Chapter 1: Modern Network Security Threats

Slides:



Advertisements
Similar presentations
SECURITY EVALUATION OF AN ORGANIZATION TA Md Morshedul Islam.
Advertisements

Security and Trust in E- Commerce. The E-commerce Security Environment: The Scope of the Problem  Overall size of cybercrime unclear; amount of losses.
Current Security Threats WMO CBS ET-CTS Toulouse, France May 2008 Allan Darling, NOAA’s National Weather Service WMO CBS ET-CTS Toulouse, France.
Mr C Johnston ICT Teacher
Hackers, Crackers, and Network Intruders: Heroes, villains, or delinquents? Tim McLaren Thursday, September 28, 2000 McMaster University.
1 Topic 1 – Lesson 3 Network Attacks Summary. 2 Questions ► Compare passive attacks and active attacks ► How do packet sniffers work? How to mitigate?
Chapter 4 McGraw-Hill/Irwin Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved. Ethics and Information Security.
INDEX  Ethical Hacking Terminology.  What is Ethical hacking?  Who are Ethical hacker?  How many types of hackers?  White Hats (Ethical hackers)
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
Network Security Topologies Chapter 11. Learning Objectives Explain network perimeter’s importance to an organization’s security policies Identify place.
System and Network Security Practices COEN 351 E-Commerce Security.
Network Security Testing Techniques Presented By:- Sachin Vador.
Network and Server Attacks and Penetration Chapter 12.
Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE USC CSci530 Computer Security Systems Lecture.
PC Support & Repair Chapter 9 Fundamental Security.
Hacking and Network Defense. Introduction  With the media attention covering security breaches at even the most tightly controlled organization, it is.
Network Threats and Mitigation Networking Essentials Chapter 14 Spring, 2013.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Controls for Information Security
Citadel Security Software Presents Are you Vulnerable? Bill Diamond Senior Security Engineer
Introduction to Honeypot, Botnet, and Security Measurement
Securing Information Systems
A First Course in Information Security
Lesson 8-Information Security Process. Overview Introducing information security process. Conducting an assessment. Developing a policy. Implementing.
Storage Security and Management: Security Framework
Click to edit Master subtitle style
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
CHAPTER 3 Information Privacy and Security. CHAPTER OUTLINE  Ethical Issues in Information Systems  Threats to Information Security  Protecting Information.
BUSINESS B1 Information Security.
Network Security Introduction Some of these slides have been modified from slides of Michael I. Shamos COPYRIGHT © 2003 MICHAEL I. SHAMOS.
Security Awareness: Applying Practical Security in Your World Chapter 1: Introduction to Security.
Computer & Network Security
This courseware is copyrighted © 2015 gtslearning. No part of this courseware or any training material supplied by gtslearning International Limited to.
Chapter 8 Technology and Auditing Systems: Hardware and Software Defenses.
Introduction to ITE Chapter 9 Computer Security. Why Study Security?  This is a huge area for computer technicians.  Security isn’t just anti-virus.
Chapter 11: Managing a Secure Network
Intrusion Detection Prepared by: Mohammed Hussein Supervised by: Dr. Lo’ai Tawalbeh NYIT- winter 2007.
Securing Wired Local Area Networks(LANs)
© 2007 Cisco Systems, Inc. All rights reserved.ICND1 v1.0—1-1 Building a Simple Network Securing the Network.
Information Systems Security Operations Security Domain #9.
Attack Vectors and Mitigations. Attack Vectors ? Network Security2T. A. Yang
Chapter 01: Introduction to Network Security. Network  A Network is the inter-connection of communications media, connectivity equipment, and electronic.
IT Essentials 1 Chapter 9 JEOPADY RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands.
Chapter 5: Implementing Intrusion Prevention
Week 10-11c Attacks and Malware III. Remote Control Facility distinguishes a bot from a worm distinguishes a bot from a worm worm propagates itself and.
Chapter 8: Implementing Virtual Private Networks
Chapter 3: Authentication, Authorization, and Accounting
Chapter 7: Cryptographic Systems
Secure Wired Local Area Network( LAN ) By Sentuya Francis Derrick ID Module code:CT3P50N BSc Computer Networking London Metropolitan University.
Chap1: Is there a Security Problem in Computing?.
Chapter 9: Implementing the Cisco Adaptive Security Appliance
Chapter 6: Securing the Local Area Network
Chapter 4: Implementing Firewall Technologies
©2015 HEAT Software. All rights reserved. Proprietary & Confidential. Ransomware: How to Avoid Extortion Matthew Walker – VP Northern Europe.
Types of Malware © 2014 Project Lead The Way, Inc.Computer Science and Software Engineering.
“Lines of Defense” against Malware.. Prevention: Keep Malware off your computer. Limit Damage: Stop Malware that gets onto your computer from doing any.
Mr C Johnston ICT Teacher BTEC IT Unit 09 - Lesson 11 Network Security.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
Department of Computer Science Introduction to Information Security Chapter 7 Activity Security Assessment Semester 1.
Taking on Tomorrow's Challenges Today Taking on Tomorrow's Challenges Today Almost every organisation has been attacked …. But most don’t know about it!
Security Standard: “reasonable security”
Instructor Materials Chapter 7 Network Security
EN Lecture Notes Spring 2016
Business Risks of Insecure Networks
Introduction to Security: Modern Network Security Threats
Cybersecurity Strategy
برنامج أمن أنظمة الحاسب
Chapter 9 E-Commerce Security and Fraud Protection
Chapter 4: Protecting the Organization
Implementing Client Security on Windows 2000 and Windows XP Level 150
Presentation transcript:

Chapter 1: Modern Network Security Threats CCNA Security v2.0 Etuate Cocker

Chapter Outline 1.0 Introduction 1.1 Securing Networks 1.2 Network Threats 1.3 Mitigating Threats 1.4 Summary Chapter Outline

Section 1.1: Securing Networks Upon completion of this section, you should be able to: Describe the current network security landscape. Explain how all types of networks need to be protected.

Topic 1.1.1: Current State of Affairs

Networks Are Targets 1.1.1.1 Networks Are Targets http://map.ipviking.com/

Drivers for Network Security Common network security terms: Threat Vulnerability Mitigation Risk Cisco Security Intelligence Operations 1.1.1.2 Drivers for Network Security

Vectors of Network Attacks

Data Loss Vectors of data loss: Email/Webmail Unencrypted Devices Cloud Storage Devices Removable Media Hard Copy Improper Access Control 1.1.1.4 Data Loss

Topic 1.1.2: Network Topology Overview

Campus Area Networks 1.1.2.1 Campus Area Networks

Small Office and Home Office Networks

Wide Area Networks 1.1.2.3 Wide Area Networks

Data Center Networks Outside perimeter security: On-premise security officers Fences and gates Continuous video surveillance Security breach alarms Inside perimeter security: Electronic motion detectors Security traps Biometric access and exit sensors 1.1.2.4 Data Center Networks

Cloud and Virtual Networks VM-specific threats: Hyperjacking Instant On activation Antivirus storm Components of a secure data center: Secure segmentation Threat defense Visibility The Evolving Network Border Critical MDM functions for BYOD network: Data encryption PIN enforcement Data wipe Data loss prevention Jailbreak/root detection 1.1.2.5 Cloud and Virtual Networks 1.1.2.6 The Evolving Network Border 1.1.2.7 Activity - Network Topology Protection Overview

Section 1.2: Network Threats Upon completion of the section, you should be able to: Describe the evolution of network security. Describe the various types of attack tools used by hackers. Describe malware. Explain common network attacks.

Topic 1.2.1: Who is Hacking Our Networks?

The Hacker & The Evolution of Hackers Modern hacking titles: Script Kiddies Vulnerability Brokers Hacktivists Cyber Criminals State-Sponsored Hackers 1.2.1.1 The Hacker 1.2.1.2 The Evolution of Hackers 1.2.1.3 Cyber Criminals 1.2.1.4 Hacktivists 1.2.1.5 State-Sponsored Hackers

Topic 1.2.2: Hacker Tools

Introduction of Attack Tools

Evolution of Security Tools Penetration testing tools: Password crackers Wireless hacking Network scanning and hacking Packet crafting Packet sniffers Rootkit detectors Fuzzers to search vulnerabilities Forensic Debuggers Hacking operating systems Encryption Vulnerability exploitation Vulnerability Scanners 1.2.2.2 Evolution of Security Tools

Categories of Attack Tools Network hacking attacks: Eavesdropping Data modification IP address spoofing Password-based Denial-of-service Man-in-the-middle Compromised-key Sniffer 1.2.2.3 Categories of Attack Tools

Topic 1.2.3: Malware

Various Types of Malware

Viruses 1.2.3.2 Viruses

Trojan Horse Classification Classifications: Security software disabler Remote-access Data-sending Destructive Proxy FTP DoS 1.2.3.3 Trojan Horses 1.2.3.4 Trojan Horse Classification

Initial Code Red Worm Infection Worms Initial Code Red Worm Infection 1.2.3.5 Worms Code Red Worm Infection 19 Hours Later

Worm Components Components: Enabling vulnerability Propagation mechanism Payload Code Red Worm Propagation 1. Propagate for 19 days 2. Launch DoS attack for next 7 days 3. Stop and go dormant for a few days 4. Repeat the cycle 1.2.3.6 Worm Components

Other Malware Ransomware Scareware Spyware Phishing Adware Rootkits 1.2.3.8 Activity - Identify the Malware Type Ransomware Spyware Adware Scareware Phishing Rootkits

Topic 1.2.4: Common Network Attacks

Types of Network Attacks Data Modification Syn Flood Smurf Attack Reconnaissance Access DoS 1.1.1.1 Networks Are Targets

Reconnaissance Attacks Initial query of a target Ping sweep of the target network Port scan of active IP addresses Vulnerability scanners Exploitation tools 1.2.4.2 Reconnaissance Attacks 1.2.4.3 Sample Reconnaissance Attacks

Access Attacks A few reasons why hackers use access attacks: To retrieve data To gain access To escalate access privileges A few types of access attacks include: Password Trust exploitation Port redirection Man-in-the-middle Buffer overflow IP, MAC, DHCP spoofing 1.2.4.5 Access Attacks 1.2.4.6 Types of Access Attacks

Social Engineering Attacks Pretexting Phishing Spearphishing Spam Tailgating Something for Something Baiting 1.2.4.6 Social Engineering

Denial of Service Attacks 1.2.4.8 Types of DoS Attacks

DDoS Attacks Hacker builds a network of infected machines A network of infected hosts is called a botnet. The compromised computers are called zombies. Zombies are controlled by handler systems. Zombie computers continue to scan and infect more targets Hacker instructs handler system to make the botnet of zombies carry out the DDoS attack 1.2.4.9 DDoS Attacks 1.2.4.10 DDoS Attacks (cont.) - Video https://www.youtube.com/watch?v=NogCN78XN2w 1.2.4.11 Activity - Identify the Types of Attack 1.2.4.12 Lab - Social Engineering

1.3 Mitigating Threats Upon completion of this section, you should be able to:: Describe methods and resources to protect the networks. Describe a collection of domains for network security. Explain the purpose of the Cisco SecureX Architecture. Describe the techniques used to mitigate common network attacks. Explain how to secure the three functional areas of Cisco routers and switches.

Topic 1.3.1: Defending the Network

Network Security Professionals

Network Security Organizations

Confidentiality, Integrity, Availability Components of Cryptography Confidentiality: Uses encryption to encrypt and hide data. Integrity: Uses hashing algorithms to ensure data is unaltered during operation. Availability: Assures data is accessible. Guaranteed by network hardening mechanisms and backup systems. 1.3.1.3 Confidentiality, Integrity, Availability

Topic 1.3.2: Domains of Network Security

Network Security Domains Risk assessment Security policy Organization of information security Asset management Human resources security Physical and environmental security Communications and operations management Information systems acquisition, development, and maintenance Access control Information security incident management Business continuity management Compliance 1.3.2.1 Network Security Domains

Network Security Policy

Network Security Policy Objectives

Topic 1.3.3: Introducing the Cisco SecureX Architecture

The Security Artichoke

Evolution of Network Security Tools

SecureX Product Families Server Edge and Branch Secure Email and Web Secure Mobility Secure Access Secure Data Center and Virtualization 1.3.3.3 SecureX Products

SecureX Security Technology Cisco SecureX Architecture: Scanning engines Delivery mechanisms Security intelligence operations (SIO) Policy management consoles Next-generation endpoint 1.3.3.4 SecureX Security Technology

Centralized Context-Aware Network Scanning Element Defines security policies based on five parameters: Type of device being used for access Person’s identity Application in use Location Time of access 1.3.3.5 Centralized Context-Aware Network Scanning Element

Cisco Security Intelligence Operations Please add another slide for Fig 2 of page 1.3.3.6

Cisco Security Intelligence Operations (cont.)

Topic 1.3.4: Mitigating Common Network Threats

Defending the Network Best practices: Develop a written security policy. Educate employees about the risks of social engineering, and develop strategies to validate identities over the phone, via email, or in person. Control physical access to systems. Use strong passwords and change them often. Encrypt and password-protect sensitive data. Implement security hardware and software. Perform backups and test the backed up files on a regular basis. Shut down unnecessary services and ports. Keep patches up-to-date by installing them weekly or daily to prevent buffer overflow and privilege escalation attacks. Perform security audits to test the network. 1.3.4.1 Defending the Network

Mitigating Malware 1.3.4.2 Mitigating Malware

Mitigating Worms Containment Inoculation Quarantine Treatment

Mitigating Reconnaissance Attacks

Mitigating Access Attacks

Mitigating DoS Attacks

Topic 1.3.5: Cisco Network Foundation Protection Framework

NFP Framework 1.3.5.1 NFP Framework

Securing the Control Plane

Securing the Management Plane

Securing the Data Plane 1.3.5.5 Activity - Identify Characteristics of the NFP Framework

Section 1.4: Summary Chapter Objectives: Explain network security. Describe various types of threats and attacks. Explain tools and procedures to mitigate the effects of malware and common network attacks. 1.4.1.1 Lab - Researching Network Attacks and Security Audit Tools 1.4.1.2 Summary

Instructor Resources Remember, there are helpful tutorials and user guides available via your NetSpace home page. (https://www.netacad.com) These resources cover a variety of topics including navigation, assessments, and assignments. A screenshot has been provided here highlighting the tutorials related to activating exams, managing assessments, and creating quizzes. 1 2 https://www.netacad.com