetoorn 7 that ex lends oe large , Seagrarhtce!! ove’, uth AS Shakey “(EY ,, Comntyies. nel aA WAW W not limited in single location, > rt spaau through telephone imme, Fiber active line (oy, satellite ‘link. > the fntevnet 1s the one of the biggest WAN in Ehe Woovid. ' > the WAW is wrdely wed in dus iness gevemment and education. &\ mobile byoad fast. band, private ” Aelworie CA PAAR. Provider “private Gomnech 4 OF Ficeg), “Wetec” Led Uri ds L, WIst. = > Nast ty ther, pabivaal ° tastity te “of Stande:, § technelogy, | at the U5, depart mend of Cammerce+ Do the Nasr cybeyy. vecwity fame wstile dumeser of all. sizer fav hedey onda, stand , manage aad reduce the vik proteck the date and networle, Atos ‘ pn & Cate ge hes The _ NIST. cyber, Secuvily Frameworky Ogun ize RS Gove” matecall, PbS functions” whith “are sub divided a cotegovies - vite uy rdeakity a pap cls Protech anil tides 1} UY Detect 7 dy, Respond , KV w Rew very Pn Wo ren tify), dyin of , = Develop,“ the rorgaat 2a Lisadl ondentanding % ne ree only vrisk to systems, asvets |, datw Yaga “Capabibl fey 4 Eqr Assege management, Businey envi von eat, hovernane , RUK WHEeSsemend my aly Protect Develop and implement the apprepivate seafe quar ds to ensure delivery of Cvibi ca infrastructure Seyvice + E¥t Puthnetication and Acceyy contre, Awarenys aod brainy 4 daba | sewyity: a deleckt Develop and imel emeat the xppyopirabe activities. E¥* Anomalics a Events | Secwiby Continey mon ite Ying. Wo Respond t Develop add implement the appropirate actWNitis. Eg Response planning, Commun? cation, Pralwis, mizigetion: OD Recover. Develop aod implement the apprplrate actNi#e ts lake — action regavdihg a detected , cybersecuviby events, EXt Response ‘planning |” i papiove nner

You might also like