Vous êtes sur la page 1sur 14

Introduction A basic understanding of computer networks is requisite in order to understand the principles of network security.

In this section, we'll cover some of the foundations of computer networking, then move on to an overview of some popular networks. Following that, we'll take a more in-depth look at TCP/IP, the network protocol suite that is used to run the Internet and many intranets Once we've covered this, we'll go back and discuss some of the threats that managers and administrators of computer networks need to confront, and then some tools that can be used to reduce the exposure to the risks of network computing. The International Standards Organization (ISO) Open Systems Interconnect (OSI) Reference Model defines seven layers of communications types, and the interfaces among them. Each layer depends on the services provided by the layer below it, all the way down to the physical network hardware, such as the computer's network interface card, and the wires that connect the cards together. An easy way to look at this is to compare this model with something we use daily: the telephone. In order for you and I to talk when we're out of earshot, we need a device like a telephone. (In the ISO/OSI model, this is at the application layer.) The telephones, of course, are useless unless they have the ability to translate the sound into electronic pulses that can be transferred over wire and back again. (These functions are provided in layers below the application layer.) Finally, we get down to the physical connection: both must be plugged into an outlet that is connected to a switch that's part of the telephone system's network of switches. If I place a call to you, I pick up the receiver, and dial your number. This number specifies which central office to which to send my request, and then which phone from that central office to ring. Once you answer the phone, we begin talking, and our session has begun. Conceptually, computer networks function exactly the same way.

History The history of Quezon City weaves so interestingly with the nations own. Many events that have shaped the history of the Philippines transpired within the Citys territory. August 23, 1896. Driven by passion to attain liberty, the Katipuneros responded to the call of the Great Plebian, Andres Bonifacio, to take arms and struggle for the countrys freedom from Spanish colonial rule. As a sign of breakage from the chains of Spanish government, they undauntedly tore their cedula at the house of Melchora Aquino, an event known today as the Cry of Pugad Lawin. August 25, 1896. Most fighting in the course of the Freedom Trail began. From Balara and Krus na Ligas to Santolan (area near Camp Aguinaldo and Camp Crame today) sparked the bloody revolution, which eventually led to the declaration of Philippine Independence in Kawit, Cavite on June 12, 1898.December 10, 1898. With the signing of the Treaty of Paris, the Spanish ceded power to the Americans. Filipinos still actively fought for independence. This gave rise to the Philippine-American War of 1899, during which, General Licerio Geronimo defeated General Henry Lawton (Battle of Paye) in an area near the Marikina River known today as Barangay Bagong Silangan, a part of Quezon City. 1938. President Manuel L. Quezon dreamt of a city that would become the future capital of the country, replacing Manila, and home to middle workers. He created People's Homesite Corporation and purchased 1, 529 hectares from the vast Diliman estate of the Tuason family. 1939. The bill creating Quezon City was authored by Assemblyman Ramon P. Mitra (Mountain Province, 2nd District), with the name of the city as Balintawak. Assemblymen Narciso Ramos (Pangasinan, 5th District) and Eugenio Peres (Pangasinan, 2nd District) filed an amendment changing the name Balintawak to Quezon. The bill lapsed into law as Commonwealth Act 502, on October 12, 1939. Quezon City was established, with the Commonwealth President acting as chief executive. A number of barrios that used to belong to Rizal, Caloocan, San Juan, Marikina, Pasig, and Mandaluyong were carved out and joined into the newly created city, which became the biggest local government unit in Metro Manila.

November 10, 1939. Quezon appointed Tomas Morato as Mayor. Under his supervision, the first network of roads was paved along Kamuning and Sampaloc Road (now Tomas Morato Avenue). Housing projects dubbed as Barrio Obreros and Barrio Obreros II, which means Workers Village, were also built as part of the low-cost government housing program. To make transportation easy for the new residents, President Quezon made arrangements with the Luzon Bus Line to start a regular transport service between the housing project and downtown Manila at a bus fare of P 0.05. 1940. Quezon Citys earliest developments were guided by at least two masterplans, one was the Frost Plan in 1940 and the 1949 Master Plan of the City Planning Commission whicho produced the documents in accordance with the vision of President Quezon. President Quirino approved the implementation of the 1949 plan. The Frost plan, which aimed to develop Quezon City as the Washington DC of the country, reflects a big quadrangle in the heart of the City, from which four avenues radiate toward the outskirts, with rotundas placed on the four corners, the largest being the 26-hectare elliptical center, now known as the Quezon Memorial Circle. 1942. When the Second World War broke out, the Japanese occupation government dissolved Quezon City. It was divided into two districtsDiliman and San Francisco del Montewhich were then placed under the new political entity called the Greater Manila Area headed by Oscar Castelo as Acting Mayor and Dr. Florencio Cruz as district chief. Right after the war, President Osmea appointed former chief of police Sabino De Leon as Acting Mayor of the revived Quezon City. December 24, 1946. President Roxas appointed Engr. Ponciano Bernardo as Acting Mayor. He was responsible for putting up the old Quezon City Hall in the present compound of Ramon Magsaysay (Cubao) High School. Among his other accomplishments include the Bernardo Park, the Quezon City Public Library and the Quezon City High School, the first public high school in the locality. It was also during Bernardos term that Quezon City became the national capital of the Philippines, as approved by then President Quirino. 1948. After the war, Republic Act No. 333 was signed by Elpidio Quirino on July 17, 1948, declaring Quezon City to be the republic's capital, and specifying the city's area to be 156.60 sq. km. Baesa, Talipapa, San Bartolome, Pasong Tamo, Novaliches Poblacion, Banlat, Kabuyao, Pugad Lawin, Bagbag, Pasong Putik of the old Novaliches municipality (then part of Caloocan) were ceded to Quezon City. The rest of the old Novaliches municipality was left with Caloocan, thus becoming North Caloocan. On June 16, 1950, the City Charter was revised by Republic Act No. 537, changing the city's boundaries to an area of 153.59 sq. km. Exactly six years after on June 16, 1956, more revisions to the city's land area were made by Republic Act No. 1575.

October 22, 1949. Quezon City was inaugurated as the National Capital of the Philippines and the capital buildings cornerstone was laid at the Constitutional Hill. During the term of the eight-month Mayor Nicanor Roxas, the Roxas Homesite by the Philippine Homesite and Housing Corporation (PHHC, the precursor of the National Housing Authority), consisting of 1,104 housing units on an area of 40 hectares, began construction. January 6, 1950. The expanse of Quezon City reached 15,359 hectares. Succeeding Mayor Ignacio Santos Diaz, known as The Builder, constructed some 29 buildings, significantly improving education and other basic social services. During his administration, the expanse of Quezon City reached 15,359 hectares. The number of councilors was likewise increased to eight. June 16, 1950. The Quezon City Charter was revised by Republic Act No. 537, which extended its boundaries to its 15,359 hectares or five times bigger than Manila. It lost its title as capital city of the Philippines to Manila by virtue of Presidential Decree No. 940 on June 24, 1976. February 4, 1954. Mayor Norberto Amoranto was initially appointed on this date by the late President Magsaysay. He later on became the first elected Quezon City Mayor and seating as such until March 31, 1976. He completed the present 14-storey Quezon City Hall at Diliman. Among his other accomplishments were the codification, for the first time, of all city ordinances on taxes; and public works construction such as school buildings, health centers, roads and bridges. April 31, 1976. Breaking into the political arena then dominated by men, Mayor Adelina Rodriguez was appointed into office on this date and was elected in 1980. Women assumed a more active role in politics when she founded the QC Council for Women. Among her programs are the QC Kabuhayan Center, completion of the QC Public Library Main Building and satellite libraries, and the restoration of the Quezon Memorial Circle Museum. February 1986. Protests, fueled by a resistance and opposition to years of governance under a dictatorship heightened from February 2225, 1986. Majority of the demonstrations took place at Epifanio de los Santos Avenue, known more commonly by its acronym EDSA, in Quezon City, and involved over two million Filipino civilians as well as several political, military, and religious figures. This was known as the People Power Revolution of 1986.

April 20, 1986. Brigido Simon was designated as officer-in-charge of Quezon City and on November 30, 1987 was elected as mayor, the youngest to hold office at 37. He was known for his youthful idealism and economic development strategies. He propounded the 20-million Manresa Housing Redevelopment Program and the Payatas Estate Housing Program for the landless in Quezon City. July 1, 1992. Ismael Mathay assumed the position of mayor. He established the Quezon City Polytechnic Institute, which then centered on vocational training of the youth. Yakap Daycare Centers that initially took care of the Quezon City Hall employees children, traces its roots to his administration. It was also under his watch that Quezon City was declared Mother-Baby Friendly City. July 1, 2001. Feliciano Belmonte, Jr. was elected mayor. He was reelected to his third term in 2007, his administration becoming known for its effective fiscal management, massive infrastructure development and innovative social, health and education programs. During his term, Quezon City became the countrys richest city for several consecutive years and began ranking among Asias best. May 11, 2010. By a landslide win, Herbert Bautista became the mayor of Quezon City. One of the youngest politicians in the country, Bautista served as the vice-mayor of Ismael Mathay (one term) and Feliciano Belmonte Jr. For his first term as mayor, he outlined an ambitious plan for his key programs in the areas of social housing, environmental management, and disaster risk reduction.

Mission To provide quality service which will make Quezon City an ideal community where people live, work and do business in a hospitable, progressive and peaceful environment

Vision The Quezon City Government envisions itself to be a model of effective governance and responsible leadership working in partnership with a citizenry in building a quality community.

Statement of the Problem The most common security is not really about outside Threats, it has to do with our own employees and their human errors or failures.

Significance of the Study This study is important because it help us to know or learn more about network security. Network Security is important because it help us to protect the file to any malware and hackers. Security has one purpose, to protect assets. With the advent of personal computers, LANs, and the wide open world of the Internet, the networks of today are more open. As e-business and Internet applications continue to grow, finding the balance between being isolated and being open will be critical. With the increased number of LANs and personal computers, the Internet began to create untold numbers of security risks. Firewall devices, which are software or hardware that enforce an access control policy between two or more networks, were introduced. This technology gave businesses a balance between security and simple outbound access to the Internet, which was mostly used, for e-mail and Web surfing. This study will benefit the student and the researchers because it will show us the important of Network Security.

Security The Host web servers in a DMZ (Demilitarize Zone) or a firewall from the outside and from the inside. Security fencing to Mark perimeter and set wireless range. DMZ Host Some home routers refer to a DMZ host. A home router DMZ host is a host on the internal network that has all ports exposed, except those ports otherwise forwarded. By definition this is not a true DMZ (Demilitarized Zone), since it alone does not separate the host from the internal network. That is, the DMZ host is able to connect to hosts on the internal network, whereas hosts within a real DMZ are prevented from connecting with the internal network by a firewall that separates them, unless the firewall permits the connection. A firewall may allow this if a host on the internal network first requests a connection to the host within the DMZ. The DMZ host provides none of the security advantages that a subnet provides and is often used as an easy method of forwarding all ports to another firewall / NAT device.

Design Mesh Topology because separate cabling and it is the most secure and reliable. Mesh topology A network setup where each of the computers and network devices are interconnected with one another, allowing for most transmissions to be distributed, even if one of the connections go down. This topology is not commonly used for most computer networks as it is difficult and expensive to have redundant connection to every computer. However, this topology is commonly used for wireless networks. Below is a visual example of a simple computer setup on a network using a Mesh topology.

Implementation A strong firewall and proxy to keep unwanted people. Strong anti-virus software and internet security software suites strong encryption. Security software ; DMZ Anti-virus; Kaspersky Anti-Virus

Kaspersky Anti-Virus Kaspersky Anti-Virus (Russian: ; formerly known as Anti-Viral Toolkit Pro; often referred to as KAV) is an antivirus program developed by Kaspersky Lab. It is designed to protect users from malware and is primarily designed for computers running Microsoft Windows and Mac OS X, though a version for Linux is available for business consumers. Kaspersky Anti-Virus features include real-time protection, detection and removal of viruses, trojans, worms, spyware, adware,key loggers malicious tools and autodialers, as well as detection and removal of root kits. It also includes instantaneous automatic updates via the "Kaspersky Security Network" service.

Attack/Threats Wiretapping Wiretapping refers to listening in on electronic communications on telephones, computers, and other devices. Many governments use wiretapping as a law enforcement tool, and it is also used in fields like corporate espionage to gain access to privileged information. Depending on where in the world one is, wiretapping may be tightly controlled with laws which are designed to protect privacy rights, or it may be a widely accepted practice with little or no protections for citizens. Several advocacy organizations have been established to help civilians understand wiretapping laws in their areas, and to fight illegal wiretapping. Port scanner A port scanner is a software application designed to probe a server or host for open ports. This is often used by administrators to verify security policies of their networks and by attackers to identify running services on a host with the view to compromise it. A port scan or port scan is "An attack that sends client requests to a range of server port addresses on a host, with the goal of finding an active port and exploiting a known vulnerability of that service. Idle scan The IDLE SCAN is a TCP port scan method that consists of sending spoofed packets to a computer to find out what services are available. This is accomplished by impersonating another computer called a "zombie" (that is not transmitting or receiving information) and observing the behaviour of the zombie system. Wiretapping Port scanner IDLE scan

Application Honeypots, essentially decoy network-accessible resources, may be deployed In a network as surveillance and early-warning tools

A honey pot is a computer system on the Internet that is expressly set up to attract and "trap" people who attempt to penetrate other people's computer systems. (This includes the hacker, cracker, and script kiddy.) To set up a honey pot, it is recommended that you: Install the operating system without patches installed and using typical defaults and options Make sure that there is no data on the system that cannot safely be destroyed Add the application that is designed to record the activities of the invader Maintaining a honey pot is said to require a considerable amount of attention and may offer as its highest value nothing more than a learning experience (that is, you may not catch any hackers).

Vous aimerez peut-être aussi