1 00:00:00,860 --> 00:00:04,750 Welcome to the module in which we'll discuss how to design computer networks. 2 00:00:06,490 --> 00:00:10,180 We'll consider how to close the gap between security and functionality. 3 00:00:11,950 --> 00:00:17,320 In previous modules we took quite some time to show that security and functionality cannot be in conflict 4 00:00:17,320 --> 00:00:20,450 with each other. 5 00:00:20,510 --> 00:00:25,340 You should never try to introduce a security policy that would in any way inconvenience users in their 6 00:00:25,340 --> 00:00:26,300 daily work. 7 00:00:27,740 --> 00:00:31,980 Otherwise users will quite consciously ignore such a policy. 8 00:00:32,000 --> 00:00:35,990 Thus the actual level of security of the system will be lower than it should be. 9 00:00:40,290 --> 00:00:44,490 In this module we will show that sudden netting can improve the security of the whole network 10 00:00:47,630 --> 00:00:52,940 Moreover the ways to minimize the area that can be affected by an attack can reduce potential losses 11 00:00:52,940 --> 00:00:57,480 will be analyzed. 12 00:00:57,530 --> 00:01:04,100 Also we'll see how to apply sudden ending in the case of IP version 4 addresses the CD-R addressing 13 00:01:04,550 --> 00:01:07,880 and if there are any differences in the sixth version of this protocol. 14 00:01:09,850 --> 00:01:14,380 Then we will shortly discuss the differences between IP version 6 and IP version for 15 00:01:19,450 --> 00:01:24,860 next we will explore the subject of a special subnet called the demilitarized zone. 16 00:01:24,950 --> 00:01:28,910 It's a virtual area in which you can place high risk computers or hosts 17 00:01:33,640 --> 00:01:38,780 towards the end we will examine how network services influence the overall security of the system. 18 00:01:39,520 --> 00:01:44,710 Services such as subsetting that is routing with the use of manageable switches in the second layer 19 00:01:44,710 --> 00:01:48,040 of the OSA model will be briefly discussed. 20 00:01:52,040 --> 00:01:58,670 We will scrutinize the mechanisms behind the IP Essec a secure Internet Protocol and evaluate the protection 21 00:01:58,670 --> 00:02:02,800 it offers. 22 00:02:02,800 --> 00:02:10,940 We will also get acquainted with the address translation service proxy servers and remote access services. 23 00:02:10,950 --> 00:02:13,380 I hope you'll enjoy this part of the seminar.