© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod5_L3 1 Implementing Secure Converged Wide Area Networks (ISCW)

Slides:



Advertisements
Similar presentations
IS 376 NOVEMBER 5, DATA BREACH INVESTIGATIONS REPORT By The Verizon RISK Team Research Investigations Solutions Knowledge.
Advertisements

© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod5_L7 1 Implementing Secure Converged Wide Area Networks (ISCW)
FIREWALLS Chapter 11.
FIREWALLS. What is a Firewall? A firewall is hardware or software (or a combination of hardware and software) that monitors the transmission of packets.
Web Defacement Anh Nguyen May 6 th, Organization Introduction How Hackers Deface Web Pages Solutions to Web Defacement Conclusions 2.
System Security Scanning and Discovery Chapter 14.
Network Security Network Attacks and Mitigation 張晃崚 CCIE #13673, CCSI #31340 區域銷售事業處 副處長 麟瑞科技.
What are Trojan horses?  A Trojan horse is full of as much trickery as the mythological Trojan horse it was named after. The Trojan horse, at first glance.
Security strategy. What is security strategy? How an organisation plans to protect and respond to security attacks on their information technology assets.
Defense-in-Depth Against Malicious Software Jeff Alexander IT Pro Evangelist Microsoft Australia
Information Security 1 Information Security: Demo of Some Security Tools Jeffy Mwakalinga.
Lesson 14-Desktop Protection. Overview Protect against malicious code. Use the Internet. Protect against physical tampering.
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
Implementing Secure Converged Wide Area Networks (ISCW)
© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod5_L8 1 Implementing Secure Converged Wide Area Networks (ISCW)
Network Security. Network security starts from authenticating any user. Once authenticated, firewall enforces access policies such as what services are.
Malicious Attacks. Introduction Commonly referred to as: malicious software/ “malware”, computer viruses Designed to enter computers without the owner’s.
S EC (4.5): S ECURITY 1. F ORMS OF ATTACK There are numerous way that a computer system and its contents can be attacked via network connections. Many.
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 6 Packet Filtering By Whitman, Mattord, & Austin© 2008 Course Technology.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Guide to Operating System Security Chapter 2 Viruses, Worms, and Malicious Software.
1 Lecture 20: Firewalls motivation ingredients –packet filters –application gateways –bastion hosts and DMZ example firewall design using firewalls – virtual.
Firewall Slides by John Rouda
1 Chapter 6 Network Security Threats. 2 Objectives In this chapter, you will: Learn how to defend against packet sniffers Understand the TCP, UDP, and.
Port Knocking Software Project Presentation Paper Study – Part 1 Group member: Liew Jiun Hau ( ) Lee Shirly ( ) Ong Ivy ( )
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.1 ISP Responsibility Working at a Small-to-Medium Business or ISP – Chapter 8.
Securing Windows 7 Lesson 10. Objectives Understand authentication and authorization Configure password policies Secure Windows 7 using the Action Center.
Chapter 4: Security Baselines Security+ Guide to Network Security Fundamentals Second Edition.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Hacker Zombie Computer Reflectors Target.
Network Security Introduction Some of these slides have been modified from slides of Michael I. Shamos COPYRIGHT © 2003 MICHAEL I. SHAMOS.
ECE4112 Lab 7: Honeypots and Network Monitoring and Forensics Group 13 + Group 14 Allen Brewer Jiayue (Simon) Chen Daniel Chu Chinmay Patel.
 a crime committed on a computer network, esp. the Internet.
OV Copyright © 2013 Logical Operations, Inc. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
OV Copyright © 2011 Element K Content LLC. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
CHAPTER 14 Viruses, Trojan Horses and Worms. INTRODUCTION Viruses, Trojan Horses and worm are malicious programs that can cause damage to information.
1 Higher Computing Topic 8: Supporting Software Updated
10/11/2015 Computer virus By Al-janabi Rana J 1. 10/11/2015 A computer virus is a computer program that can copy itself and infect a computer without.
CRIME - A crime is a wrongdoing classified by the state or Congress as a felony or misdemeanor. A crime is an offence against a public law. This word,
Virus Detection Mechanisms Final Year Project by Chaitanya kumar CH K.S. Karthik.
IT internet security. The Internet The Internet - a physical collection of many networks worldwide which is referred to in two ways: The internet (lowercase.
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
Made by : Mohamed kullab DR. Sanaa el sayegh.  Most personal computers are now connected to the Internet and to local area networks, facilitating the.
Network Security. 2 SECURITY REQUIREMENTS Privacy (Confidentiality) Data only be accessible by authorized parties Authenticity A host or service be able.
© 2006 Cisco Systems, Inc. All rights reserved. Cisco IOS Threat Defense Features.
Application Layer Khondaker Abdullah-Al-Mamun Lecturer, CSE Instructor, CNAP AUST.
Module 6: Integrating ISA Server 2004 and Microsoft Exchange Server.
Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them Computer Hardware and Software Maintenance.
Network Security Chapter 11 powered by DJ 1. Chapter Objectives  Describe today's increasing network security threats and explain the need to implement.
Module 14: Securing Windows Server Overview Introduction to Securing Servers Implementing Core Server Security Hardening Servers Microsoft Baseline.
Topic 5: Basic Security.
Security fundamentals Topic 10 Securing the network perimeter.
Computer virus Speaker : 蔡尚倫.  Introduction  Infection target  Infection techniques Outline.
CTC228 Nov Today... Catching up with group projects URLs and DNS Nmap Review for Test.
Understand Malware LESSON Security Fundamentals.
Types of Computer Malware. The first macro virus was written for Microsoft Word and was discovered in August Today, there are thousands of macro.
Candidates should be able to:  describe the purpose and use of common utility programs for:  computer security (antivirus, spyware protection and firewalls)
“Lines of Defense” against Malware.. Prevention: Keep Malware off your computer. Limit Damage: Stop Malware that gets onto your computer from doing any.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
Information Systems CS-507 Lecture 32. Physical Intrusion The intruder could physically enter an organization to steal information system assets or carry.
CIW Lesson 8 Part B. Malicious Software application that installs hidden services on systems term for software whose specific intent is to harm computer.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Access Control Lists Accessing the WAN – Chapter 5.
Security fundamentals
Chapter 40 Internet Security.
Working at a Small-to-Medium Business or ISP – Chapter 8
Instructor Materials Chapter 7 Network Security
Firewalls.
Presentation transcript:

© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod5_L3 1 Implementing Secure Converged Wide Area Networks (ISCW)

© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod5_L3 2 Lesson 3 – Module 5 – ‘Cisco Device Hardening’ Network Attack Using Intelligence

© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod5_L3 3 Module Introduction  The open nature of the Internet makes it increasingly important for businesses to pay attention to the security of their networks. As organisations move more of their business functions to the public network, they need to take precautions to ensure that attackers do not compromise their data, or that the data does not end up being accessed by the wrong people.  Unauthorised network access by an outside hacker or disgruntled employee can wreak havoc with proprietary data, negatively affect company productivity, and stunt the ability to compete.  Unauthorised network access can also harm relationships with customers and business partners who may question the ability of companies to protect their confidential information, as well as lead to potentially damaging and expensive legal actions.

© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod5_L3 4 Objectives  At the completion of this third lesson, you will be able to: Describe the difference between virus, trojan and worm threats Show how these threats are propagated Explain techniques for dealing with these threats Describe system software that can aid in defending and mitigating against host machine attacks

© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod5_L3 5 End Station (Host) Vulnerabilities  Host machines are particularly vulnerable to attack if not adequately protected. The main threats are: Viruses Trojan horse attacks Worms

© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod5_L3 6 Viruses  A virus can only spread from one computer to another when its host is taken to an uninfected computer, for instance by a user sending it over a network as a file or as an payload or carrying it on a removable medium such as a ‘floppy’ disk, USB disk (‘memory stick’), or CD / DVD  Some viruses are programmed to damage the computer by damaging programs, deleting files, or reformatting the hard disk. Others are not designed to do any damage, but simply replicate themselves and perhaps make their presence known by presenting text, video, or audio messages Source: Wikepedia – Computer virus  A computer virus is a malicious computer program (executable file) that can copy itself and infect a computer without permission or knowledge of the user. The original may modify the copies or the copies may modify themselves, as occurs in a metamorphic virus

© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod5_L3 7 Trojan Horse  Trojan horses may appear to be useful or interesting programs, or at the very least harmless to an unsuspecting user, but are actually harmful when executed  There are two common types of Trojan horses One is otherwise useful software that has been corrupted by a hacker inserting malicious code that executes while the program is used The other type is a standalone program that masquerades as something else, like a game or image file, in order to trick the user into some misdirected complicity that is needed to carry out the program's objectives  A Trojan horse is a program that - unlike a virus - contains or installs a malicious program – the payload or 'trojan‘

© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod5_L3 8 Worms  A computer worm is a self-replicating executable computer program. It uses a network to send copies of itself to other hosts (‘end-user’ machines on the network) and it may do so without any user intervention.  Unlike a virus, it does not need to attach itself to an existing program. Worms always harm the network (if only by consuming bandwidth), whereas viruses always infect or corrupt files on a targeted computer.

© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod5_L3 9 Malicious software containment  Viruses and Trojan horses can be contained by: Effective use of antivirus software Keeping up to date with the latest developments in these methods of attacks Keeping up to date with the latest antivirus software and application versions Implementing host-based intrusion prevention systems (for example, Cisco Security Agent)

© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod5_L3 10 Worm Attack, Mitigation and Response  The anatomy of a worm attack has three parts: The enabling vulnerability: A worm installs itself on a vulnerable system Propagation mechanism: After gaining access to devices, a worm replicates and selects new targets Payload: Once the worm infects the device, the attacker has access to the host – often as a privileged user. Attackers use a local exploit to escalate their privilege level to administrator.

© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod5_L3 11 Worm attack mitigation  Worm attack mitigation requires diligence on the part of system and network administration staff.  Coordination between system administration, network engineering, and security operations personnel is critical in responding effectively to a worm incident.  Recommended steps for worm attack mitigation: Containment: Contain the spread of the worm into your network and within your network. Compartmentalise uninfected parts of your network. Inoculation: Start patching all systems and, if possible, scanning for vulnerable systems. Quarantine: Track down each infected machine inside your network. Disconnect, remove, or block infected machines from the network. Treatment: Clean and patch each infected system. Some worms may require complete core system reinstallations to clean the system.

© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod5_L3 12 Worm attack response  Six typical incident response methodologies to worms are as follows: 1.Preparation: Acquire the resources to respond 2.Identification: Identify the worm 3.Classification: Classify the type of worm 4.Traceback: Trace the worm back to the attack’s origin 5.Reaction: Isolate and repair the affected systems 6.Post mortem: Document and analyse the process that you used for future use

© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod5_L3 13 Application Layer Attacks and Mitigation  Application layer attacks have the following characteristics: They exploit well-known weaknesses, such as those in protocols, that are intrinsic to an application or system (for example, sendmail, HTTP, and FTP) They often use ports that are allowed through a firewall (for example, TCP port 80 used in an attack against a web server behind a firewall) They can never be completely eliminated because new vulnerabilities are always being discovered

© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod5_L3 14 Netcat  Netcat is a tool that reads or writes data on any TCP/UDP connections, relays TCP connections, and can act as a TCP/UDP server. #nc -h connect to somewhere: nc [-options] hostname port[s] [ports]... listen for inbound: nc -l -p port [-options] [hostname] [port] options: -g gateway source-routing hop point[s], up to 8 -G num source-routing pointer: 4, 8, 12,... -i secs delay interval for lines sent, ports scanned -l listen mode, for inbound connects -n numeric-only IP addresses, no DNS -o file hex dump of traffic -p port local port number -r randomize local and remote ports -s addr local source address -u UDP mode -v verbose [use twice to be more verbose] port numbers can be individual or ranges: lo-hi [inclusive]

© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod5_L3 15 Netcat Example

© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod5_L3 16 Mitigation of Application Layer Attacks  Measures you can take to reduce risks include: Read operating system and network log files or have the files analysed by log analysis applications Subscribe to mailing lists that publicise vulnerabilities Keep all operating systems and applications current with the latest patches Use IDS/IPS that can scan for known attacks, monitor and log attacks, and, in some cases, prevent attacks

© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod5_L3 17 Configuration Management protocols  Configuration management protocols include SSH, SSL and the more insecure Telnet  Whichever is chosen for remote access to the managed device, ACLs should be configured to allow only management servers to connect to the device. All attempts from other IP addresses should be denied and logged  Ideally use secure management protocols when configuring all network devices. Protocols, such as Telnet and SNMPv2, must be made secure by protecting the data with IPsec  The access lists should permit management access, such as SSH or HTTPS, only from the legitimate management hosts Also implement RFC 3704 filtering at the ingress router to reduce the chance of an attacker from outside the network spoofing the addresses of the management hosts

© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod5_L3 18 Management Protocols  These management protocols can be compromised: SNMP: The community string information for simple authentication is sent in plaintext. syslog: Data is sent as plaintext between the managed device and the management host. TFTP: Data is sent as plaintext between the requesting host and the TFTP server. NTP: Many NTP servers on the Internet do not require any authentication of peers.

© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod5_L3 19 Management Protocol Best Practices  The following two slides summarise the best practices to be followed when implementing a secure management solution  Recommendations for the correct use of SNMP tools include: Configure SNMP with only read-only community strings Set up access control on the device you want to manage via SNMP to allow access by only the appropriate management hosts Use SNMP version 3. This version provides secure access to devices through a combination of authenticating and encrypting management packets over the network

© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod5_L3 20 Management Protocol Best Practices  Syslog: Encrypt syslog traffic within an IPsec tunnel.  Implement RFC 3704 filtering at the perimeter router when allowing syslog access from devices outside a firewall.  Implement ACLs on the firewall to allow syslog data from only the managed devices themselves to reach the management hosts.  TFTP: When possible, encrypt TFTP traffic within an IPsec tunnel in order to reduce the chance of interception.  NTP: Implement your own master clock for private network synchronisation.  Use NTP version 3 or above because these versions support a cryptographic authentication mechanism between peers. NTP v3 is currently supported by most vendors, including Cisco Systems. The latest version 4 is not defined by any RFC and therefore not widely supported.  Use ACLs that specify which network devices are allowed to synchronise with other network devices.

© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod5_L3 21 Determining Vulnerabilities and Threats  There are several tools and techniques that can be used to find vulnerabilities in your network  Once any vulnerabilities have been identified, mitigation steps can be considered and utilised as appropriate  Some common tools include: Blue’s PortScanner Wireshark (formerly Ethereal) Microsoft Baseline Security Analyzer Nmap

© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod5_L3 22 Blue’s Port Scanner Blue’s Port Scanner Blue’s Port Scanner is a fast network scanner that can scan over 300 ports per second on a NT or Windows 2000 machine. it comes with a Windows XP - style interface, and offers TCP and UDP scanning as well as a Anti-Flood function

© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod5_L3 23 Wireshark (Ethereal)  Wireshark is the world's foremost network protocol analyser, and is the standard in many industries. It is the continuation of a project that started in Hundreds of developers around the world have contributed to it, and it is still under active development. Wireshark

© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod5_L3 24 Microsoft Baseline Security Analyzer

© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod5_L3 25 Nmap  Nmap ("Network Mapper") is a free open source utility for network exploration or security auditing.  It is designed to rapidly scan large networks, although it works fine against single hosts. Nmap uses raw IP packets in novel ways to determine what hosts are available on the network, what services (application name and version) those hosts are offering, what operating systems (and OS versions) they are running, what type of packet filters/firewalls are in use, and dozens of other characteristics.  Nmap runs on most types of computers and both console and graphical versions are available.  Nmap is free and open source

© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod5_L3 26