Security Consideration of High Speed Network — 40G/100G Optical Ethernet Ying Shu Chen Xiao Yang Ren Qiu Yang Guo Abstract—The basic ideas and technologies for security of 40G/100G Ethernet are briefly described. Some potential security-related problems referring to physical security and the possible preventive measure, and the information security of its data are analyzed in line with its characteristics. Several practical methods for the enhancement of its information security based on the identity authentication and data encryption are proposed. Index Terms—Ethernet, network security, physical security, information security. I. INTRODUCTION N ETWORK security is a problem that for every network administrator must be paid …show more content…
Nowadays, attackers may use many means and methods to jamming and intercept the data transmitting in the optical fiber. Ethernet is a medium shared network, the data packets that sending to any users will also be broadcasted to everyone in the network. These packets contain the address information of the intended users. At the client side, users will collect their own packets based on the address information. Therefore, users may easily get the data belong to the others. For the security of the optical Ethernet, physical security must be considered first. The purpose of physical security is to ensure the security and performance of the transmitting data on the physical layer, and be able to alert users when such objects cannot be guaranteed. The meanwhile, the transmitting data on the physical level need to be further processed. This process is called information security. By processing information security, the attackers will not be able to read the data even they actually catch the packets. Information security can be done by encryption. Therefore, physical security and information security must be done simultaneously. II. ANALYSIS OF PHYSICAL SECURITY Optical network generally use WDM technology. The existing optical components are not perfect, the crosstalk exist between each channels in WDM. This crosstalk may be utilized by the attacker to break
Networking is part of our everyday lives now. Weather is us using our phones, computer, using GPS for directions, watching 3D movies and TV’s or in our work environments. Network Security has become search a big issue since our day to day live started to be more involve with us. These problems involve in all type of shapes and forms where some of these issues are cyber attacks, physical attacks, or abuse of policies. People are really exposed due to the amount of internet activities we have going on in most of our networks. There are two fundamentally different when it comes to networking, the data networks and the synchronous network comprised of switches. With that being said there are also
In this modern day and age of computing, networks are a huge part of IT. It is important now more than ever that data sent over any network, whether it be a LAN (Local Area Network) or WAN (Wide Area Network; The Internet) is kept safe, private (when required) and uninterrupted in
Identify hardware and software needed to secure your choice of networks against all electronic threats.
As hacking and attack in the personal network connections is increasing day by day, it is needed to adopt a technology that will protect the network and have the facilities to stay connected
To reduce the risk of these types of attacks, routers should be hardened, packet filtering controls should be used and routing information should be controlled.
Security is the heart of internetworking. The world has moved from an Internet of implicit trust to an Internet of pervasive distrust. In network security, no packet can be trusted; all packets must earn that trust through a network device’s ability to inspect and enforce policy. Clear text (unencrypted data) services represent a great weakness in networks. Clear text services transmit all information or packets, including user names and passwords, in unencrypted format. Services such as file transfer protocol (FTP), email, telnet and basic HTTP authentication all transmit communications in clear text. A hacker with a sniffer could easily capture user names and passwords from the network without anyone’s knowledge and gain administrator access to the system. Clear text services should be avoided; instead secure services that encrypt communications, such as Secure Shell (SSH) and Secure Socket Layer (SSL), should be used. The use of routers and switches will allow for network segmentation and help defend against sniffing
In this report I will be describing the ways in which networks can be attacked, also be giving real life example of each of the below.
The most secure networks are those that incorporate a virtual area network. This allows updating of information by employees and approvals or verification of those updates by authorized personnel. Access to this information calls for password and username protection by way of 128-bit encryption standards. If further, more detailed information would need updating or change, an authorized person will be required to input their information, including fingerprints. This is called multi factor authentication.
This is an open exposure due to the uncertainties of the internet. Controlling access to information systems and associated networks is necessary for the preservation of their confidentiality, integrity, and availability. Confidentiality assures that the information is not disclosed to unauthorized persons or processes. Any automated attacks or personal attack or attack to exploit the company secrets/statistics/data is the biggest threat to that may occur without the firewall.
Network Computing. (2012, March 22). Flat Network Strength Also A Security Weakness. Retrieved from Information Week Network Computing: http://www.networkcomputing.com/networking/flat-network-stre
Undoubtedly, this paper will generate network information, diagrams, and/or tables; accordingly, these are all included in the Appendix section of the paper. Moreover, the training, vulnerability assessment, and SAQ results are also included as an Appendix in the final paper. Finally, fearing disclosure of proprietary information that could compromise network security, all project data are scrubbed and sanitized to remove sensitive information.
The purpose of the physical security is saved the information system. The automated information system is risky to use computers for everything. The treat of information system is attacking the communication or information components in order to control the infrastructure.
Provides multi layered security: Security starts from physical layer from protecting against ARP Cache, intruders, vandals and thieves. Physical security is provided based on the needs, maintenance
Internet Protocol Security (IPsec) is a set of protocol for establishment of securing Internet Protocol (IP) communications. Safety on data was established through process of authentication and encryption of each IP packet in every communication session. At the beginning of the session, mutual authentication between agents will established and cryptographic keys to be used will arbitrated during the session. IPsec can be applied in protecting data flows not only between pair of hosts and pair of security gateway but also for between a security gateway and a host.
From the beginning, efficiency and speed in the telecommunications industry has advanced at a fast pace owing to fiber optic technology. In 1979, AT&T filled the telecommunications industry with revolutionary ideas by developing a mode for data transmission using a light, called fiber optic cable. This mode produced a bandwidth of 44.736 Mbps and could multiplex 672 trunk circuits on one fiber alone (Cole, M. 2000). However, this development was merely the start of a huge extension to telecommunications, something that would transform the industry constantly.