Академический Документы
Профессиональный Документы
Культура Документы
Wireless LAN :
Security issues
Coverage
Stability
IT infrastructure
Network Type Wired Wireless
MAN LAN
Wide Area Network Infrastructure
Wuhan
Shanghai
Beijing
China
New Delhi
Nan Tong
Medan
Binta
s
mbp
ps
Cloud
mb
Indonesia
1
ine
e2
L
Lin
sed
ed
Padang
Lea
as
Mumbai
Le
Jakarta
512
e
d Lin
s
ase kbp
Le
N
Singapore
E
IT infrastructure of a Business Enterprise
Roaming Internet
Users Router LAN LAN
Intruder LAN
Detection Web server
Firewall
RAS LANs in overseas
LAN
iPass Router
LAN
Server LAN at Internet
Mail Svr Service Provider LAN
LAN
LAN Local LANs
E-Cop
Router
Router
Switch Firewall Server Firewall
Firewall
LAN at HQ
Computer Computer
Switch Computer Anti-virus svr
Roaming
LAN Radius server
ComputerComputerComputerServerMainframe
Laptop
Computer Users
Lapto
p Network Multi-layer
Switch
Network Multi-layer
Switch
Network
Switch Network Multi-layer
Computer Switch
Access Point
Network Multi-layer
Switch
Network Multi-layer
Switch
Hand held
computer
Cell phone
Agenda
Security issues :
People
Process
Technology
Source of Security Threat
Security can be compromised through:
Buggy code
Design flaws
New vulnerability
Security Management
Security Policy :
Anti-virus Software
Tools for Network Security
PGP (Pretty Good Privacy) / Digital
Certificate
Anti-virus Software
Pretty Good Privacy (PGP)
PGP (Pretty Good Privacy) protects privacy
of email, message and files with public key
cryptography with key pair to maintain
secure communications
Source: Wikipedia
Pretty Good Privacy (PGP)
Asymmetric
cryptography
Source: Wikipedia
Pretty Good Privacy (PGP)
Symmetric
Cipher
Source: Wikipedia
Private and Public Key pair
VPN
Certificate
Laptop
Server of
City Certification Authority
WAN
Secure
VPN
VPN Tunnel
Firewall gateway
Firewall
Router
Router
Switch
Switch
Workstation
Computer
Workstation
Computer
Mainframe
Mainframe
PGP Server
Printer Minicomputer
Server
Printer Minicomputer
Anti-virus Software
Firewall
A firewall examines all traffic routed
between computers and the internet to see if
it meets the policy or certain criteria. If it
does not meet the criteria, the traffic is
stopped.
Checkpoint
firewall
Firewall
Virtual Private Network
se
d
WAN Le a
sed Nokia VPN
a Line
Le ine
L Secure
VPN
VPN Tunnel
Firewall gateway
Firewall
Router
Router VPN Box
VPN Box Switch
City Switch
Workstation
Computer
Workstation
Computer
City Mainframe
Mainframe
Server
Printer Minicomputer
Printer Minicomputer
Server
Microsoft
French web
site hacked
Precaution Against Hacking
Nokia web
site hacked
W32.Blaster.worm
Smaller users hardest hit by Blaster
virus Worm programmed to attack
Microsoft site on Saturday
Friday, August 15, 2003
Starting Saturday (16 Aug
2003), Blaster is
programmed to use these
infected machines to
attack the Web site
Microsoft uses to
distribute software
updates. But no one knows
how many PCs are
infected.
Virus, worm and Trojan horse
Firewall
Anti-virus Software
Intruder Detection System
Network sensor
Server sensor
Firewall
Anti-virus Software
e-Cop Internet Security
Surveillance Service
Lawrence Sergey
Page Brin
Internet Search Engine
PageRank is a link analysis algorithm
that assigns a numerical weighting to
each element of a hyperlinked set of
documents, such as World Wide Web,
with the purpose of “measuring” its
relative importance within the set.
Software Application
Internet Architecture
Software application moves from client-
Application messaging
Component Interfaces
Business Interlinks
Application Engine
Internet Integration
Internet Application Architecture
Third
Party
DBMS
Appln Messaging Server
Processor
Business Server
Third
Bus. Interlink Interlink Plug-ins
Party
Processor systems
Web Browser Business
Component Processor Interlink
HTTP/HTML Presentation (Appln Logic)
Relay
TUXEDO
Integration Query Processor SQL DBMS
HTTP/HTML Relay Server
Servlet
Process Scheduler
JOLT Execute Reports and
Wireless Java Batch processes,
Portal
Enabled Servlet
Appln Engine Register repts in Portal
Content Registry
HTTP/HTML Web
Server Portal Processor Search, Content
management, Home
page Persoalization
Security Mgr
LDAP
External System
WebLogic Server Novel NDS eDirectory
IBM WebSphere
Directory iPlanet Directory Server
COM, CORBA, MS IIS
MS Active Directory
EJB iPlanet Web Server Server
Apache
Component Interface
Internet Application Server
Portal Servlet
Mainframe
Laptop
Enterprise
B2B
Business Laptop
A2A
Customers Server
Minicomputer
Laptop
B2B B2B
Minicomputer Minicomputer Minicomputer Computer
Server
Computer Computer
Laptop
B2B B2B
B2C A2A
Manufacturers
Computer Server
Suppliers
Laptop
Personalized access
Role-based filtering
Multi-system integration
Scalability
Content management
Enterprise Portal for
business application
Portal provides
Single sign-on
Security
Community support
A general development framework
Enterprise Portal for
business application
Enterprise Portal for
business application
Types of Portal
Application focused solutions for business
solution delivery (functional). E.g. SAP, Oracle,
PeopleSoft
Webstore Performance
(ExIFS) Tuning
1/18/
2003 ERP + CRM + MFG
Text:
Text:
Netscape My Netscape Portal
Netscape My AOL Portal
Netscape My AOL Portal
Netscape My AOL Portal
4 Major Categories of Portal
Functionality
Portal Infrastructure.
Portal Operations.
Portal Features.
Portal Presentation.
Portal Infrastructure
Integration
Internationalization
Platform
Scalability
Security
Standards
Portal Infrastructure
Integration
URL-based integration
Web-based screen scraping
XML/XSL
Legacy screen scraping
API
EAI
Portal Infrastructure
Internationalization
Language support
Content translation service
Currency support
Currency translation service
Support for local laws and regulations
Portal Infrastructure
Platform
Operating systems
Database servers
Application servers
Web servers
Web browsers
Portal Infrastructure
Scalability
Replication
Failover
Load balancing
Clustering
Cabling
Portal Infrastructure
Security
Authentication
Authorization
Login
Single sign-on
Portal Infrastructure
Security (contd)
User Management
Digital certificate
Public key
Digital signature
Portal Infrastructure
Security (contd)
Subcategories
J2EE
XML
XSL
Portal Operations
Administration
Community Management
Development Environment
Integrated Development Environment
(IDE)
Application program interface (API)
Software Development Kit (SDK)
Portal Operations
Ease of Upgrade
Federated Portals
Portal Features
Business Intelligence
Collaboration
Content Management
Personalisation
Search
Workflow
Portal Features
Business Intelligence
Report generation
Online analytical processing (OLAP)
Decision support system (DSS)
Data warehousing
Data Mining
Ad-hoc reporting
Portal Features
Collaboration
Discussion board
Document sharing
Chat
Instant messaging
Virtual whiteboard
Virtual conferencing
Video conferencing
Portal Features
Content Management
Personalization
Explicit
User’s profile (in LDAP)
System to maintain and manage
Implicit or heuristic
User’s online behavior (clicked certain
links or visit certain pages)
Event based personalization ( HP
eService, Amazon.com
User’s preference personalisation)
Portal Features
Search
Boolean-based Searches
Indexing
Spider / Crawler / Bot
Keyword (Metadata) Search
Full-text Search
Internet / Web Search
Natural-language Search
Results Ranking
Portal Features
Workflow
Workflow Automation
Workflow Automation
End-user customization
Help
User Interface
Wireless Access
Portal Presentation
End-user customization
User interface
Organization
Content
Portal Presentation
Help
General Help
Context sensitive Help
Interactive Help
Bubble Help
Online Wizard
Portal Presentation
User Interface
Graphic design
Information Architecture
Editorial Style / Content Strategy
Instructions and Error Handling
Portal Presentation
Wireless Access
Bridge
Library
Disk Disk Disk
Array Array Array
Storage Area Networks (SAN)
Advantages Disadvantages
F S S
C I NF
Advantages Disadvantages
Data/files sharing and universal May require dedicated network
access for speed
of Tasks
Business Recovery
Security Considerations
Policy Considerations
Business Recovery
Technical Considerations
Other Considerations