SlideShare une entreprise Scribd logo
1  sur  42
01- Fundamentals of Network Security 
Ahmed Sultan 
CCNA | CCNA Security | CCNP Security | JNCIA-Junos | CEH 
© 2009 Cisco Learning Institute. 1
What is Network Security? 
National Security Telecommunications and 
Information Systems Security Committee (NSTISSC) 
Network security is the protection of information and 
systems and hardware that use, store, and transmit that 
information. 
Network security encompasses those steps that are taken 
to ensure the confidentiality, integrity, and availability of 
data or resources. 
© 2009 Cisco Learning Institute. 2
Rationale for Network Security 
Network security initiatives and network security 
specialists can be found in private and public, large and 
small companies and organizations. The need for network 
security and its growth are driven by many factors: 
1. Internet connectivity is 24/7 and is worldwide 
2. Increase in cyber crime 
3. Impact on business and individuals 
4. Legislation & liabilities 
5. Proliferation of threats 
6. Sophistication of threats 
© 2009 Cisco Learning Institute. 3
Cyber Crime 
• Fraud/Scams 
• Identity Theft 
• Child Pornography 
• Theft of Telecommunications Services 
• Electronic Vandalism, Terrorism and Extortion 
WASHINGTON, D.C. –– An estimated 
3.6 million households, or about 3 
percent of all households in the nation, 
learned that they had been the victim of 
at least one type of identity theft during 
a six-month period in 2004, according 
to the Justice Department’s Bureau of 
Justice Statistics 
© 2009 Cisco Learning Institute. 4
Business Impact 
1. Decrease in productivity 
2. Loss of sales revenue 
3. Release of unauthorized sensitive data 
4. Threat of trade secrets or formulas 
5. Compromise of reputation and trust 
6. Loss of communications 
7. Threat to environmental and safety systems 
8. Loss of time 
© 2009 Cisco Learning Institute. 5
Proliferation of Threats 
In 2001, the National Infrastructure Protection Center at the FBI 
released a document summarizing the 
Ten Most Critical Internet Security Vulnerabilities. 
Since that time, thousands of organizations rely on this list to 
prioritize their efforts so they can close the most dangerous holes 
first. 
The threat landscape is very 
dynamic, which in turn makes it 
necessary to adopt newer 
security measures. 
Just over the last few years, the 
kinds of vulnerabilities that are 
being exploited are very different 
from the ones being exploited in 
the past. 
© 2009 Cisco Learning Institute. 6
Sophistication of Threats 
© 2009 Cisco Learning Institute. 7
Legislation 
Federal and local government has passed legislation that 
holds organizations and individuals liable for 
mismanagement of sensitive data. These laws include: 
1.The Health Insurance Portability and Accountability Act of 1996 2.The Sarbanes-Oxley Act of 2002 (Sarbox) 
3.The Gramm-Leach-Blilely Act (GLBA) 
4.US PATRIOT Act 2001 
© 2009 Cisco Learning Institute. 8
Goals of an Information 
Security Program 
• Confidentiality 
- Prevent the disclosure of sensitive information from unauthorized 
people, resources, and processes 
• Integrity 
- The protection of system information or processes from 
intentional or accidental modification 
• Availability 
- The assurance that systems and data are 
accessible by authorized users when needed 
© 2009 Cisco Learning Institute. 9
Risk Management 
• Risk Analysis 
• Threats 
• Vulnerabilities 
• Countermeasures 
© 2009 Cisco Learning Institute. 10
Risk Management 
Control physical access Password protection 
Develop a Security Policy 
• The process of assessing and quantifying risk and establishing an 
acceptable level of risk for the organization 
• Risk can be mitigated, but cannot be eliminated 
© 2009 Cisco Learning Institute. 11
Risk Assessment 
• Risk assessment involves determining the likelihood that 
the vulnerability is a risk to the organization 
• Each vulnerability can be ranked by the scale 
• Sometimes calculating anticipated losses can be helpful 
in determining the impact of a vulnerability 
© 2009 Cisco Learning Institute. 12
Asset Identification 
• Categories of assets 
- Information Assets (people, hardware, software, systems) 
- Supporting Assets (facilities, utilities, services) 
- Critical Assets (can be either of those listed above) 
• Determine each item’s relative value 
- How much revenue/profit does it generate? 
- What is the cost to replace it? 
- How difficult would it be to replace? 
- How quickly can it be replaced? 
© 2009 Cisco Learning Institute. 13
Network Security “Threat” 
• A potential danger to information or a system 
• An example: the ability to gain unauthorized access to systems or 
information in order to commit fraud, network intrusion, industrial 
espionage, identity theft, or simply to disrupt the system or network 
• There may be weaknesses that greatly increase the likelihood of a 
threat manifesting 
• Threats may include equipment failure, 
structured attacks, natural disasters, 
physical attacks, theft, viruses and 
many other potential events causing 
danger or damage 
© 2009 Cisco Learning Institute. 14
Types of Network Threats 
• Eavesdropping 
• Denial-of-service 
• Packet replay 
• Man-in-the-middle 
• Packet modification 
© 2009 Cisco Learning Institute. 15
Vulnerability 
• A network vulnerability is a weakness in a system, 
technology, product or policy 
• In today’s environment, several organizations track, 
organize and test these vulnerabilities 
• The US government has a contract with an organization 
to track and publish network vulnerabilities 
• Each vulnerability is given an ID and can be reviewed by 
network security professionals over the Internet. 
• The common vulnerability exposure (CVE) list also 
publishes ways to prevent the vulnerability from being 
attacked 
© 2009 Cisco Learning Institute. 16
Vulnerability Appraisal 
• It is very important that network security specialists 
comprehend the importance of vulnerability appraisal 
• A vulnerability appraisal is a snapshot of the current 
security of the organization as it now stands 
• What current security weaknesses may expose the 
assets to these threats? 
• Vulnerability scanners are tools available as free Internet 
downloads and as commercial products 
- These tools compare the asset against a database of known 
vulnerabilities and produce a discovery report that exposes the 
vulnerability and assesses its severity 
© 2009 Cisco Learning Institute. 17
Risk Management Terms 
• Vulnerability – a system, network or device weakness 
• Threat – potential danger posed by a vulnerability 
• Threat Agent – the entity that indentifies a vulnerability 
and uses it to attack the victim 
• Risk – likelihood of a threat agent taking advantage of 
a vulnerability and the corresponding business impact 
• Exposure – potential to experience losses from a threat 
agent 
• Countermeasure – put into place to mitigate the 
potential risk 
© 2009 Cisco Learning Institute. 18
Understanding Risk 
Threat 
Agent 
Leads to 
Risk 
Gives rise to 
Threat 
Exploits 
Vulnerability 
Asset 
Directly affects 
Countermeasure 
Exposure 
Can damage 
Causes 
Can be safeguarded by 
© 2009 Cisco Learning Institute. 19
Types of Attacks 
Structured attack 
Come from hackers who are more highly motivated and technically 
competent. These people know system vulnerabilities and can 
understand and develop exploit code and scripts. They understand, 
develop, and use sophisticated hacking techniques to penetrate 
unsuspecting businesses. These groups are often involved with the 
major fraud and theft cases reported to law enforcement agencies. 
Unstructured attack 
Consists of mostly inexperienced individuals using easily available 
hacking tools such as shell scripts and password crackers. Even 
unstructured threats that are only executed with the intent of testing 
and challenging a hacker’s skills can still do serious damage to a 
company. 
© 2009 Cisco Learning Institute. 20
Types of Attacks 
External attacks 
Initiated by individuals or groups working outside of a company. 
They do not have authorized access to the computer systems or 
network. They gather information in order to work their way into a 
network mainly from the Internet or dialup access servers. 
Internal attacks 
More common and dangerous. Internal attacks are initiated by 
someone who has authorized access to the network. According to 
the FBI, internal access and misuse account for 60 to 80 percent of 
reported incidents. These attacks often are traced to disgruntled 
employees. 
© 2009 Cisco Learning Institute. 21
Types of Attacks 
• Passive Attack 
- Listen to system passwords 
- Release of message content 
- Traffic analysis 
- Data capturing 
• Active Attack 
- Attempt to log into someone else’s account 
- Wire taps 
- Denial of services 
- Message modifications 
© 2009 Cisco Learning Institute. 22
Specific Network Attacks 
• ARP Attack 
• Brute Force Attack 
• Worms 
• Flooding 
• Sniffers 
• Spoofing 
• Redirected Attacks 
• Tunneling Attack 
• Covert Channels 
© 2009 Cisco Learning Institute. 23
Information Leakage Attacks 
• Attackers can sometimes get data without having to 
directly use computers 
• Exploit Internet services that are intended to give out 
information 
• Induce these services to reveal extra information or to 
give it out to unauthorized people 
• Many services designed for use on local area networks 
do not have the security needed for safe use across the 
Internet 
• Thus these services become the means for important 
information leakage 
© 2009 Cisco Learning Institute. 24
Social Engineering Attacks 
• Hacker-speak for tricking a person into revealing some 
confidential information 
• Social Engineering is defined as an attack based on 
deceiving users or administrators at the target site 
• Done to gain illicit access to systems or useful 
information 
• The goals of social engineering are fraud, network 
intrusion, industrial espionage, identity theft, etc. 
© 2009 Cisco Learning Institute. 25
Attack Methodology 
Stages - the methodology of network attacks is well 
documented and researched. This research has led to 
greater understanding of network attacks and an entire 
specialization of engineers that test and protect networks 
against attacks (Certified Ethical Hackers/Penetration 
Testers) 
Tools - penetration testers have a variety of power tools that 
are now commercially available. They also have may open 
source free tools. This proliferation of powerful tools has 
increased the threat of attack due to the fact that even 
technical novices can now launch sophisticated attacks. 
© 2009 Cisco Learning Institute. 26
Stages of an Attack 
• Today’s attackers have a abundance of targets. In fact 
their greatest challenge is to select the most vulnerable 
victims. This has resulted in very well- planned and 
structured attacks. These attacks have common logistical 
and strategic stages. These stages include; 
- Reconnaissance 
- Scanning (addresses, ports, vulnerabilities) 
- Gaining access 
- Maintaining Access 
- Covering Tracks 
© 2009 Cisco Learning Institute. 27
Tools of the Attacker 
• The following are a few of the most popular tools used by 
network attackers: 
- Enumeration tools (dumpreg, netview and netuser) 
- Port/address scanners (AngryIP, nmap, Nessus) 
- Vulnerability scanners (Meta Sploit, Core Impact, ISS) 
- Packet Sniffers (Snort, Wire Shark, Air Magnet) 
- Root kits 
- Cryptographic cracking tools (Cain, WepCrack) 
- Malicious codes (worms, Trojan horse, time bombs) 
- System hijack tools (netcat, MetaSploit, Core Impact) 
© 2009 Cisco Learning Institute. 28
Countermeasures 
• DMZ/NAT 
• IDS/IPS 
• Content Filtering/NAC 
• Firewalls/proxy services 
• Authentication/Authorization/Accounting 
• Self-defending networks 
• Policies, procedures, standards guidelines 
• Training and awareness 
© 2009 Cisco Learning Institute. 29
Security Administration 
• Policies 
• Standards 
• Guidelines 
• Procedures 
• Baselines 
Domains of Network Security 
1. Risk Assessment 
2. Security Policy 
3. Organization of Information Security 
4. Asset Management 
5. Human Resources Security 
6. Physical and Environmental Security 
7. Communications and Operations Management 
8. Access Control 
9. Information Systems Acquisition, Development 
and Maintenance 
10. Information Security Incident Management 
11. Business Continuity Management 
12. Compliance 
© 2009 Cisco Learning Institute. 30
What Is a Security Policy? 
• A document that states how an organization plans to 
protect its tangible and intangible information assets 
- Management instructions indicating a course of action, a guiding 
principle, or appropriate procedure 
- High-level statements that provide guidance to workers who 
must make present and future decisions 
- Generalized requirements that must be written down and 
communicated to others 
© 2009 Cisco Learning Institute. 31
Example: The Policy 
• All users must have a unique user ID and 
password that conforms to the company 
password standard 
• Users must not share their password with 
anyone regardless of title or position 
• Passwords must not be stored in written or any 
readable form 
• If a compromise is suspected, it must be 
reported to the help desk and a new password 
must be requested 
© 2009 Cisco Learning Institute. 32
Example: The Standards 
• Minimum of 8 upper- and lowercase 
alphanumeric characters 
• Must include a special character 
• Must be changed every 30 days 
© 2009 Cisco Learning Institute. 33
Network Security Organizations 
www.infosyssec.com 
www.sans.org 
www.cisecurity.org 
www.cert.org 
www.isc2.org 
www.first.org 
www.infragard.net 
www.mitre.org 
www.cnss.gov 
© 2009 Cisco Learning Institute. 34
SANS 
© 2009 Cisco Learning Institute. 35
CERT 
© 2009 Cisco Learning Institute. 36
Information security certifications Offered by (ISC)2 
ISC2 
Systems Security Certified Practitioner (SCCP) 
Certification and Accreditation Professional (CAP) 
Certified Secure Software Lifecycle Professional (CSSLP) 
Certified Information Systems Security Professional (CISSP) 
© 2009 Cisco Learning Institute. 37
Network Security Jobs 
• Network Security Administrator 
• Risk Analyst 
• VPN Specialist 
• Penetration Tester 
• Network Perimeter/Firewall Specialist 
• Security Response IDS/IPS Engineer 
© 2009 Cisco Learning Institute. 38
Network Security Jobs 
Examples from Salary.com: 
• Network Security Administrator 
Troubleshoots network access problems and implements network security 
policies and procedures. Ensures network security access and protects 
against unauthorized access, modification, or destruction. Requires a 
bachelor's degree with at least 5 years of experience in the field. Familiar 
with a variety of the field's concepts, practices, and procedures. Relies on 
extensive experience and judgment to plan and accomplish goals. Performs 
a variety of tasks. May lead and direct the work of others. A wide degree of 
creativity and latitude is expected. 
• Risk Analyst 
Performs risk analysis studies in order to maintain maximum protection of 
an organization's assets. Investigates any incidences that may result in 
asset loss and compiles findings in reports for further review. Requires a 
bachelor's degree and 0-2 years of experience in the field or in a related 
area. Has knowledge of commonly-used concepts, practices, and 
procedures within a particular field. Relies on instructions and pre-established 
guidelines to perform the functions of the job. Works under 
immediate supervision. Primary job functions do not typically require 
exercising independent judgment. 
© 2009 Cisco Learning Institute. 39
Network Security Jobs, 2 
• Chief Information Security Officer 
Responsible for determining enterprise information security standards. 
Develops and implements information security standards and procedures. 
Ensures that all information systems are functional and secure. Requires a 
bachelor's degree with at least 12 years of experience in the field. Familiar 
with a variety of the field's concepts, practices, and procedures. Relies on 
extensive experience and judgment to plan and accomplish goals. 
Performs a variety of tasks. Leads and directs the work of others. A wide 
degree of creativity and latitude is expected. Typically reports to top 
management. 
• Network Perimeter/Firewall Specialist 
This position requires Experience and Skills working with perimeter 
protection devices and network firewalls. The candidate must have 
experience with PIX Firewalls and MPLS Network experience. Cisco Switch 
and Router experience is a plus. Experience with Network Transformation 
and Server Re-IP projects is a definite plus. Other Firewall experience is a 
definite plus. 
© 2009 Cisco Learning Institute. 40
Network Security Jobs, 3 
• Ethical hacker/Penetration Tester 
Responsible for testing and improving network and information system 
security systems. This is a very sensitive hands-on front line position. This 
person will be working in a team environment. This individual will be 
performing mostly network and web application ethical hacking 
assessments on multi-protocol enterprise network and application systems. 
Duties may include: Requirements analysis and design, scoping of testing 
activity, vulnerability assessment, assessing tools/script testing, 
troubleshooting and physical security audits, logical security audits, logical 
protocol and traffic audits. 
• Security Response IDS/IPS Engineer 
Provides support for the Intrusion Detection/Prevention Service, Host Log 
Monitoring Service, and Wireless IPS Service associated with Managed 
Security Services. Must have a well-rounded security background and are 
responsible for performing extensive troubleshooting of customer issues 
via Customer Support escalations from the Security Operations Center 
(SOC) Analysts. This individual performs both infrastructure engineering 
and customer focused projects to resolve all incidents in timely manner. 
These needs may involve performing device upgrades, investigating and 
responding to advanced security threats, and making changes to the 
security policy of a customer's device. 
© 2009 Cisco Learning Institute. 41
CCNA Security 02-  fundamentals of network security

Contenu connexe

Tendances

CCNA Introducing Networks
CCNA Introducing NetworksCCNA Introducing Networks
CCNA Introducing NetworksDsunte Wilson
 
CCNA Security - Chapter 2
CCNA Security - Chapter 2CCNA Security - Chapter 2
CCNA Security - Chapter 2Irsandi Hasan
 
Cisco router basic
Cisco router basicCisco router basic
Cisco router basicTapan Khilar
 
What is Penetration Testing?
What is Penetration Testing?What is Penetration Testing?
What is Penetration Testing?btpsec
 
Network security
Network securityNetwork security
Network securityEstiak Khan
 
Wireshark course, Ch 03: Capture and display filters
Wireshark course, Ch 03: Capture and display filtersWireshark course, Ch 03: Capture and display filters
Wireshark course, Ch 03: Capture and display filtersYoram Orzach
 
CCNA Product Overview.pptx
CCNA Product Overview.pptxCCNA Product Overview.pptx
CCNA Product Overview.pptxKISHOYIANKISH
 
CCNA ppt Day 1
CCNA ppt Day 1CCNA ppt Day 1
CCNA ppt Day 1VISHNU N
 
Cyber Security Awareness Program.pptx
Cyber Security Awareness Program.pptxCyber Security Awareness Program.pptx
Cyber Security Awareness Program.pptxDinesh582831
 
Network Security Fundamentals
Network Security FundamentalsNetwork Security Fundamentals
Network Security FundamentalsRahmat Suhatman
 
Fortinet_ProductGuide_NOV2021_R127.pdf
Fortinet_ProductGuide_NOV2021_R127.pdfFortinet_ProductGuide_NOV2021_R127.pdf
Fortinet_ProductGuide_NOV2021_R127.pdfAlonzoJames2
 
FortiGate_Sec_02_Security Fabric (1).pptx
FortiGate_Sec_02_Security Fabric (1).pptxFortiGate_Sec_02_Security Fabric (1).pptx
FortiGate_Sec_02_Security Fabric (1).pptxNajahIdrissiMoulayRa
 
DDOS ile Saldırı Gizleme "Smoke Screening"
DDOS ile Saldırı Gizleme "Smoke Screening"DDOS ile Saldırı Gizleme "Smoke Screening"
DDOS ile Saldırı Gizleme "Smoke Screening"BGA Cyber Security
 
WLAN Attacks and Protection
WLAN Attacks and ProtectionWLAN Attacks and Protection
WLAN Attacks and ProtectionChandrak Trivedi
 

Tendances (20)

CCNA Introducing Networks
CCNA Introducing NetworksCCNA Introducing Networks
CCNA Introducing Networks
 
Firewall and its configuration
Firewall and its configurationFirewall and its configuration
Firewall and its configuration
 
Wi-fi Hacking
Wi-fi HackingWi-fi Hacking
Wi-fi Hacking
 
CCNA Security - Chapter 2
CCNA Security - Chapter 2CCNA Security - Chapter 2
CCNA Security - Chapter 2
 
Cisco router basic
Cisco router basicCisco router basic
Cisco router basic
 
What is Penetration Testing?
What is Penetration Testing?What is Penetration Testing?
What is Penetration Testing?
 
Network security
Network securityNetwork security
Network security
 
Wireshark course, Ch 03: Capture and display filters
Wireshark course, Ch 03: Capture and display filtersWireshark course, Ch 03: Capture and display filters
Wireshark course, Ch 03: Capture and display filters
 
IoT Security
IoT SecurityIoT Security
IoT Security
 
CCNA Product Overview.pptx
CCNA Product Overview.pptxCCNA Product Overview.pptx
CCNA Product Overview.pptx
 
Chapter 4
Chapter 4Chapter 4
Chapter 4
 
CCNA ppt Day 1
CCNA ppt Day 1CCNA ppt Day 1
CCNA ppt Day 1
 
Cyber Security Awareness Program.pptx
Cyber Security Awareness Program.pptxCyber Security Awareness Program.pptx
Cyber Security Awareness Program.pptx
 
Network Security Fundamentals
Network Security FundamentalsNetwork Security Fundamentals
Network Security Fundamentals
 
Fortinet_ProductGuide_NOV2021_R127.pdf
Fortinet_ProductGuide_NOV2021_R127.pdfFortinet_ProductGuide_NOV2021_R127.pdf
Fortinet_ProductGuide_NOV2021_R127.pdf
 
FortiGate_Sec_02_Security Fabric (1).pptx
FortiGate_Sec_02_Security Fabric (1).pptxFortiGate_Sec_02_Security Fabric (1).pptx
FortiGate_Sec_02_Security Fabric (1).pptx
 
Cyber security
Cyber securityCyber security
Cyber security
 
DDOS ile Saldırı Gizleme "Smoke Screening"
DDOS ile Saldırı Gizleme "Smoke Screening"DDOS ile Saldırı Gizleme "Smoke Screening"
DDOS ile Saldırı Gizleme "Smoke Screening"
 
WLAN Attacks and Protection
WLAN Attacks and ProtectionWLAN Attacks and Protection
WLAN Attacks and Protection
 
Security Awareness Training by Fortinet
Security Awareness Training by FortinetSecurity Awareness Training by Fortinet
Security Awareness Training by Fortinet
 

Similaire à CCNA Security 02- fundamentals of network security

CCNA_Security_01.ppt
CCNA_Security_01.pptCCNA_Security_01.ppt
CCNA_Security_01.pptveracru1
 
Chapter 1 overview
Chapter 1 overviewChapter 1 overview
Chapter 1 overviewali raza
 
Network Security for Computer science and Engineering.ppt
Network Security for Computer science and Engineering.pptNetwork Security for Computer science and Engineering.ppt
Network Security for Computer science and Engineering.pptAkfeteAssefa
 
Information Technology Security Basics
Information Technology Security BasicsInformation Technology Security Basics
Information Technology Security BasicsMohan Jadhav
 
Cyber security for Developers
Cyber security for DevelopersCyber security for Developers
Cyber security for Developerstechtutorus
 
Lec 1- Intro to cyber security and recommendations
Lec 1- Intro to cyber security and recommendationsLec 1- Intro to cyber security and recommendations
Lec 1- Intro to cyber security and recommendationsBilalMehmood44
 
30ITSecurityThreatsVulnerabilitiesandCountermeasuresV1.ppt
30ITSecurityThreatsVulnerabilitiesandCountermeasuresV1.ppt30ITSecurityThreatsVulnerabilitiesandCountermeasuresV1.ppt
30ITSecurityThreatsVulnerabilitiesandCountermeasuresV1.pptKaukau9
 
Webinar - Reducing the Risk of a Cyber Attack on Utilities
Webinar - Reducing the Risk of a Cyber Attack on UtilitiesWebinar - Reducing the Risk of a Cyber Attack on Utilities
Webinar - Reducing the Risk of a Cyber Attack on UtilitiesWPICPE
 
CCNA Security - Chapter 1
CCNA Security - Chapter 1CCNA Security - Chapter 1
CCNA Security - Chapter 1Irsandi Hasan
 
Cisco 2014 - Anual Security Report
Cisco 2014 - Anual Security Report Cisco 2014 - Anual Security Report
Cisco 2014 - Anual Security Report Mandar Kharkar
 
Cloud Security.pptx
Cloud Security.pptxCloud Security.pptx
Cloud Security.pptxBinod Rimal
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptxAkshayKhade21
 
Information Assurance And Security - Chapter 2 - Lesson 2
Information Assurance And Security - Chapter 2 - Lesson 2Information Assurance And Security - Chapter 2 - Lesson 2
Information Assurance And Security - Chapter 2 - Lesson 2MLG College of Learning, Inc
 
Principles of Computer Security, Fourth Edition Copyright .docx
Principles of Computer Security, Fourth Edition Copyright .docxPrinciples of Computer Security, Fourth Edition Copyright .docx
Principles of Computer Security, Fourth Edition Copyright .docxharrisonhoward80223
 
Toward Continuous Cybersecurity with Network Automation
Toward Continuous Cybersecurity with Network AutomationToward Continuous Cybersecurity with Network Automation
Toward Continuous Cybersecurity with Network AutomationE.S.G. JR. Consulting, Inc.
 
Toward Continuous Cybersecurity With Network Automation
Toward Continuous Cybersecurity With Network AutomationToward Continuous Cybersecurity With Network Automation
Toward Continuous Cybersecurity With Network AutomationKen Flott
 

Similaire à CCNA Security 02- fundamentals of network security (20)

CCNA_Security_01.ppt
CCNA_Security_01.pptCCNA_Security_01.ppt
CCNA_Security_01.ppt
 
Chapter 1 overview
Chapter 1 overviewChapter 1 overview
Chapter 1 overview
 
Network Security for Computer science and Engineering.ppt
Network Security for Computer science and Engineering.pptNetwork Security for Computer science and Engineering.ppt
Network Security for Computer science and Engineering.ppt
 
ENSA_Module_3.pptx
ENSA_Module_3.pptxENSA_Module_3.pptx
ENSA_Module_3.pptx
 
Information Technology Security Basics
Information Technology Security BasicsInformation Technology Security Basics
Information Technology Security Basics
 
Cyber security for Developers
Cyber security for DevelopersCyber security for Developers
Cyber security for Developers
 
Lec 1- Intro to cyber security and recommendations
Lec 1- Intro to cyber security and recommendationsLec 1- Intro to cyber security and recommendations
Lec 1- Intro to cyber security and recommendations
 
30ITSecurityThreatsVulnerabilitiesandCountermeasuresV1.ppt
30ITSecurityThreatsVulnerabilitiesandCountermeasuresV1.ppt30ITSecurityThreatsVulnerabilitiesandCountermeasuresV1.ppt
30ITSecurityThreatsVulnerabilitiesandCountermeasuresV1.ppt
 
Webinar - Reducing the Risk of a Cyber Attack on Utilities
Webinar - Reducing the Risk of a Cyber Attack on UtilitiesWebinar - Reducing the Risk of a Cyber Attack on Utilities
Webinar - Reducing the Risk of a Cyber Attack on Utilities
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
 
CCNA Security - Chapter 1
CCNA Security - Chapter 1CCNA Security - Chapter 1
CCNA Security - Chapter 1
 
Cisco 2014 - Anual Security Report
Cisco 2014 - Anual Security Report Cisco 2014 - Anual Security Report
Cisco 2014 - Anual Security Report
 
Cloud Security.pptx
Cloud Security.pptxCloud Security.pptx
Cloud Security.pptx
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
 
Information Assurance And Security - Chapter 2 - Lesson 2
Information Assurance And Security - Chapter 2 - Lesson 2Information Assurance And Security - Chapter 2 - Lesson 2
Information Assurance And Security - Chapter 2 - Lesson 2
 
Lesson 2
Lesson 2Lesson 2
Lesson 2
 
Presentación AMIB Los Cabos
Presentación AMIB Los CabosPresentación AMIB Los Cabos
Presentación AMIB Los Cabos
 
Principles of Computer Security, Fourth Edition Copyright .docx
Principles of Computer Security, Fourth Edition Copyright .docxPrinciples of Computer Security, Fourth Edition Copyright .docx
Principles of Computer Security, Fourth Edition Copyright .docx
 
Toward Continuous Cybersecurity with Network Automation
Toward Continuous Cybersecurity with Network AutomationToward Continuous Cybersecurity with Network Automation
Toward Continuous Cybersecurity with Network Automation
 
Toward Continuous Cybersecurity With Network Automation
Toward Continuous Cybersecurity With Network AutomationToward Continuous Cybersecurity With Network Automation
Toward Continuous Cybersecurity With Network Automation
 

Plus de Ahmed Habib

CCNA Security 012- cryptographic systems
CCNA Security 012- cryptographic systemsCCNA Security 012- cryptographic systems
CCNA Security 012- cryptographic systemsAhmed Habib
 
CCNA Security 011- implementing ios-based ips
CCNA Security 011- implementing ios-based ipsCCNA Security 011- implementing ios-based ips
CCNA Security 011- implementing ios-based ipsAhmed Habib
 
CCNA Security 010-configuring cisco asa
CCNA Security 010-configuring cisco asaCCNA Security 010-configuring cisco asa
CCNA Security 010-configuring cisco asaAhmed Habib
 
CCNA Security 09- ios firewall fundamentals
CCNA Security 09- ios firewall fundamentalsCCNA Security 09- ios firewall fundamentals
CCNA Security 09- ios firewall fundamentalsAhmed Habib
 
CCNA Security 07-Securing the local area network
CCNA Security 07-Securing the local area networkCCNA Security 07-Securing the local area network
CCNA Security 07-Securing the local area networkAhmed Habib
 
CCNA Security 06- AAA
CCNA Security 06- AAACCNA Security 06- AAA
CCNA Security 06- AAAAhmed Habib
 
CCNA Security 05- securing the management plane
CCNA Security 05- securing the management planeCCNA Security 05- securing the management plane
CCNA Security 05- securing the management planeAhmed Habib
 
CCNA Security 03- network foundation protection
CCNA Security 03- network foundation protectionCCNA Security 03- network foundation protection
CCNA Security 03- network foundation protectionAhmed Habib
 

Plus de Ahmed Habib (8)

CCNA Security 012- cryptographic systems
CCNA Security 012- cryptographic systemsCCNA Security 012- cryptographic systems
CCNA Security 012- cryptographic systems
 
CCNA Security 011- implementing ios-based ips
CCNA Security 011- implementing ios-based ipsCCNA Security 011- implementing ios-based ips
CCNA Security 011- implementing ios-based ips
 
CCNA Security 010-configuring cisco asa
CCNA Security 010-configuring cisco asaCCNA Security 010-configuring cisco asa
CCNA Security 010-configuring cisco asa
 
CCNA Security 09- ios firewall fundamentals
CCNA Security 09- ios firewall fundamentalsCCNA Security 09- ios firewall fundamentals
CCNA Security 09- ios firewall fundamentals
 
CCNA Security 07-Securing the local area network
CCNA Security 07-Securing the local area networkCCNA Security 07-Securing the local area network
CCNA Security 07-Securing the local area network
 
CCNA Security 06- AAA
CCNA Security 06- AAACCNA Security 06- AAA
CCNA Security 06- AAA
 
CCNA Security 05- securing the management plane
CCNA Security 05- securing the management planeCCNA Security 05- securing the management plane
CCNA Security 05- securing the management plane
 
CCNA Security 03- network foundation protection
CCNA Security 03- network foundation protectionCCNA Security 03- network foundation protection
CCNA Security 03- network foundation protection
 

Dernier

Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Celine George
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designMIPLM
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfTechSoup
 
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfVirtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfErwinPantujan2
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptxmary850239
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSJoshuaGantuangco2
 
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptxMusic 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptxleah joy valeriano
 
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptxAUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptxiammrhaywood
 
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...JojoEDelaCruz
 
Activity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translationActivity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translationRosabel UA
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
Active Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfActive Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfPatidar M
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parentsnavabharathschool99
 
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxQ4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxlancelewisportillo
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptxmary850239
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfJemuel Francisco
 
ICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfVanessa Camilleri
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxHumphrey A Beña
 

Dernier (20)

Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-design
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
 
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfVirtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
 
Raw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptxRaw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptx
 
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptxMusic 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
 
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptxAUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
 
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
 
Activity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translationActivity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translation
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
Active Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfActive Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdf
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parents
 
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxQ4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
 
ICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdf
 
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptxYOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
 

CCNA Security 02- fundamentals of network security

  • 1. 01- Fundamentals of Network Security Ahmed Sultan CCNA | CCNA Security | CCNP Security | JNCIA-Junos | CEH © 2009 Cisco Learning Institute. 1
  • 2. What is Network Security? National Security Telecommunications and Information Systems Security Committee (NSTISSC) Network security is the protection of information and systems and hardware that use, store, and transmit that information. Network security encompasses those steps that are taken to ensure the confidentiality, integrity, and availability of data or resources. © 2009 Cisco Learning Institute. 2
  • 3. Rationale for Network Security Network security initiatives and network security specialists can be found in private and public, large and small companies and organizations. The need for network security and its growth are driven by many factors: 1. Internet connectivity is 24/7 and is worldwide 2. Increase in cyber crime 3. Impact on business and individuals 4. Legislation & liabilities 5. Proliferation of threats 6. Sophistication of threats © 2009 Cisco Learning Institute. 3
  • 4. Cyber Crime • Fraud/Scams • Identity Theft • Child Pornography • Theft of Telecommunications Services • Electronic Vandalism, Terrorism and Extortion WASHINGTON, D.C. –– An estimated 3.6 million households, or about 3 percent of all households in the nation, learned that they had been the victim of at least one type of identity theft during a six-month period in 2004, according to the Justice Department’s Bureau of Justice Statistics © 2009 Cisco Learning Institute. 4
  • 5. Business Impact 1. Decrease in productivity 2. Loss of sales revenue 3. Release of unauthorized sensitive data 4. Threat of trade secrets or formulas 5. Compromise of reputation and trust 6. Loss of communications 7. Threat to environmental and safety systems 8. Loss of time © 2009 Cisco Learning Institute. 5
  • 6. Proliferation of Threats In 2001, the National Infrastructure Protection Center at the FBI released a document summarizing the Ten Most Critical Internet Security Vulnerabilities. Since that time, thousands of organizations rely on this list to prioritize their efforts so they can close the most dangerous holes first. The threat landscape is very dynamic, which in turn makes it necessary to adopt newer security measures. Just over the last few years, the kinds of vulnerabilities that are being exploited are very different from the ones being exploited in the past. © 2009 Cisco Learning Institute. 6
  • 7. Sophistication of Threats © 2009 Cisco Learning Institute. 7
  • 8. Legislation Federal and local government has passed legislation that holds organizations and individuals liable for mismanagement of sensitive data. These laws include: 1.The Health Insurance Portability and Accountability Act of 1996 2.The Sarbanes-Oxley Act of 2002 (Sarbox) 3.The Gramm-Leach-Blilely Act (GLBA) 4.US PATRIOT Act 2001 © 2009 Cisco Learning Institute. 8
  • 9. Goals of an Information Security Program • Confidentiality - Prevent the disclosure of sensitive information from unauthorized people, resources, and processes • Integrity - The protection of system information or processes from intentional or accidental modification • Availability - The assurance that systems and data are accessible by authorized users when needed © 2009 Cisco Learning Institute. 9
  • 10. Risk Management • Risk Analysis • Threats • Vulnerabilities • Countermeasures © 2009 Cisco Learning Institute. 10
  • 11. Risk Management Control physical access Password protection Develop a Security Policy • The process of assessing and quantifying risk and establishing an acceptable level of risk for the organization • Risk can be mitigated, but cannot be eliminated © 2009 Cisco Learning Institute. 11
  • 12. Risk Assessment • Risk assessment involves determining the likelihood that the vulnerability is a risk to the organization • Each vulnerability can be ranked by the scale • Sometimes calculating anticipated losses can be helpful in determining the impact of a vulnerability © 2009 Cisco Learning Institute. 12
  • 13. Asset Identification • Categories of assets - Information Assets (people, hardware, software, systems) - Supporting Assets (facilities, utilities, services) - Critical Assets (can be either of those listed above) • Determine each item’s relative value - How much revenue/profit does it generate? - What is the cost to replace it? - How difficult would it be to replace? - How quickly can it be replaced? © 2009 Cisco Learning Institute. 13
  • 14. Network Security “Threat” • A potential danger to information or a system • An example: the ability to gain unauthorized access to systems or information in order to commit fraud, network intrusion, industrial espionage, identity theft, or simply to disrupt the system or network • There may be weaknesses that greatly increase the likelihood of a threat manifesting • Threats may include equipment failure, structured attacks, natural disasters, physical attacks, theft, viruses and many other potential events causing danger or damage © 2009 Cisco Learning Institute. 14
  • 15. Types of Network Threats • Eavesdropping • Denial-of-service • Packet replay • Man-in-the-middle • Packet modification © 2009 Cisco Learning Institute. 15
  • 16. Vulnerability • A network vulnerability is a weakness in a system, technology, product or policy • In today’s environment, several organizations track, organize and test these vulnerabilities • The US government has a contract with an organization to track and publish network vulnerabilities • Each vulnerability is given an ID and can be reviewed by network security professionals over the Internet. • The common vulnerability exposure (CVE) list also publishes ways to prevent the vulnerability from being attacked © 2009 Cisco Learning Institute. 16
  • 17. Vulnerability Appraisal • It is very important that network security specialists comprehend the importance of vulnerability appraisal • A vulnerability appraisal is a snapshot of the current security of the organization as it now stands • What current security weaknesses may expose the assets to these threats? • Vulnerability scanners are tools available as free Internet downloads and as commercial products - These tools compare the asset against a database of known vulnerabilities and produce a discovery report that exposes the vulnerability and assesses its severity © 2009 Cisco Learning Institute. 17
  • 18. Risk Management Terms • Vulnerability – a system, network or device weakness • Threat – potential danger posed by a vulnerability • Threat Agent – the entity that indentifies a vulnerability and uses it to attack the victim • Risk – likelihood of a threat agent taking advantage of a vulnerability and the corresponding business impact • Exposure – potential to experience losses from a threat agent • Countermeasure – put into place to mitigate the potential risk © 2009 Cisco Learning Institute. 18
  • 19. Understanding Risk Threat Agent Leads to Risk Gives rise to Threat Exploits Vulnerability Asset Directly affects Countermeasure Exposure Can damage Causes Can be safeguarded by © 2009 Cisco Learning Institute. 19
  • 20. Types of Attacks Structured attack Come from hackers who are more highly motivated and technically competent. These people know system vulnerabilities and can understand and develop exploit code and scripts. They understand, develop, and use sophisticated hacking techniques to penetrate unsuspecting businesses. These groups are often involved with the major fraud and theft cases reported to law enforcement agencies. Unstructured attack Consists of mostly inexperienced individuals using easily available hacking tools such as shell scripts and password crackers. Even unstructured threats that are only executed with the intent of testing and challenging a hacker’s skills can still do serious damage to a company. © 2009 Cisco Learning Institute. 20
  • 21. Types of Attacks External attacks Initiated by individuals or groups working outside of a company. They do not have authorized access to the computer systems or network. They gather information in order to work their way into a network mainly from the Internet or dialup access servers. Internal attacks More common and dangerous. Internal attacks are initiated by someone who has authorized access to the network. According to the FBI, internal access and misuse account for 60 to 80 percent of reported incidents. These attacks often are traced to disgruntled employees. © 2009 Cisco Learning Institute. 21
  • 22. Types of Attacks • Passive Attack - Listen to system passwords - Release of message content - Traffic analysis - Data capturing • Active Attack - Attempt to log into someone else’s account - Wire taps - Denial of services - Message modifications © 2009 Cisco Learning Institute. 22
  • 23. Specific Network Attacks • ARP Attack • Brute Force Attack • Worms • Flooding • Sniffers • Spoofing • Redirected Attacks • Tunneling Attack • Covert Channels © 2009 Cisco Learning Institute. 23
  • 24. Information Leakage Attacks • Attackers can sometimes get data without having to directly use computers • Exploit Internet services that are intended to give out information • Induce these services to reveal extra information or to give it out to unauthorized people • Many services designed for use on local area networks do not have the security needed for safe use across the Internet • Thus these services become the means for important information leakage © 2009 Cisco Learning Institute. 24
  • 25. Social Engineering Attacks • Hacker-speak for tricking a person into revealing some confidential information • Social Engineering is defined as an attack based on deceiving users or administrators at the target site • Done to gain illicit access to systems or useful information • The goals of social engineering are fraud, network intrusion, industrial espionage, identity theft, etc. © 2009 Cisco Learning Institute. 25
  • 26. Attack Methodology Stages - the methodology of network attacks is well documented and researched. This research has led to greater understanding of network attacks and an entire specialization of engineers that test and protect networks against attacks (Certified Ethical Hackers/Penetration Testers) Tools - penetration testers have a variety of power tools that are now commercially available. They also have may open source free tools. This proliferation of powerful tools has increased the threat of attack due to the fact that even technical novices can now launch sophisticated attacks. © 2009 Cisco Learning Institute. 26
  • 27. Stages of an Attack • Today’s attackers have a abundance of targets. In fact their greatest challenge is to select the most vulnerable victims. This has resulted in very well- planned and structured attacks. These attacks have common logistical and strategic stages. These stages include; - Reconnaissance - Scanning (addresses, ports, vulnerabilities) - Gaining access - Maintaining Access - Covering Tracks © 2009 Cisco Learning Institute. 27
  • 28. Tools of the Attacker • The following are a few of the most popular tools used by network attackers: - Enumeration tools (dumpreg, netview and netuser) - Port/address scanners (AngryIP, nmap, Nessus) - Vulnerability scanners (Meta Sploit, Core Impact, ISS) - Packet Sniffers (Snort, Wire Shark, Air Magnet) - Root kits - Cryptographic cracking tools (Cain, WepCrack) - Malicious codes (worms, Trojan horse, time bombs) - System hijack tools (netcat, MetaSploit, Core Impact) © 2009 Cisco Learning Institute. 28
  • 29. Countermeasures • DMZ/NAT • IDS/IPS • Content Filtering/NAC • Firewalls/proxy services • Authentication/Authorization/Accounting • Self-defending networks • Policies, procedures, standards guidelines • Training and awareness © 2009 Cisco Learning Institute. 29
  • 30. Security Administration • Policies • Standards • Guidelines • Procedures • Baselines Domains of Network Security 1. Risk Assessment 2. Security Policy 3. Organization of Information Security 4. Asset Management 5. Human Resources Security 6. Physical and Environmental Security 7. Communications and Operations Management 8. Access Control 9. Information Systems Acquisition, Development and Maintenance 10. Information Security Incident Management 11. Business Continuity Management 12. Compliance © 2009 Cisco Learning Institute. 30
  • 31. What Is a Security Policy? • A document that states how an organization plans to protect its tangible and intangible information assets - Management instructions indicating a course of action, a guiding principle, or appropriate procedure - High-level statements that provide guidance to workers who must make present and future decisions - Generalized requirements that must be written down and communicated to others © 2009 Cisco Learning Institute. 31
  • 32. Example: The Policy • All users must have a unique user ID and password that conforms to the company password standard • Users must not share their password with anyone regardless of title or position • Passwords must not be stored in written or any readable form • If a compromise is suspected, it must be reported to the help desk and a new password must be requested © 2009 Cisco Learning Institute. 32
  • 33. Example: The Standards • Minimum of 8 upper- and lowercase alphanumeric characters • Must include a special character • Must be changed every 30 days © 2009 Cisco Learning Institute. 33
  • 34. Network Security Organizations www.infosyssec.com www.sans.org www.cisecurity.org www.cert.org www.isc2.org www.first.org www.infragard.net www.mitre.org www.cnss.gov © 2009 Cisco Learning Institute. 34
  • 35. SANS © 2009 Cisco Learning Institute. 35
  • 36. CERT © 2009 Cisco Learning Institute. 36
  • 37. Information security certifications Offered by (ISC)2 ISC2 Systems Security Certified Practitioner (SCCP) Certification and Accreditation Professional (CAP) Certified Secure Software Lifecycle Professional (CSSLP) Certified Information Systems Security Professional (CISSP) © 2009 Cisco Learning Institute. 37
  • 38. Network Security Jobs • Network Security Administrator • Risk Analyst • VPN Specialist • Penetration Tester • Network Perimeter/Firewall Specialist • Security Response IDS/IPS Engineer © 2009 Cisco Learning Institute. 38
  • 39. Network Security Jobs Examples from Salary.com: • Network Security Administrator Troubleshoots network access problems and implements network security policies and procedures. Ensures network security access and protects against unauthorized access, modification, or destruction. Requires a bachelor's degree with at least 5 years of experience in the field. Familiar with a variety of the field's concepts, practices, and procedures. Relies on extensive experience and judgment to plan and accomplish goals. Performs a variety of tasks. May lead and direct the work of others. A wide degree of creativity and latitude is expected. • Risk Analyst Performs risk analysis studies in order to maintain maximum protection of an organization's assets. Investigates any incidences that may result in asset loss and compiles findings in reports for further review. Requires a bachelor's degree and 0-2 years of experience in the field or in a related area. Has knowledge of commonly-used concepts, practices, and procedures within a particular field. Relies on instructions and pre-established guidelines to perform the functions of the job. Works under immediate supervision. Primary job functions do not typically require exercising independent judgment. © 2009 Cisco Learning Institute. 39
  • 40. Network Security Jobs, 2 • Chief Information Security Officer Responsible for determining enterprise information security standards. Develops and implements information security standards and procedures. Ensures that all information systems are functional and secure. Requires a bachelor's degree with at least 12 years of experience in the field. Familiar with a variety of the field's concepts, practices, and procedures. Relies on extensive experience and judgment to plan and accomplish goals. Performs a variety of tasks. Leads and directs the work of others. A wide degree of creativity and latitude is expected. Typically reports to top management. • Network Perimeter/Firewall Specialist This position requires Experience and Skills working with perimeter protection devices and network firewalls. The candidate must have experience with PIX Firewalls and MPLS Network experience. Cisco Switch and Router experience is a plus. Experience with Network Transformation and Server Re-IP projects is a definite plus. Other Firewall experience is a definite plus. © 2009 Cisco Learning Institute. 40
  • 41. Network Security Jobs, 3 • Ethical hacker/Penetration Tester Responsible for testing and improving network and information system security systems. This is a very sensitive hands-on front line position. This person will be working in a team environment. This individual will be performing mostly network and web application ethical hacking assessments on multi-protocol enterprise network and application systems. Duties may include: Requirements analysis and design, scoping of testing activity, vulnerability assessment, assessing tools/script testing, troubleshooting and physical security audits, logical security audits, logical protocol and traffic audits. • Security Response IDS/IPS Engineer Provides support for the Intrusion Detection/Prevention Service, Host Log Monitoring Service, and Wireless IPS Service associated with Managed Security Services. Must have a well-rounded security background and are responsible for performing extensive troubleshooting of customer issues via Customer Support escalations from the Security Operations Center (SOC) Analysts. This individual performs both infrastructure engineering and customer focused projects to resolve all incidents in timely manner. These needs may involve performing device upgrades, investigating and responding to advanced security threats, and making changes to the security policy of a customer's device. © 2009 Cisco Learning Institute. 41

Notes de l'éditeur

  1. Typically carried out by telephoning users or operators and pretending to be an authorized user or an administrator
  2. Systems Security Certified Practitioner (SCCP) Only available to qualified candidates who subscribe to the (ISC)2 code of ethics and pass the SSCP Certification examination based on the relevant SSCP Common Body of Knowledge (CBK). Candidates must also be able to prove at least one-year experience in one of the 7 domains that comprise the SSCP Certification: Access Controls Administration Audit and Monitoring Risk, Response and Recovery Cryptography Data Communications Malicious Code/Malware Certification and Accreditation Professional (CAP) Co-developed by the U.S. Department of State's Office of Information Assurance and (ISC)², the CAP credential is used as a measure of the knowledge, skills and abilities of personnel involved in assessing risk and establishing security requirements, as well as ensuring information systems possess appropriate security measures. Certified Secure Software Lifecycle Professional (CSSLP) The newest certification from (ISC)², this is the only certification in the industry that ensures that security throughout the software lifecycle. It centers around seven common bodies of knowledge (CBK). Secure Software Concepts Secure Software Requirements Secure Software Design Secure Software Implementation/Coding Secure Software Testing Software Acceptance Software Deployment, Operations, Maintenance and Disposal Certified Information Systems Security Professional (CISSP) One of the most popular certifications in the network security profession, the CISSP was the first credential in the field of information security, accredited by the American National Standards Institute (ANSI). For CISSP credential, in addition to 5 years of experience, professional experience must be in two or more of 10 defined (ISC)² CISSP domains including: Access Control Application Security Business Continuity and Disaster Recovery Planning Cryptography Information Security and Risk Management Legal, Regulations, Compliance and Investigations Operations Security Physical (Environmental) Security Security Architecture and Design Telecommunications and Network Security