Nota personal: el examen es creo en martes de la semana que viene.
Hoy vimos VLSM, y también algunos conceptos relacionados con SOC, NOC y TAC, también algunos ataques de malware como Pharming
Las tareas que han dejado han sido respecto a problemas de subnetting, como cuantas direcciones se necesitan para tantos host.
El dia de mañana haremos el enrutamiento estático y dinámico con algunos protocolos de enrutamiento de Cisco, de hecho dejó tarea de ello, que llevaramos mañana, o que lo iban a subir, pero hasta ahorita no he visto nada en el modle, por ende solamente haré la tarea en latex que dejaron, aunqeu actualmente se esta tardando como 52 minutos la descarga del maldito MacTex....
creo que si lo haré a mano.
La parte genial del curso es que me aclaró una duda respecto a como utilizar los GW y los broadcast.
ya que yo tenía una conepción diferente de ello
Las otras tareas que tengo para la semana, son la de alrato que es hacer una referencia (Olguín), hacer un programa en assembler para arqui de compus.... terminar el algoritmo del círculo, que espero ahoritra me salga en python.... también el viernes que tengo examen de criptografía y tengo los 2 exámenes de certificación de cisco... por ende si tengo mucha tarea..
pero bueno, haré aqui la de SOC, TAC y NOC.
SOC.- según ésta referencia http://www.computerns.com/network-security, menciona que un SOC es un centro de monitoreo de actividades de seguridad en la red de un cliente, que estudia críticamente diferentes anomalías detectadas, identificadas .
Los Centro de Operaciones de Seguridad se enfocan en la seguridad y la estabilidad.
NOC.- El propósito de los NOC, según ésta referencia http://www.csoonline.com/article/216884/efficiency-through-noc-soc-convergence, son los que se encargan de asegurar, "power, ping and pipe", los cuales son medidos por los SLA's (Service Level Agreements),
Nota: los NOC y SOC, tienden a compartir operaciones estructurales similares, pero difieren en que el NOC, necesita personal que sea más expertos en redes, que en SOC, que necsita más expertos en seguridad de la información.
Pharming -> según éste link : http://www.techterms.com/definition/pharming
SCADA -> http://www.engineersgarage.com/articles/scada-systems
The
first push was given by the 8 and 16 bit computers called
minicomputers. The second was the microprocessors, several years later.
Computers offered flexibility in programming and communicating with
field data acquisition units that was previously being done by hard
wired equipments. This was the dawn of SCADA. Many
organizations have been involved with the standardization of SCADA
systems since then, including the IEEE, American National Standards
Institute, Electric Power Research Institute, International
Electrotechnical Commission, DNP3 Users group etc.
Elements of SCADA Systems
SCADA
monitors, controls and alarms the plant and/or regional facilities’
operating systems from a centralized location. It includes the
communication of information between a SCADA central host computer, many
scattered units and/or Programmable Logic Controllers. For example, in a
water filtration plant, the remote units measure the pressure in pipes
and report the readings to the central computer located somewhere in the
control tower. In case of any anomaly, the SCADA system would alert the
main station of the problem apprising it of other details like the
severity of the anomaly and measurement values in an organized fashion.
The systems may vary from simple, like temperature reporting in a
building to complex like monitoring the traffic on many traffic lights.
The system consists of the following elements:
1. SCADA Master Station Computer Systems:
It is the repository of the real-time or near real-time reported data
collected from the remote terminal units connected to it. It is
generally standard computer hardware equipment and very few SCADA system
suppliers have ventured out to make their own computer equipment. A few
companies like IBM and CDC did try making hardware for it, but the
effort was short lived and commercial off-the-shelf computer products
continue to be the main stay. The back end SCADA software must be able
to repeatedly poll the RTUs for data values, should have software for
their retrieval, storage and processing. The processing may include unit
conversion, cataloguing into tables etc.
2. Human-Machine Interface:
This is the eye candy part on the host station. The values that have
been stored in the host computers are presented to the human operator in
an understandable and comprehensible form using HMIs. These may provide
trending, diagnostic or management information and detailed schematics
and animations representing the current states of the machines under its
control. Pictorial representation being more understandable to humans
is the preferred form in SCADA HMIs.
UTM
ttp://www.webopedia.com/TERM/U/Unified_Threat_Management.html
SCADA