![Page 1: Paper Schedule Geo. PaperTitle OAD Modeling –Chapter 1.Introduction ( SAPH) –Chapter 2.Security Modeling Overview –Chapter 3.Comparing Cons and Pros –Chapter](https://reader035.vdocument.in/reader035/viewer/2022070415/56649d495503460f94a2604f/html5/thumbnails/1.jpg)
Paper Schedule
Geo
![Page 2: Paper Schedule Geo. PaperTitle OAD Modeling –Chapter 1.Introduction ( SAPH) –Chapter 2.Security Modeling Overview –Chapter 3.Comparing Cons and Pros –Chapter](https://reader035.vdocument.in/reader035/viewer/2022070415/56649d495503460f94a2604f/html5/thumbnails/2.jpg)
Paper Title
• OAD Modeling– Chapter 1.Introduction ( SAPH)– Chapter 2.Security Modeling Overview– Chapter 3.Comparing Cons and Pros– Chapter 4.OAB Modeling– Chapter 5.ProtoType of OAB Modeling– Chapter 6.Conclusion
![Page 3: Paper Schedule Geo. PaperTitle OAD Modeling –Chapter 1.Introduction ( SAPH) –Chapter 2.Security Modeling Overview –Chapter 3.Comparing Cons and Pros –Chapter](https://reader035.vdocument.in/reader035/viewer/2022070415/56649d495503460f94a2604f/html5/thumbnails/3.jpg)
Scenario
EngineeringDepartment
AccountingDepartment
DataBaseServer
Router
User: Geo
192.168.1.1/24
E0:192.168.1.254/24
192.168.2.1/24
E1:192.168.2.254/24
Switch_E Switch_A
WWWServer
192.168.2.2/24
Geo001
![Page 4: Paper Schedule Geo. PaperTitle OAD Modeling –Chapter 1.Introduction ( SAPH) –Chapter 2.Security Modeling Overview –Chapter 3.Comparing Cons and Pros –Chapter](https://reader035.vdocument.in/reader035/viewer/2022070415/56649d495503460f94a2604f/html5/thumbnails/4.jpg)
Demo (1)
![Page 5: Paper Schedule Geo. PaperTitle OAD Modeling –Chapter 1.Introduction ( SAPH) –Chapter 2.Security Modeling Overview –Chapter 3.Comparing Cons and Pros –Chapter](https://reader035.vdocument.in/reader035/viewer/2022070415/56649d495503460f94a2604f/html5/thumbnails/5.jpg)
Demo (2)
![Page 6: Paper Schedule Geo. PaperTitle OAD Modeling –Chapter 1.Introduction ( SAPH) –Chapter 2.Security Modeling Overview –Chapter 3.Comparing Cons and Pros –Chapter](https://reader035.vdocument.in/reader035/viewer/2022070415/56649d495503460f94a2604f/html5/thumbnails/6.jpg)
Demo (3)
![Page 7: Paper Schedule Geo. PaperTitle OAD Modeling –Chapter 1.Introduction ( SAPH) –Chapter 2.Security Modeling Overview –Chapter 3.Comparing Cons and Pros –Chapter](https://reader035.vdocument.in/reader035/viewer/2022070415/56649d495503460f94a2604f/html5/thumbnails/7.jpg)
Demo (4)
![Page 8: Paper Schedule Geo. PaperTitle OAD Modeling –Chapter 1.Introduction ( SAPH) –Chapter 2.Security Modeling Overview –Chapter 3.Comparing Cons and Pros –Chapter](https://reader035.vdocument.in/reader035/viewer/2022070415/56649d495503460f94a2604f/html5/thumbnails/8.jpg)
Demo (5)
![Page 9: Paper Schedule Geo. PaperTitle OAD Modeling –Chapter 1.Introduction ( SAPH) –Chapter 2.Security Modeling Overview –Chapter 3.Comparing Cons and Pros –Chapter](https://reader035.vdocument.in/reader035/viewer/2022070415/56649d495503460f94a2604f/html5/thumbnails/9.jpg)
Architecture
• PHP
• MySQL
![Page 10: Paper Schedule Geo. PaperTitle OAD Modeling –Chapter 1.Introduction ( SAPH) –Chapter 2.Security Modeling Overview –Chapter 3.Comparing Cons and Pros –Chapter](https://reader035.vdocument.in/reader035/viewer/2022070415/56649d495503460f94a2604f/html5/thumbnails/10.jpg)
Resource
• Pens
• Papers
• And one computer.
![Page 11: Paper Schedule Geo. PaperTitle OAD Modeling –Chapter 1.Introduction ( SAPH) –Chapter 2.Security Modeling Overview –Chapter 3.Comparing Cons and Pros –Chapter](https://reader035.vdocument.in/reader035/viewer/2022070415/56649d495503460f94a2604f/html5/thumbnails/11.jpg)
Paper Schedule
工作 起始日期 結束日期 工作時間Chapter 2
草稿09/20 10/3 2 weeks
Chapter 3
草稿10/4 10/10 1 weeks
Chapter 4 草稿
10/11 11/21 5 weeks
Chapter 1,6 草稿
11/22 12/5 2 weeks
![Page 12: Paper Schedule Geo. PaperTitle OAD Modeling –Chapter 1.Introduction ( SAPH) –Chapter 2.Security Modeling Overview –Chapter 3.Comparing Cons and Pros –Chapter](https://reader035.vdocument.in/reader035/viewer/2022070415/56649d495503460f94a2604f/html5/thumbnails/12.jpg)
Paper Schedule (cont.)
工作 起始日期 結束日期 工作時間Chapter 5草稿
12/6 12/12 1 week
合併順稿 12/13 12/26 2 weeks
申請學位考試截止日
12/16
初稿完成 (12/26)大修訂 12/27 1/16 3 weeks
編寫投影片 1/17 1/30 2 weeks
![Page 13: Paper Schedule Geo. PaperTitle OAD Modeling –Chapter 1.Introduction ( SAPH) –Chapter 2.Security Modeling Overview –Chapter 3.Comparing Cons and Pros –Chapter](https://reader035.vdocument.in/reader035/viewer/2022070415/56649d495503460f94a2604f/html5/thumbnails/13.jpg)
Implementation Schedule
工作 起始日期 結束日期 工作時間Specific 09/24 09/27 4 days
Cisco ACL Command Data, Service Type Data
09/28 10/01 5 days
Ciscoacl() 10/2 10/8 1 weeks
![Page 14: Paper Schedule Geo. PaperTitle OAD Modeling –Chapter 1.Introduction ( SAPH) –Chapter 2.Security Modeling Overview –Chapter 3.Comparing Cons and Pros –Chapter](https://reader035.vdocument.in/reader035/viewer/2022070415/56649d495503460f94a2604f/html5/thumbnails/14.jpg)
Implementation Schedule(cont.)
工作 起始日期 結束日期 工作時間Topology - Component
10/9 10/5 1 weeks
Policy() 10/6 10/19 2 weeks
path() 10/20 11/10 2 weeks
Testing and Debugging
11/11 11/31 3 weeks
![Page 15: Paper Schedule Geo. PaperTitle OAD Modeling –Chapter 1.Introduction ( SAPH) –Chapter 2.Security Modeling Overview –Chapter 3.Comparing Cons and Pros –Chapter](https://reader035.vdocument.in/reader035/viewer/2022070415/56649d495503460f94a2604f/html5/thumbnails/15.jpg)
Demo Display (1)
My boss wants to let Geo can access only www server in accounting department
Geo001WWW DB
( Policy form data, policy(), component form data)
![Page 16: Paper Schedule Geo. PaperTitle OAD Modeling –Chapter 1.Introduction ( SAPH) –Chapter 2.Security Modeling Overview –Chapter 3.Comparing Cons and Pros –Chapter](https://reader035.vdocument.in/reader035/viewer/2022070415/56649d495503460f94a2604f/html5/thumbnails/16.jpg)
Demo Display (2)
(List the node of allowed traffic by topology form data or component form)
Geo001 > Switch_E > Branch Router > HQ Route > Switch_A > WWW Server
(component form data, path())
![Page 17: Paper Schedule Geo. PaperTitle OAD Modeling –Chapter 1.Introduction ( SAPH) –Chapter 2.Security Modeling Overview –Chapter 3.Comparing Cons and Pros –Chapter](https://reader035.vdocument.in/reader035/viewer/2022070415/56649d495503460f94a2604f/html5/thumbnails/17.jpg)
Demo Display (4)
(According the policy to determine the ACL type)
Extend ACL
(service type data, cisco acl command data, ciscoacl())
![Page 18: Paper Schedule Geo. PaperTitle OAD Modeling –Chapter 1.Introduction ( SAPH) –Chapter 2.Security Modeling Overview –Chapter 3.Comparing Cons and Pros –Chapter](https://reader035.vdocument.in/reader035/viewer/2022070415/56649d495503460f94a2604f/html5/thumbnails/18.jpg)
Demo Display (3)
(Check Object Property and Find Which interfaces are needed)
We need set up policies in interface E0 in Branch Router
E0
(Topology form data, ciscoacl())
![Page 19: Paper Schedule Geo. PaperTitle OAD Modeling –Chapter 1.Introduction ( SAPH) –Chapter 2.Security Modeling Overview –Chapter 3.Comparing Cons and Pros –Chapter](https://reader035.vdocument.in/reader035/viewer/2022070415/56649d495503460f94a2604f/html5/thumbnails/19.jpg)
Demo Display (5)
ACL in E0 interface of Branch :
access-list 110 permit tcp host 192.168.1.2 host 192.168.2.2 eq 23
E0
(ciscoacl(), cisco acl command data, service type data)
![Page 20: Paper Schedule Geo. PaperTitle OAD Modeling –Chapter 1.Introduction ( SAPH) –Chapter 2.Security Modeling Overview –Chapter 3.Comparing Cons and Pros –Chapter](https://reader035.vdocument.in/reader035/viewer/2022070415/56649d495503460f94a2604f/html5/thumbnails/20.jpg)
Demo Display (6)
Finally we get a result :
An ACL in E0 interface can satisfy our request.