100 research outputs found

    Consumerization of IT: Risk Mitigation Strategies and Good Practices. Responding to the Emerging Threat Environment.

    Get PDF
    This report presents security policies that can be deployed to mitigate risks that are related with the trend of Consumerization of IT (COIT) and Bring Your Own Device (BYOD). The aim of this document is to identify mitigation strategies, policies and controls for the risks identified in this area

    IPv6 : prospects and problems : a technical and management investigation into the deployment of IPv6

    Get PDF
    Masteroppgave i informasjons- og kommunikasjonsteknologi 2003 - Høgskolen i Agder, GrimstadIPv4 has been used for over twenty years, and will most likely be used in many years ahead. However, we are now experiencing that the IPv4 address space is running out, resulting in restrictions on who will be able to get these types of addresses assigned to them. Methods such as Network Address Translator (NAT) have been developed and implemented in order to save the IPv4 address space. It is said that this is not a good enough solution, as such techniques introduce new problems at the same time solving some. A new version of the Internet Protocol, IPv6, has been developed and is likely to replace IPv4. IPv6 has been developed to solve the address problem, but also new features are designed to supposedly enhance network traffic. In our thesis we give an overview of the problems with IPv4. This includes the limited address space and the limited quality of service. Further we present the features of IPv6 that are meant to solve these problems and add new possibilities. These are: New address format, the IPv6 header and Extension headers to mention some. Further we have investigated and here present how the transition from IPv4 to IPv6 is expected to take place, followed by a thorough description of the transition mechanisms. One of the original intentions on the development of IPv6 was that IPv4 and IPv6 have to be able to coexist for a long period of time. Transition mechanisms have therefore been designed to make this possible. There are three main types of mechanisms: - Tunnelling - Translation - Dual-stack. Each of these mechanisms requires different configuration and implementations in hosts and network. Technical research on transition mechanisms states that these are not good enough for all IPv6/IPv4 scenarios and need improvements in order to make IPv4 and IPv6 coexist smoothly. There are a lot of transition mechanisms that are agreed upon as being good for general use and then there are transition mechanisms that are good for certain scenarios and not for others. Some scenarios still lack a good translation mechanism. As a result of this, IPv6 networks are being built separately from IPv4 networks. In Asia commercial IPv6 networks are offered, while the process is slower in other parts of the world. The reasons for not building IPv6 networks are many, and not agreed upon. Some believe it is because of economical restrictions, while others claim it is technical reasons and that it exists far too few applications supporting IPv6. The number of IPv6 enabled applications is growing. Large companies like; Microsoft Corporation, Cisco Systems Inc, Apple Computers Inc., Sun Microsystems Inc and various versions of Linux include support for IPv6. The deployment of IPv6 is expected to happen at different times in different parts of the world. We have investigated the status of IPv6 globally and in Norway. The main results are that the roll-out has reached the furthest in Asia where commercial IPv6 networks already are offered. The activity in Norway is still small, but growing. It was desired to run an experiment in order to prove or disprove some of the information we gathered on how IPv6 interoperates with IPv4, but because of limitations in the network at Heriot-Watt University we were not able to do this. Instead we have focused on a project by Telenor R&D; “IPv6 migration of unmanaged networks-The Tromsø IPv6 Pilot”. We also gathered some information from people working at Norwegian ISPs in order to address some of the aspects of the upgrading

    IPv6 Tunnel Broker with the Tunnel Setup Protocol (TSP)

    Full text link

    Performability Evaluation of Voice Services in Converged Networks

    Get PDF
    In the last years, the transmission of voice services in converged networks has experienced a huge growth. However, there are still some questions considering the ability of these networks to deliver voice services with acceptable quality. In this paper, we applied analytical modeling and simulation to analyze the quality of voice services using a new index, called MOS a , which considers jointly the MOS index and the availability of the subjacent infrastructure. We consider the influence of different CODECs (G.711 and G.729), queuing policies (Priority Queuing and Custom Queuing), and the warm standby redundancy mechanism. Our goal is to analyze the quality of these services by taking into account overloading conditions in different  architectures/scenarios. These scenarios were constructed using the modeling mechanisms Reliability Block Diagram and Stochastic Petri Nets in addition to a discrete event simulator. Experimental results indicate that the G.711 CODEC has a higher sensitivity both in terms of data traffic volume and allocated network resources in relation to the G.729 CODEC

    The Use of Firewalls in an Academic Environment

    No full text

    An analysis of the risk exposure of adopting IPV6 in enterprise networks

    Get PDF
    The IPv6 increased address pool presents changes in resource impact to the Enterprise that, if not adequately addressed, can change risks that are locally significant in IPv4 to risks that can impact the Enterprise in its entirety. The expected conclusion is that the IPv6 environment will impose significant changes in the Enterprise environment - which may negatively impact organisational security if the IPv6 nuances are not adequately addressed. This thesis reviews the risks related to the operation of enterprise networks with the introduction of IPv6. The global trends are discussed to provide insight and background to the IPv6 research space. Analysing the current state of readiness in enterprise networks, quantifies the value of developing this thesis. The base controls that should be deployed in enterprise networks to prevent the abuse of IPv6 through tunnelling and the protection of the enterprise access layer are discussed. A series of case studies are presented which identify and analyse the impact of certain changes in the IPv6 protocol on the enterprise networks. The case studies also identify mitigation techniques to reduce risk

    IPv4 to IPv6 transition : security challenges

    Get PDF
    Tese de mestrado integrado. Engenharia Informática e Computação. Faculdade de Engenharia. Universidade do Porto. 201
    corecore