Download presentation
Presentation is loading. Please wait.
Published byVerity Jordan Modified over 8 years ago
1
Chapter 12: Secure Communications and Network Attacks
2
Network and Protocol Security Mechanisms Secure communications protocols Authentication protocols
3
Secure Communications Protocols SKIP swIPe S-RPC SSL TLS SET
4
Authentication Protocols CHAP PAP EAP
5
Secure Voice Communications Voice over Internet Protocol (VoIP) Social engineering – In person, over the phone, email, IM, social networks PBX fraud and abuse – DISA – Phreakers – Black box, red box, blue box, white box (DTMF)
6
Multimedia Collaboration Remote meeting Instant messaging
7
Manage Email Security Email security goals Understand email security issues Email security solutions
8
Email Security Goals SMTP, POP, IMAP Open relay, closed relay, authenticated relay Nonrepudiation Restrict access Integrity Verify delivery Confidentiality
9
Understand Email Security Issues Lack of encryption Delivery vehicle for malware Lack of source verification Flooding Attachments
10
Email Security Solutions S/MIME MOSS PEM DKIM PGP
11
Remote Access Security Management Remote access and telecommuting Techniques Plan remote access security Dial-up protocols Centralized remote authentication services
12
Remote Access and Telecommuting Techniques Service specific Remote control Screen scraper/scraping Remote node operation
13
Plan Remote Access Security POTS/PTSN, VoIP, VPN Remote connectivity technology Transmission protection Authentication protection Remote user assistance
14
Dial-Up Protocols PPP SLIP
15
Centralized Remote Authentication Services RADIUS TACACS+ – TACACS, XTACACS
16
Virtual Private Network Tunneling How VPNs work Common VPN protocols – PPTP, L2F, LT2P, IPSec Virtual LAN
17
Virtualization Virtual software – Virtual applications – Virtual desktop Virtual networking – Software-defined network (SDN) – Network virtualization – Virtual SAN
18
Network Address Translation Private IP addresses (RFC 1918) – 10.255.255.255 (a full Class A range) – 172.16.0.0–172.31.255.255 (16 Class B ranges) – 192.168.0.0–192.168.255.255 (256 Class C ranges) Stateful NAT Static and dynamic NAT Automatic Private IP Addressing (APIPA) Loopback address
19
Switching Technologies Circuit switching Packet switching Virtual circuits – PVCs – SVCs
20
WAN Technologies WAN connection technologies – Dedicated vs. nondedicated – ISDN: BRI vs. PRI – X.25 – Frame relay – ATM – SMDS – SDLC, HDLC, HSSI Dial-up encapsulation protocols
21
Miscellaneous Security Control Characteristics Transparency Verify integrity Transmission mechanisms
22
Security Boundaries Areas of different security requirements Classifications Physical vs. logical Should be clearly defined
23
Prevent or Mitigate Network Attacks DoS and DDoS Eavesdropping Impersonation/masquerading Replay attacks Modification attacks Address Resolution Protocol spoofing DNS poisoning, spoofing, and hijacking Hyperlink spoofing
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.