Browse Source

doc index

master
zeus 4 years ago
parent
commit
784bda7c55
  1. 31
      index-lab.adoc
  2. 52
      index-lab.adoc.html
  3. 2135
      index-lab.adoc.pdf

31
index-lab.adoc

@ -16,7 +16,14 @@ Apostolos rootApostolos@swarmlab.io
{empty} +
Lab docs
.Lab docs
****
*Internet of Things*. Is as a networked interconnection of devices in everyday use that are often equippedwith ubiquitous mechanism.
The Internet of Things (IoT) is based on processing of large amount of data in order to provide useful service. Along with physical objects, the IoT is composed of embedded software, electronics and sensors.
*Security* is defined as a set of mechanisms to protect sensitive data from vulnerable attacks and to guaranteeconfidentiality, integrity and authenticity of data.
****
@ -27,7 +34,7 @@ Lab docs
TIP: To Docker είναι μια πλατφόρμα λογισμικού ανοιχτού κώδικα που υλοποιεί Εικονικοποίηση (Virtualization) σε επίπεδο Λειτουργικού Συστήματος.
== IoT Docs
== Internet of things (IoT)
=== http://docs.swarmlab.io/SwarmLab-HowTos/labs/IoT/Intro-IoT.adoc.html[Intro IoT^]
@ -35,7 +42,25 @@ TIP: To Docker είναι μια πλατφόρμα λογισμικού ανο
TIP: How It Works, Apps, Swarm: The Five Principles of Swarm Intelligence
== Sec Docs
== Security
[INFO]
====
*Security* is defined as a set of mechanisms to protect sensitive data from vulnerable attacks and to guaranteeconfidentiality, integrity and authenticity of data.
*Network security,* in a cloud environment *(IaaS, PaaS, and SaaS) OR Cloud of Things* consists of the security of the underlying *physical environment* and the *logical security* controls that are inherent in the service or available to be consumed as a service.
- Physical environment security ensures access to the cloud service is adequately distributed, monitored, and protected by underlying physical resources.
- Logical network security controls consists of link, protocol, and application layer services.
In a *cloud environment*, a major part of network security is likely to be provided by virtual security devices and services, alongside traditional physical network devices.
Typically, the inspection and control of network traffic do not pass through physical interfaces where classical control devices can analyze or block them.
This is the reason why effective controls require the integration with the software layer - _network security architecture, security gateways (firewalls, WAF, SOA/API), Security Products (IDS/IPS, Sub Tier Firewall, Security Monitoring and Reporting, Denial of Service (DoS) protection/mitigation, and secure “base services” like DNSSEC and NTP_.
====
=== http://docs.swarmlab.io/SwarmLab-HowTos/labs/sec/ex-1_iptables.adoc.html[Scan and network statistics^]

52
index-lab.adoc.html

@ -454,12 +454,12 @@ body.book #toc,body.book #preamble,body.book h1.sect0,body.book .sect1>h2{page-b
<li><a href="#_install_docker">1.1. Install docker</a></li>
</ul>
</li>
<li><a href="#_iot_docs">2. IoT Docs</a>
<li><a href="#_internet_of_things_iot">2. Internet of things (IoT)</a>
<ul class="sectlevel2">
<li><a href="#_intro_iot">2.1. Intro IoT</a></li>
</ul>
</li>
<li><a href="#_sec_docs">3. Sec Docs</a>
<li><a href="#_security">3. Security</a>
<ul class="sectlevel2">
<li><a href="#_scan_and_network_statistics">3.1. Scan and network statistics</a></li>
<li><a href="#_network_analysis">3.2. Network analysis</a></li>
@ -482,8 +482,19 @@ body.book #toc,body.book #preamble,body.book h1.sect0,body.book .sect1>h2{page-b
<div class="paragraph">
<p><br></p>
</div>
<div class="sidebarblock">
<div class="content">
<div class="title">Lab docs</div>
<div class="paragraph">
<p>Lab docs</p>
<p><strong>Internet of Things</strong>. Is as a networked interconnection of devices in everyday use that are often equippedwith ubiquitous mechanism.</p>
</div>
<div class="paragraph">
<p>The Internet of Things (IoT) is based on processing of large amount of data in order to provide useful service. Along with physical objects, the IoT is composed of embedded software, electronics and sensors.</p>
</div>
<div class="paragraph">
<p><strong>Security</strong> is defined as a set of mechanisms to protect sensitive data from vulnerable attacks and to guaranteeconfidentiality, integrity and authenticity of data.</p>
</div>
</div>
</div>
</div>
</div>
@ -508,7 +519,7 @@ To Docker είναι μια πλατφόρμα λογισμικού ανοιχτ
</div>
</div>
<div class="sect1">
<h2 id="_iot_docs">2. IoT Docs</h2>
<h2 id="_internet_of_things_iot">2. Internet of things (IoT)</h2>
<div class="sectionbody">
<div class="sect2">
<h3 id="_intro_iot">2.1. <a href="http://docs.swarmlab.io/SwarmLab-HowTos/labs/IoT/Intro-IoT.adoc.html" target="_blank" rel="noopener">Intro IoT</a></h3>
@ -528,8 +539,37 @@ How It Works, Apps, Swarm: The Five Principles of Swarm Intelligence
</div>
</div>
<div class="sect1">
<h2 id="_sec_docs">3. Sec Docs</h2>
<h2 id="_security">3. Security</h2>
<div class="sectionbody">
<div class="exampleblock">
<div class="content">
<div class="paragraph">
<p><strong>Security</strong> is defined as a set of mechanisms to protect sensitive data from vulnerable attacks and to guaranteeconfidentiality, integrity and authenticity of data.</p>
</div>
<div class="paragraph">
<p><strong>Network security,</strong> in a cloud environment <strong>(IaaS, PaaS, and SaaS) OR Cloud of Things</strong> consists of the security of the underlying <strong>physical environment</strong> and the <strong>logical security</strong> controls that are inherent in the service or available to be consumed as a service.</p>
</div>
<div class="ulist">
<ul>
<li>
<p>Physical environment security ensures access to the cloud service is adequately distributed, monitored, and protected by underlying physical resources.</p>
</li>
<li>
<p>Logical network security controls consists of link, protocol, and application layer services.</p>
</li>
</ul>
</div>
<div class="paragraph">
<p>In a <strong>cloud environment</strong>, a major part of network security is likely to be provided by virtual security devices and services, alongside traditional physical network devices.</p>
</div>
<div class="paragraph">
<p>Typically, the inspection and control of network traffic do not pass through physical interfaces where classical control devices can analyze or block them.</p>
</div>
<div class="paragraph">
<p>This is the reason why effective controls require the integration with the software layer - <em>network security architecture, security gateways (firewalls, WAF, SOA/API), Security Products (IDS/IPS, Sub Tier Firewall, Security Monitoring and Reporting, Denial of Service (DoS) protection/mitigation, and secure “base services” like DNSSEC and NTP</em>.</p>
</div>
</div>
</div>
<div class="sect2">
<h3 id="_scan_and_network_statistics">3.1. <a href="http://docs.swarmlab.io/SwarmLab-HowTos/labs/sec/ex-1_iptables.adoc.html" target="_blank" rel="noopener">Scan and network statistics</a></h3>
<div class="admonitionblock tip">
@ -656,7 +696,7 @@ This tutorial demonstrates some common <strong>nmap</strong> port scanning scena
</div>
<div id="footer">
<div id="footer-text">
Last updated 2020-10-13 12:56:04 UTC
Last updated 2020-10-13 13:48:28 UTC
</div>
</div>
</body>

2135
index-lab.adoc.pdf

File diff suppressed because it is too large
Loading…
Cancel
Save