SlideShare a Scribd company logo
1 of 74
1© 2009 Cisco Systems, Inc. All rights reserved.
Network
Security
Module 1 – Overview ofModule 1 – Overview of
Network SecurityNetwork Security
2© 2009 Cisco Systems, Inc. All rights reserved.
Learning Objectives
1.1 Introduction to Network Security
1.2 Introduction to Vulnerabilities, Threats,
and Attacks
1.3 Attack Examples
1.4 Vulnerability Analysis
3© 2009 Cisco Systems, Inc. All rights reserved.
Module 1 – Overview of
Network Security
1.1 Introduction to Network
Security
4© 2009 Cisco Systems, Inc. All rights reserved.
Network Security
• Network security is the process by which digital
information assets are protected.
• The goals of security are to protect confidentiality,protect confidentiality,
maintain integrity, and assure availabilitymaintain integrity, and assure availability. With this in
mind, it is imperative that all networks be protected
from threats and vulnerabilities in order for a business
to achieve its fullest potential.
• Typically, these threats are persistent due to
vulnerabilities, which can arise from misconfiguredcan arise from misconfigured
hardware or software, poor network design, inherenthardware or software, poor network design, inherent
technology weaknesses, or end-user carelessnesstechnology weaknesses, or end-user carelessness.
5© 2009 Cisco Systems, Inc. All rights reserved.
The Closed Network
6© 2009 Cisco Systems, Inc. All rights reserved.
The Network Today
7© 2009 Cisco Systems, Inc. All rights reserved.
Identifying Potential Risks
• A risk analysis should identify the risks to the
network, network resources, and data. The
intent of a risk analysis is to identify the
components of the network, evaluate the
importance of each component, and then apply
an appropriate level of security. This helps to
maintain a workable balance between security
and required network access.
Asset Identification
Vulnerability Assessment
Threat Identification
8© 2009 Cisco Systems, Inc. All rights reserved.
Network Security Models
9© 2009 Cisco Systems, Inc. All rights reserved.
Open Security Model
10© 2009 Cisco Systems, Inc. All rights reserved.
Open Security Model
11© 2009 Cisco Systems, Inc. All rights reserved.
Restricted Security Model
12© 2009 Cisco Systems, Inc. All rights reserved.
Closed Security Model
13© 2009 Cisco Systems, Inc. All rights reserved.
Closed Security Model
14© 2009 Cisco Systems, Inc. All rights reserved.
Technology that affect Security
15© 2009 Cisco Systems, Inc. All rights reserved.
Trends that Affect Security
• Increase of network attacks
• Increased sophistication of attacks
• Increased dependence on the network
• Lack of trained personnel
• Lack of awareness
• Lack of security policies
• Wireless access
• Legislation
• Litigation
16© 2009 Cisco Systems, Inc. All rights reserved.
ISO/IEC 17799
–Security policy
–Organization of
information security
–Asset management
–Human resources
security
–Physical and
environmental security
–Communications and
operations
management
–Access control
–Information systems
acquisition,
development and
maintenance
–Information security
incident management
–Business continuity
management
–Compliance
–Risk Assesment
17© 2009 Cisco Systems, Inc. All rights reserved.
Module 1 – Overview of
Network Security
1.2 Introduction to Vulnerabilities,
Threats, and Attacks
18© 2009 Cisco Systems, Inc. All rights reserved.
Network Vulnerabilities
• Vulnerability is a weakness which is inherent in
every network and device. This includes routers,
switches, desktops, servers, and even security
devices themselves.
• Threats are the people eager, willing, and
qualified to take advantage of each security
weakness, and they continually search for new
exploits and weaknesses.
• Finally, the threats use a variety of tools, scripts,
and programs to launch attacks against networks
and network devices.
19© 2009 Cisco Systems, Inc. All rights reserved.
Network Vulnerabilities
• Technology: Computer and network technologies
have intrinsic security weaknesses. These include TCP/IP
protocol, operating system, and network equipment
weaknesses
• Configuration: Network administrators or network
engineers need to learn what the configuration
weaknesses are and correctly configure their computing
and network devices to compensate.
• Policy: The network may pose security risks to the
network if users do not follow the security policy.
20© 2009 Cisco Systems, Inc. All rights reserved.
Technology Weaknesses
21© 2009 Cisco Systems, Inc. All rights reserved.
Configuration Weaknesses
22© 2009 Cisco Systems, Inc. All rights reserved.
Security Policy Weaknesses
23© 2009 Cisco Systems, Inc. All rights reserved.
Threat Capabilities—More
Dangerous and Easier to Use
24© 2009 Cisco Systems, Inc. All rights reserved.
Variety of Threats
25© 2009 Cisco Systems, Inc. All rights reserved.
The four primary attack categories
26© 2009 Cisco Systems, Inc. All rights reserved.
Attack Evolution
27© 2009 Cisco Systems, Inc. All rights reserved.
Module 1 – Overview of
Network Security
1.3 Attack Examples
28© 2009 Cisco Systems, Inc. All rights reserved.
Network Threats
• There are four general categories of security threats
to the network:
–Unstructured threats
–Structured threats
–External threats
–Internal threats
Internet
External
exploitation
Internal
exploitation
Dial-in
exploitation
Compromised
host
29© 2009 Cisco Systems, Inc. All rights reserved.
Four Classes of Network Attacks
Reconnaissance attacks
Access attacks
Denial of service attacks
Worms, viruses, and Trojan horses
30© 2009 Cisco Systems, Inc. All rights reserved.
Specific Attack Types
• All of the following can be used to compromise your system:
Packet sniffers
IP weaknesses
Password attacks
DoS or DDoS
Man-in-the-middle attacks
Application layer attacks
Trust exploitation
Port redirection
Virus
Trojan horse
Operator error
Worms
31© 2009 Cisco Systems, Inc. All rights reserved.
Reconnaissance Attacks
• Network reconnaissance
refers to the overall act
of learning information
about a target network
by using publicly
available information
and applications.
32© 2009 Cisco Systems, Inc. All rights reserved.
Reconnaissance Attack
33© 2009 Cisco Systems, Inc. All rights reserved.
Reconnaissance Attack Example
Sample
domain
name
query
• Sample IP
address
query
34© 2009 Cisco Systems, Inc. All rights reserved.
Reconnaissance Attack Mitigation
Network
reconnaissance
cannot be prevented
entirely.
IDSs at the network
and host levels can
usually notify an
administrator when a
reconnaissance
gathering attack (for
example, ping sweeps
and port scans) is
under way.
35© 2009 Cisco Systems, Inc. All rights reserved.
Packet Sniffers
• A packet sniffer is a software application that uses a network
adapter card in promiscuous mode to capture all network packets.
The following are the packet sniffer features:
Packet sniffers exploit information passed in clear text. Protocols that
pass information in the clear include the following:
•Telnet
•FTP
•SNMP
•POP
Packet sniffers must be on the same collision domain.
Host A Host B
Router A Router B
36© 2009 Cisco Systems, Inc. All rights reserved.
Sniffers
37© 2009 Cisco Systems, Inc. All rights reserved.
Packet Sniffer Mitigation
• The following techniques and tools can be used to mitigate
sniffers:
Authentication—Using strong authentication, such as one-time
passwords, is a first option for defense against packet sniffers.
Switched infrastructure —Deploy a switched infrastructure to counter
the use of packet sniffers in your environment.
Antisniffer tools—Use these tools to employ software and hardware
designed to detect the use of sniffers on a network.
Cryptography—The most effective method for countering packet
sniffers does not prevent or detect packet sniffers, but rather renders
them irrelevant.
Host A Host B
Router A Router B
38© 2009 Cisco Systems, Inc. All rights reserved.
Port Scans
39© 2009 Cisco Systems, Inc. All rights reserved.
Port Scan Example
40© 2009 Cisco Systems, Inc. All rights reserved.
Ping Sweeps
41© 2009 Cisco Systems, Inc. All rights reserved.
Queries
42© 2009 Cisco Systems, Inc. All rights reserved.
Access Attacks
• Access attacks exploit known vulnerabilities in
authentication services, FTP services, and Web services
to gain entry to Web accounts, confidential databases,
and other sensitive information . Access attacks can
consist of the following:
–Password attacks (Dictionary cracking, Brute-force
computation)
–Trust Exploitation
–Port Redirection
–Man-in-the-middle Attack
–Social Engineering
–Phishing
43© 2009 Cisco Systems, Inc. All rights reserved.
Access Attacks
44© 2009 Cisco Systems, Inc. All rights reserved.
Port Redirection
45© 2009 Cisco Systems, Inc. All rights reserved.
Password Attacks
• Hackers can
implement password
attacks using several
different methods:
Brute-force attacks
Dictionary Attacks
Trojan horse programs
IP spoofing
Packet sniffers
46© 2009 Cisco Systems, Inc. All rights reserved.
Password Attacks Mitigation
• The following are mitigation techniques:
Do not allow users to use the same password on
multiple systems.
Disable accounts after a certain number of
unsuccessful login attempts.
Do not use plain text passwords. OTP or a
cryptographic password is recommended.
Use “strong” passwords. Strong passwords are at
least eight characters long and contain uppercase
letters, lowercase letters, numbers, and special
characters.
47© 2009 Cisco Systems, Inc. All rights reserved.
Man-in-the-Middle Attacks
A man-in-the-middle attack requires that the hacker have access
to network packets that come across a network.
A man-in-the-middle attack is implemented using the following:
Network packet sniffers
Routing and transport protocols
Possible man-in-the-middle attack uses include the following:
Theft of information
Hijacking of an ongoing session
Traffic analysis
DoS
Corruption of transmitted data
Introduction of new information into network sessions
Host A Host B
Router A Router B
Data in clear text
48© 2009 Cisco Systems, Inc. All rights reserved.
Man-in-the-Middle Mitigation
• Man-in-the-middle attacks can be effectively mitigated
only through the use of cryptography (encryption).
Host A Host B
Router A ISP Router B
A man-in-the-middle attack
can only see cipher text
IPSec tunnel
49© 2009 Cisco Systems, Inc. All rights reserved.
DoS Attacks
• They prevent authorized people from using a
service by using up system resources. The
following are examples of common DoS threats:
–Ping of death
–SYN flood attack
–Packet fragmentation and reassembly
–E-mail bombs
–Malicious applets
–Misconfiguring routers
50© 2009 Cisco Systems, Inc. All rights reserved.
DoS Attacks
51© 2009 Cisco Systems, Inc. All rights reserved.
DDoS
• DDoS attacks are designed to saturate network
links with spurious data. This data can overwhelm
an Internet link, causing legitimate traffic to be
dropped. DDoS uses attack methods similar to
standard DoS attacks but operates on a much
larger scale. Typically hundreds or thousands of
attack points attempt to overwhelm a target.
Examples of DDoS attacks include the following:
–Smurf
–Tribe Flood Network (TFN)
–Stacheldraht
52© 2009 Cisco Systems, Inc. All rights reserved.
DDoS Attack Example
53© 2009 Cisco Systems, Inc. All rights reserved.
DoS Attack Mitigation
• The threat of DoS attacks can be reduced
through the following three methods:
1. Antispoof features —Proper configuration of
antispoof features on your routers and
firewalls
2. Anti-DoS features —Proper configuration of
anti-DoS features on routers and firewalls
3. Traffic rate limiting —Implement traffic rate
limiting with the networks ISP
54© 2009 Cisco Systems, Inc. All rights reserved.
IP Spoofing
IP spoofing occurs when a hacker inside or outside a network
impersonates the conversations of a trusted computer.
Two general techniques are used during IP spoofing:
A hacker uses an IP address that is within the range of
trusted IP addresses.
A hacker uses an authorized external IP address that is
trusted.
Uses for IP spoofing include the following:
IP spoofing is usually limited to the injection of malicious
data or commands into an existing stream of data.
A hacker changes the routing tables to point to the
spoofed IP address, then the hacker can receive all
the network packets that are addressed to the
spoofed address and reply just as any trusted user
can.
55© 2009 Cisco Systems, Inc. All rights reserved.
IP Spoofing Mitigation
• The threat of IP spoofing can be reduced, but not
eliminated, through the following measures:
Access control —The most common method for preventing
IP spoofing is to properly configure access control.
RFC 2827 filtering —You can prevent users of your network
from spoofing other networks (and be a good Internet citizen
at the same time) by preventing any outbound traffic on your
network that does not have a source address in your
organization's own IP range.
Additional authentication that does not use IP-based
authentication—Examples of this include the following:
Cryptographic (recommended)
Strong, two-factor, one-time passwords
56© 2009 Cisco Systems, Inc. All rights reserved.
Application Layer Attacks
• Application layer attacks have the following
characteristics:
Exploit well known weaknesses, such as protocols,
that are intrinsic to an application or system (for
example, sendmail, HTTP, and FTP)
Often use ports that are allowed through a firewall
(for example, TCP port 80 used in an attack against a
web server behind a firewall)
Can never be completely eliminated, because new
vulnerabilities are always being discovered
57© 2009 Cisco Systems, Inc. All rights reserved.
Application Layer Attacks
Mitigation
• Some measures you can take to reduce your risks
are as follows:
Read operating system and network log files, or
have them analyzed by log analysis applications.
Subscribe to mailing lists that publicize vulnerabilities.
Keep your operating system and applications current
with the latest patches.
IDSs can scan for known attacks, monitor and
log attacks, and in some cases, prevent attacks.
58© 2009 Cisco Systems, Inc. All rights reserved.
Virus and Trojan Horses
Viruses refer to malicious software that are
attached to another program to execute a
particular unwanted function on a user’s
workstation. End-user workstations are the
primary targets.
A Trojan horse is different only in that the
entire application was written to look like
something else, when in fact it is an attack
tool. A Trojan horse is mitigated by antivirus
software at the user level and possibly the
network level.
59© 2009 Cisco Systems, Inc. All rights reserved.
Virus Attacks
60© 2009 Cisco Systems, Inc. All rights reserved.
Worm attack mitigation
61© 2009 Cisco Systems, Inc. All rights reserved.
Vulnerabilities Exist at all OSI
Layers
62© 2009 Cisco Systems, Inc. All rights reserved.
Attacks Mitigation
63© 2009 Cisco Systems, Inc. All rights reserved.
Opportunities
64© 2009 Cisco Systems, Inc. All rights reserved.
Module 1 – Overview of
Network Security
1.4 Vulnerability Analysis
65© 2009 Cisco Systems, Inc. All rights reserved.
Network Security Policy
• The network security policy is a broad, end-to-
end document designed to be clearly
applicable to an organization's operations. The
policy is used to aid in network design, convey
security principles, and facilitate network
deployments.
• The network security policy outlines rules for
network access, determines how policies are
enforced, and describes the basic architecture
of the organization's network security
environment.
66© 2009 Cisco Systems, Inc. All rights reserved.
Policy Identification
• The policy should identify the assets that require
protection. This will help the designer provide
the correct level of protection for sensitive
computing resources, and identify the flow of
sensitive data in the network.
• The policy should identify possible attackers.
This will give the designer insight into the level
of trust assigned to internal and external users,
ideally identified by more specific categories
such as business partners, customers of an
organization, outsourcing IT partners.
67© 2009 Cisco Systems, Inc. All rights reserved.
Network security Policies
68© 2009 Cisco Systems, Inc. All rights reserved.
Cisco SDN
69© 2009 Cisco Systems, Inc. All rights reserved.
SDN Topology
Cisco NAC
Appliance & Cisco
Security Agent
Cisco IOS
Firewall, VPN
Software, access
control & Filtering
Cisco IOS
Firewall, VPN
Software, access
control & Filtering
Cisco IOS
Firewall, Cisco
adaptive security
appliance
Traffic
inspection and
threat
mitigation
Cisco security
monitoring,
analisys, and
response system
Cisco security
Manager provides
policy-based
management
70© 2009 Cisco Systems, Inc. All rights reserved.
Auto Secure
To secure the management and forwarding planes of the router, use the
auto secure command in privileged EXEC mode.
auto secure [management | forwarding] [no-interact]
Syntax Description
• management (Optional) Only the management plane will be secured.
• forwarding (Optional) Only the forwarding plane will be secured.
• no-interact (Optional) The user will not be prompted for any
interactive configurations. If this keyword is not enabled, the
command will show the user the noninteractive configuration and the
interactive configurations thereafter.
71© 2009 Cisco Systems, Inc. All rights reserved.
NSA Router Security Guide
72© 2009 Cisco Systems, Inc. All rights reserved.
CIS RAT Report
73© 2009 Cisco Systems, Inc. All rights reserved.
Host Analysis
• Network Mapper (Nmap) – Nmap is a very popular free tool
used for security scanning and auditing. It can rapidly
perform a port scan of a single host or a range of hosts.
Nmap was originally written to be run on UNIX systems,
and it is now available for use on Microsoft Windows
platforms .
• Nessus – Nessus is a vulnerability scanner that is available
for UNIX and Microsoft Windows platforms. New
vulnerability testing capabilities can be added to Nessus
through the installation of modular plugins. Nessus
includes a built in port scanner, or it can be used along
with Nmap. Once the Nessus scan is finished, a report is
created. This report displays the results of the scan and
provides steps that can be taken to mitigate vulnerabilities.
74© 2009 Cisco Systems, Inc. All rights reserved.
Microsoft Baseline Security Analyzer
• The Microsoft Baseline Security Analyzer (MBSA) can
be used to scan hosts running Windows 2000,
Windows Vista, Windows XP, and Windows Server
2003 & 2008 operating systems to determine potential
security risks.
• MBSA scans for common system misconfigurations
and missing security updates. MBSA includes both a
graphical and command line interface that can perform
local or remote scans.
• After a system scan, the MBSA provides a report
outlining potential vulnerabilities and the steps
required to correct them.

More Related Content

What's hot

1 maksud komputer dan jenis komputer
1 maksud komputer dan jenis komputer1 maksud komputer dan jenis komputer
1 maksud komputer dan jenis komputerwazi musa
 
sistem unit, cpu & ingatan
sistem unit, cpu & ingatansistem unit, cpu & ingatan
sistem unit, cpu & ingatanictpermas
 
Peranti input 4julai
Peranti input 4julaiPeranti input 4julai
Peranti input 4julaiarah1506
 
Keselamatan Komputer
Keselamatan KomputerKeselamatan Komputer
Keselamatan Komputeramaniasraf
 
Bab 1 Pengaturcaraan Antaramuka Pengguna
Bab 1 Pengaturcaraan Antaramuka PenggunaBab 1 Pengaturcaraan Antaramuka Pengguna
Bab 1 Pengaturcaraan Antaramuka PenggunaChaerry Cha
 
Audio and video maintenance
Audio and video maintenance Audio and video maintenance
Audio and video maintenance Lobak Merah Jambu
 
EKSTENSI DAN DIAL PLAN PADA SERVER VOIP.pptx
EKSTENSI DAN DIAL PLAN PADA SERVER VOIP.pptxEKSTENSI DAN DIAL PLAN PADA SERVER VOIP.pptx
EKSTENSI DAN DIAL PLAN PADA SERVER VOIP.pptxfitriyatullaili
 
Senarai semak penyelenggaraan komputer
Senarai semak penyelenggaraan komputerSenarai semak penyelenggaraan komputer
Senarai semak penyelenggaraan komputerahmad_shahrul
 
Komputer dan fungsinya
Komputer dan fungsinyaKomputer dan fungsinya
Komputer dan fungsinyaHoods Comel
 
Materi asj kelas xii
Materi asj kelas xiiMateri asj kelas xii
Materi asj kelas xiimakemanah
 
Soal USBN TKJ - Teori Kompetensi Keahlian Jaringan TP. 2019/2020
Soal USBN TKJ - Teori Kompetensi Keahlian Jaringan TP. 2019/2020Soal USBN TKJ - Teori Kompetensi Keahlian Jaringan TP. 2019/2020
Soal USBN TKJ - Teori Kompetensi Keahlian Jaringan TP. 2019/2020Walid Umar
 
Avaya Session Border Controller (SBC)
Avaya Session Border Controller (SBC)Avaya Session Border Controller (SBC)
Avaya Session Border Controller (SBC)Motty Ben Atia
 
Media Ajar Dasar TJKT.pptx
Media Ajar Dasar TJKT.pptxMedia Ajar Dasar TJKT.pptx
Media Ajar Dasar TJKT.pptxBustanil1
 
Basic Security Chapter 1
Basic Security Chapter 1Basic Security Chapter 1
Basic Security Chapter 1AfiqEfendy Zaen
 
Pengenalan kepada rangkaian komputer
Pengenalan kepada rangkaian komputer Pengenalan kepada rangkaian komputer
Pengenalan kepada rangkaian komputer roiamah71
 
Rangkaian komputer dan internet
Rangkaian komputer dan internetRangkaian komputer dan internet
Rangkaian komputer dan internetfazihafid
 
POLITEKNIK MALAYSIA
POLITEKNIK MALAYSIAPOLITEKNIK MALAYSIA
POLITEKNIK MALAYSIAAiman Hud
 

What's hot (20)

1 maksud komputer dan jenis komputer
1 maksud komputer dan jenis komputer1 maksud komputer dan jenis komputer
1 maksud komputer dan jenis komputer
 
sistem unit, cpu & ingatan
sistem unit, cpu & ingatansistem unit, cpu & ingatan
sistem unit, cpu & ingatan
 
Peranti input 4julai
Peranti input 4julaiPeranti input 4julai
Peranti input 4julai
 
Modul asas Ms power point
Modul asas Ms power pointModul asas Ms power point
Modul asas Ms power point
 
2.2.4 storan1
2.2.4 storan12.2.4 storan1
2.2.4 storan1
 
Keselamatan Komputer
Keselamatan KomputerKeselamatan Komputer
Keselamatan Komputer
 
Bab 1 Pengaturcaraan Antaramuka Pengguna
Bab 1 Pengaturcaraan Antaramuka PenggunaBab 1 Pengaturcaraan Antaramuka Pengguna
Bab 1 Pengaturcaraan Antaramuka Pengguna
 
Why Do I Need an SBC
Why Do I Need an SBCWhy Do I Need an SBC
Why Do I Need an SBC
 
Audio and video maintenance
Audio and video maintenance Audio and video maintenance
Audio and video maintenance
 
EKSTENSI DAN DIAL PLAN PADA SERVER VOIP.pptx
EKSTENSI DAN DIAL PLAN PADA SERVER VOIP.pptxEKSTENSI DAN DIAL PLAN PADA SERVER VOIP.pptx
EKSTENSI DAN DIAL PLAN PADA SERVER VOIP.pptx
 
Senarai semak penyelenggaraan komputer
Senarai semak penyelenggaraan komputerSenarai semak penyelenggaraan komputer
Senarai semak penyelenggaraan komputer
 
Komputer dan fungsinya
Komputer dan fungsinyaKomputer dan fungsinya
Komputer dan fungsinya
 
Materi asj kelas xii
Materi asj kelas xiiMateri asj kelas xii
Materi asj kelas xii
 
Soal USBN TKJ - Teori Kompetensi Keahlian Jaringan TP. 2019/2020
Soal USBN TKJ - Teori Kompetensi Keahlian Jaringan TP. 2019/2020Soal USBN TKJ - Teori Kompetensi Keahlian Jaringan TP. 2019/2020
Soal USBN TKJ - Teori Kompetensi Keahlian Jaringan TP. 2019/2020
 
Avaya Session Border Controller (SBC)
Avaya Session Border Controller (SBC)Avaya Session Border Controller (SBC)
Avaya Session Border Controller (SBC)
 
Media Ajar Dasar TJKT.pptx
Media Ajar Dasar TJKT.pptxMedia Ajar Dasar TJKT.pptx
Media Ajar Dasar TJKT.pptx
 
Basic Security Chapter 1
Basic Security Chapter 1Basic Security Chapter 1
Basic Security Chapter 1
 
Pengenalan kepada rangkaian komputer
Pengenalan kepada rangkaian komputer Pengenalan kepada rangkaian komputer
Pengenalan kepada rangkaian komputer
 
Rangkaian komputer dan internet
Rangkaian komputer dan internetRangkaian komputer dan internet
Rangkaian komputer dan internet
 
POLITEKNIK MALAYSIA
POLITEKNIK MALAYSIAPOLITEKNIK MALAYSIA
POLITEKNIK MALAYSIA
 

Viewers also liked

Viewers also liked (14)

Cv
CvCv
Cv
 
Ch03
Ch03Ch03
Ch03
 
Authentication: keys, MAC
Authentication: keys, MACAuthentication: keys, MAC
Authentication: keys, MAC
 
Classical Encryption
Classical EncryptionClassical Encryption
Classical Encryption
 
Protocols for Public Key Management
Protocols for Public Key ManagementProtocols for Public Key Management
Protocols for Public Key Management
 
Chapter 1: Overview of Network Security
Chapter 1: Overview of Network SecurityChapter 1: Overview of Network Security
Chapter 1: Overview of Network Security
 
Chapter 3: Block Ciphers and the Data Encryption Standard
Chapter 3: Block Ciphers and the Data Encryption StandardChapter 3: Block Ciphers and the Data Encryption Standard
Chapter 3: Block Ciphers and the Data Encryption Standard
 
Chapter 2: Network Models
Chapter 2: Network ModelsChapter 2: Network Models
Chapter 2: Network Models
 
Spoofing Techniques
Spoofing TechniquesSpoofing Techniques
Spoofing Techniques
 
Message Authentication: MAC, Hashes
Message Authentication: MAC, HashesMessage Authentication: MAC, Hashes
Message Authentication: MAC, Hashes
 
T C P I P Weaknesses And Solutions
T C P I P Weaknesses And SolutionsT C P I P Weaknesses And Solutions
T C P I P Weaknesses And Solutions
 
Spoofing
SpoofingSpoofing
Spoofing
 
Public key cryptography and RSA
Public key cryptography and RSAPublic key cryptography and RSA
Public key cryptography and RSA
 
Block Ciphers Modes of Operation
Block Ciphers Modes of OperationBlock Ciphers Modes of Operation
Block Ciphers Modes of Operation
 

Similar to Ccna+sec+ch01+ +overview+security

CCNA RS_ITN - Chapter 11
CCNA RS_ITN - Chapter 11CCNA RS_ITN - Chapter 11
CCNA RS_ITN - Chapter 11Irsandi Hasan
 
CCNAv5 - S1: Chapter11 It's A Network
CCNAv5 - S1: Chapter11 It's A NetworkCCNAv5 - S1: Chapter11 It's A Network
CCNAv5 - S1: Chapter11 It's A NetworkVuz Dở Hơi
 
Chapter 11 : It’s a network
Chapter 11 : It’s a networkChapter 11 : It’s a network
Chapter 11 : It’s a networkteknetir
 
Chapter 11 - It’s a Network
Chapter 11 - It’s a NetworkChapter 11 - It’s a Network
Chapter 11 - It’s a NetworkYaser Rahmati
 
CCNA 1 Routing and Switching v5.0 Chapter 11
CCNA 1 Routing and Switching v5.0 Chapter 11CCNA 1 Routing and Switching v5.0 Chapter 11
CCNA 1 Routing and Switching v5.0 Chapter 11Nil Menon
 
CCNA RS_NB - Chapter 11
CCNA RS_NB - Chapter 11CCNA RS_NB - Chapter 11
CCNA RS_NB - Chapter 11Irsandi Hasan
 
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 11
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 11CCNA (R & S) Module 01 - Introduction to Networks - Chapter 11
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 11Waqas Ahmed Nawaz
 
ITN6_Instructor_Materials_Chapter11.pdf
ITN6_Instructor_Materials_Chapter11.pdfITN6_Instructor_Materials_Chapter11.pdf
ITN6_Instructor_Materials_Chapter11.pdfThangDang53
 
ITE v5.0 - Chapter 10
ITE v5.0 - Chapter 10ITE v5.0 - Chapter 10
ITE v5.0 - Chapter 10Irsandi Hasan
 
Presentation cisco iron port e-mail security solution
Presentation   cisco iron port e-mail security solutionPresentation   cisco iron port e-mail security solution
Presentation cisco iron port e-mail security solutionxKinAnx
 
CCNA RS_ITN - Chapter 1
CCNA RS_ITN - Chapter 1CCNA RS_ITN - Chapter 1
CCNA RS_ITN - Chapter 1Irsandi Hasan
 
Ccna v5-S1-Chapter 11
Ccna v5-S1-Chapter 11Ccna v5-S1-Chapter 11
Ccna v5-S1-Chapter 11Hamza Malik
 
It nv51 instructor_ppt_ch11
It nv51 instructor_ppt_ch11It nv51 instructor_ppt_ch11
It nv51 instructor_ppt_ch11newbie2019
 
CCNA Security 02- fundamentals of network security
CCNA Security 02-  fundamentals of network securityCCNA Security 02-  fundamentals of network security
CCNA Security 02- fundamentals of network securityAhmed Habib
 
Cyber Security for Critical Infrastrucutre-ppt
Cyber Security for Critical Infrastrucutre-pptCyber Security for Critical Infrastrucutre-ppt
Cyber Security for Critical Infrastrucutre-pptMohit Rampal
 
Security Design Considerations Module 3 - Training Sample
Security Design Considerations Module 3 - Training SampleSecurity Design Considerations Module 3 - Training Sample
Security Design Considerations Module 3 - Training SampleContent Rules, Inc.
 
CCNA Security 011- implementing ios-based ips
CCNA Security 011- implementing ios-based ipsCCNA Security 011- implementing ios-based ips
CCNA Security 011- implementing ios-based ipsAhmed Habib
 
Ceh v5 module 01 introduction to ethical hacking
Ceh v5 module 01 introduction to ethical hackingCeh v5 module 01 introduction to ethical hacking
Ceh v5 module 01 introduction to ethical hackingVi Tính Hoàng Nam
 

Similar to Ccna+sec+ch01+ +overview+security (20)

CCNA RS_ITN - Chapter 11
CCNA RS_ITN - Chapter 11CCNA RS_ITN - Chapter 11
CCNA RS_ITN - Chapter 11
 
CCNAv5 - S1: Chapter11 It's A Network
CCNAv5 - S1: Chapter11 It's A NetworkCCNAv5 - S1: Chapter11 It's A Network
CCNAv5 - S1: Chapter11 It's A Network
 
Chapter 11 : It’s a network
Chapter 11 : It’s a networkChapter 11 : It’s a network
Chapter 11 : It’s a network
 
Chapter 11 - It’s a Network
Chapter 11 - It’s a NetworkChapter 11 - It’s a Network
Chapter 11 - It’s a Network
 
CCNA 1 Routing and Switching v5.0 Chapter 11
CCNA 1 Routing and Switching v5.0 Chapter 11CCNA 1 Routing and Switching v5.0 Chapter 11
CCNA 1 Routing and Switching v5.0 Chapter 11
 
CCNA RS_NB - Chapter 11
CCNA RS_NB - Chapter 11CCNA RS_NB - Chapter 11
CCNA RS_NB - Chapter 11
 
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 11
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 11CCNA (R & S) Module 01 - Introduction to Networks - Chapter 11
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 11
 
Network security
Network securityNetwork security
Network security
 
ITN6_Instructor_Materials_Chapter11.pdf
ITN6_Instructor_Materials_Chapter11.pdfITN6_Instructor_Materials_Chapter11.pdf
ITN6_Instructor_Materials_Chapter11.pdf
 
ITE v5.0 - Chapter 10
ITE v5.0 - Chapter 10ITE v5.0 - Chapter 10
ITE v5.0 - Chapter 10
 
Presentation cisco iron port e-mail security solution
Presentation   cisco iron port e-mail security solutionPresentation   cisco iron port e-mail security solution
Presentation cisco iron port e-mail security solution
 
CCNA RS_ITN - Chapter 1
CCNA RS_ITN - Chapter 1CCNA RS_ITN - Chapter 1
CCNA RS_ITN - Chapter 1
 
Ccna v5-S1-Chapter 11
Ccna v5-S1-Chapter 11Ccna v5-S1-Chapter 11
Ccna v5-S1-Chapter 11
 
It nv51 instructor_ppt_ch11
It nv51 instructor_ppt_ch11It nv51 instructor_ppt_ch11
It nv51 instructor_ppt_ch11
 
CCNA Security 02- fundamentals of network security
CCNA Security 02-  fundamentals of network securityCCNA Security 02-  fundamentals of network security
CCNA Security 02- fundamentals of network security
 
Cyber Security for Critical Infrastrucutre-ppt
Cyber Security for Critical Infrastrucutre-pptCyber Security for Critical Infrastrucutre-ppt
Cyber Security for Critical Infrastrucutre-ppt
 
Security Design Considerations Module 3 - Training Sample
Security Design Considerations Module 3 - Training SampleSecurity Design Considerations Module 3 - Training Sample
Security Design Considerations Module 3 - Training Sample
 
CCNA Security 011- implementing ios-based ips
CCNA Security 011- implementing ios-based ipsCCNA Security 011- implementing ios-based ips
CCNA Security 011- implementing ios-based ips
 
Ccnsp
CcnspCcnsp
Ccnsp
 
Ceh v5 module 01 introduction to ethical hacking
Ceh v5 module 01 introduction to ethical hackingCeh v5 module 01 introduction to ethical hacking
Ceh v5 module 01 introduction to ethical hacking
 

Ccna+sec+ch01+ +overview+security

  • 1. 1© 2009 Cisco Systems, Inc. All rights reserved. Network Security Module 1 – Overview ofModule 1 – Overview of Network SecurityNetwork Security
  • 2. 2© 2009 Cisco Systems, Inc. All rights reserved. Learning Objectives 1.1 Introduction to Network Security 1.2 Introduction to Vulnerabilities, Threats, and Attacks 1.3 Attack Examples 1.4 Vulnerability Analysis
  • 3. 3© 2009 Cisco Systems, Inc. All rights reserved. Module 1 – Overview of Network Security 1.1 Introduction to Network Security
  • 4. 4© 2009 Cisco Systems, Inc. All rights reserved. Network Security • Network security is the process by which digital information assets are protected. • The goals of security are to protect confidentiality,protect confidentiality, maintain integrity, and assure availabilitymaintain integrity, and assure availability. With this in mind, it is imperative that all networks be protected from threats and vulnerabilities in order for a business to achieve its fullest potential. • Typically, these threats are persistent due to vulnerabilities, which can arise from misconfiguredcan arise from misconfigured hardware or software, poor network design, inherenthardware or software, poor network design, inherent technology weaknesses, or end-user carelessnesstechnology weaknesses, or end-user carelessness.
  • 5. 5© 2009 Cisco Systems, Inc. All rights reserved. The Closed Network
  • 6. 6© 2009 Cisco Systems, Inc. All rights reserved. The Network Today
  • 7. 7© 2009 Cisco Systems, Inc. All rights reserved. Identifying Potential Risks • A risk analysis should identify the risks to the network, network resources, and data. The intent of a risk analysis is to identify the components of the network, evaluate the importance of each component, and then apply an appropriate level of security. This helps to maintain a workable balance between security and required network access. Asset Identification Vulnerability Assessment Threat Identification
  • 8. 8© 2009 Cisco Systems, Inc. All rights reserved. Network Security Models
  • 9. 9© 2009 Cisco Systems, Inc. All rights reserved. Open Security Model
  • 10. 10© 2009 Cisco Systems, Inc. All rights reserved. Open Security Model
  • 11. 11© 2009 Cisco Systems, Inc. All rights reserved. Restricted Security Model
  • 12. 12© 2009 Cisco Systems, Inc. All rights reserved. Closed Security Model
  • 13. 13© 2009 Cisco Systems, Inc. All rights reserved. Closed Security Model
  • 14. 14© 2009 Cisco Systems, Inc. All rights reserved. Technology that affect Security
  • 15. 15© 2009 Cisco Systems, Inc. All rights reserved. Trends that Affect Security • Increase of network attacks • Increased sophistication of attacks • Increased dependence on the network • Lack of trained personnel • Lack of awareness • Lack of security policies • Wireless access • Legislation • Litigation
  • 16. 16© 2009 Cisco Systems, Inc. All rights reserved. ISO/IEC 17799 –Security policy –Organization of information security –Asset management –Human resources security –Physical and environmental security –Communications and operations management –Access control –Information systems acquisition, development and maintenance –Information security incident management –Business continuity management –Compliance –Risk Assesment
  • 17. 17© 2009 Cisco Systems, Inc. All rights reserved. Module 1 – Overview of Network Security 1.2 Introduction to Vulnerabilities, Threats, and Attacks
  • 18. 18© 2009 Cisco Systems, Inc. All rights reserved. Network Vulnerabilities • Vulnerability is a weakness which is inherent in every network and device. This includes routers, switches, desktops, servers, and even security devices themselves. • Threats are the people eager, willing, and qualified to take advantage of each security weakness, and they continually search for new exploits and weaknesses. • Finally, the threats use a variety of tools, scripts, and programs to launch attacks against networks and network devices.
  • 19. 19© 2009 Cisco Systems, Inc. All rights reserved. Network Vulnerabilities • Technology: Computer and network technologies have intrinsic security weaknesses. These include TCP/IP protocol, operating system, and network equipment weaknesses • Configuration: Network administrators or network engineers need to learn what the configuration weaknesses are and correctly configure their computing and network devices to compensate. • Policy: The network may pose security risks to the network if users do not follow the security policy.
  • 20. 20© 2009 Cisco Systems, Inc. All rights reserved. Technology Weaknesses
  • 21. 21© 2009 Cisco Systems, Inc. All rights reserved. Configuration Weaknesses
  • 22. 22© 2009 Cisco Systems, Inc. All rights reserved. Security Policy Weaknesses
  • 23. 23© 2009 Cisco Systems, Inc. All rights reserved. Threat Capabilities—More Dangerous and Easier to Use
  • 24. 24© 2009 Cisco Systems, Inc. All rights reserved. Variety of Threats
  • 25. 25© 2009 Cisco Systems, Inc. All rights reserved. The four primary attack categories
  • 26. 26© 2009 Cisco Systems, Inc. All rights reserved. Attack Evolution
  • 27. 27© 2009 Cisco Systems, Inc. All rights reserved. Module 1 – Overview of Network Security 1.3 Attack Examples
  • 28. 28© 2009 Cisco Systems, Inc. All rights reserved. Network Threats • There are four general categories of security threats to the network: –Unstructured threats –Structured threats –External threats –Internal threats Internet External exploitation Internal exploitation Dial-in exploitation Compromised host
  • 29. 29© 2009 Cisco Systems, Inc. All rights reserved. Four Classes of Network Attacks Reconnaissance attacks Access attacks Denial of service attacks Worms, viruses, and Trojan horses
  • 30. 30© 2009 Cisco Systems, Inc. All rights reserved. Specific Attack Types • All of the following can be used to compromise your system: Packet sniffers IP weaknesses Password attacks DoS or DDoS Man-in-the-middle attacks Application layer attacks Trust exploitation Port redirection Virus Trojan horse Operator error Worms
  • 31. 31© 2009 Cisco Systems, Inc. All rights reserved. Reconnaissance Attacks • Network reconnaissance refers to the overall act of learning information about a target network by using publicly available information and applications.
  • 32. 32© 2009 Cisco Systems, Inc. All rights reserved. Reconnaissance Attack
  • 33. 33© 2009 Cisco Systems, Inc. All rights reserved. Reconnaissance Attack Example Sample domain name query • Sample IP address query
  • 34. 34© 2009 Cisco Systems, Inc. All rights reserved. Reconnaissance Attack Mitigation Network reconnaissance cannot be prevented entirely. IDSs at the network and host levels can usually notify an administrator when a reconnaissance gathering attack (for example, ping sweeps and port scans) is under way.
  • 35. 35© 2009 Cisco Systems, Inc. All rights reserved. Packet Sniffers • A packet sniffer is a software application that uses a network adapter card in promiscuous mode to capture all network packets. The following are the packet sniffer features: Packet sniffers exploit information passed in clear text. Protocols that pass information in the clear include the following: •Telnet •FTP •SNMP •POP Packet sniffers must be on the same collision domain. Host A Host B Router A Router B
  • 36. 36© 2009 Cisco Systems, Inc. All rights reserved. Sniffers
  • 37. 37© 2009 Cisco Systems, Inc. All rights reserved. Packet Sniffer Mitigation • The following techniques and tools can be used to mitigate sniffers: Authentication—Using strong authentication, such as one-time passwords, is a first option for defense against packet sniffers. Switched infrastructure —Deploy a switched infrastructure to counter the use of packet sniffers in your environment. Antisniffer tools—Use these tools to employ software and hardware designed to detect the use of sniffers on a network. Cryptography—The most effective method for countering packet sniffers does not prevent or detect packet sniffers, but rather renders them irrelevant. Host A Host B Router A Router B
  • 38. 38© 2009 Cisco Systems, Inc. All rights reserved. Port Scans
  • 39. 39© 2009 Cisco Systems, Inc. All rights reserved. Port Scan Example
  • 40. 40© 2009 Cisco Systems, Inc. All rights reserved. Ping Sweeps
  • 41. 41© 2009 Cisco Systems, Inc. All rights reserved. Queries
  • 42. 42© 2009 Cisco Systems, Inc. All rights reserved. Access Attacks • Access attacks exploit known vulnerabilities in authentication services, FTP services, and Web services to gain entry to Web accounts, confidential databases, and other sensitive information . Access attacks can consist of the following: –Password attacks (Dictionary cracking, Brute-force computation) –Trust Exploitation –Port Redirection –Man-in-the-middle Attack –Social Engineering –Phishing
  • 43. 43© 2009 Cisco Systems, Inc. All rights reserved. Access Attacks
  • 44. 44© 2009 Cisco Systems, Inc. All rights reserved. Port Redirection
  • 45. 45© 2009 Cisco Systems, Inc. All rights reserved. Password Attacks • Hackers can implement password attacks using several different methods: Brute-force attacks Dictionary Attacks Trojan horse programs IP spoofing Packet sniffers
  • 46. 46© 2009 Cisco Systems, Inc. All rights reserved. Password Attacks Mitigation • The following are mitigation techniques: Do not allow users to use the same password on multiple systems. Disable accounts after a certain number of unsuccessful login attempts. Do not use plain text passwords. OTP or a cryptographic password is recommended. Use “strong” passwords. Strong passwords are at least eight characters long and contain uppercase letters, lowercase letters, numbers, and special characters.
  • 47. 47© 2009 Cisco Systems, Inc. All rights reserved. Man-in-the-Middle Attacks A man-in-the-middle attack requires that the hacker have access to network packets that come across a network. A man-in-the-middle attack is implemented using the following: Network packet sniffers Routing and transport protocols Possible man-in-the-middle attack uses include the following: Theft of information Hijacking of an ongoing session Traffic analysis DoS Corruption of transmitted data Introduction of new information into network sessions Host A Host B Router A Router B Data in clear text
  • 48. 48© 2009 Cisco Systems, Inc. All rights reserved. Man-in-the-Middle Mitigation • Man-in-the-middle attacks can be effectively mitigated only through the use of cryptography (encryption). Host A Host B Router A ISP Router B A man-in-the-middle attack can only see cipher text IPSec tunnel
  • 49. 49© 2009 Cisco Systems, Inc. All rights reserved. DoS Attacks • They prevent authorized people from using a service by using up system resources. The following are examples of common DoS threats: –Ping of death –SYN flood attack –Packet fragmentation and reassembly –E-mail bombs –Malicious applets –Misconfiguring routers
  • 50. 50© 2009 Cisco Systems, Inc. All rights reserved. DoS Attacks
  • 51. 51© 2009 Cisco Systems, Inc. All rights reserved. DDoS • DDoS attacks are designed to saturate network links with spurious data. This data can overwhelm an Internet link, causing legitimate traffic to be dropped. DDoS uses attack methods similar to standard DoS attacks but operates on a much larger scale. Typically hundreds or thousands of attack points attempt to overwhelm a target. Examples of DDoS attacks include the following: –Smurf –Tribe Flood Network (TFN) –Stacheldraht
  • 52. 52© 2009 Cisco Systems, Inc. All rights reserved. DDoS Attack Example
  • 53. 53© 2009 Cisco Systems, Inc. All rights reserved. DoS Attack Mitigation • The threat of DoS attacks can be reduced through the following three methods: 1. Antispoof features —Proper configuration of antispoof features on your routers and firewalls 2. Anti-DoS features —Proper configuration of anti-DoS features on routers and firewalls 3. Traffic rate limiting —Implement traffic rate limiting with the networks ISP
  • 54. 54© 2009 Cisco Systems, Inc. All rights reserved. IP Spoofing IP spoofing occurs when a hacker inside or outside a network impersonates the conversations of a trusted computer. Two general techniques are used during IP spoofing: A hacker uses an IP address that is within the range of trusted IP addresses. A hacker uses an authorized external IP address that is trusted. Uses for IP spoofing include the following: IP spoofing is usually limited to the injection of malicious data or commands into an existing stream of data. A hacker changes the routing tables to point to the spoofed IP address, then the hacker can receive all the network packets that are addressed to the spoofed address and reply just as any trusted user can.
  • 55. 55© 2009 Cisco Systems, Inc. All rights reserved. IP Spoofing Mitigation • The threat of IP spoofing can be reduced, but not eliminated, through the following measures: Access control —The most common method for preventing IP spoofing is to properly configure access control. RFC 2827 filtering —You can prevent users of your network from spoofing other networks (and be a good Internet citizen at the same time) by preventing any outbound traffic on your network that does not have a source address in your organization's own IP range. Additional authentication that does not use IP-based authentication—Examples of this include the following: Cryptographic (recommended) Strong, two-factor, one-time passwords
  • 56. 56© 2009 Cisco Systems, Inc. All rights reserved. Application Layer Attacks • Application layer attacks have the following characteristics: Exploit well known weaknesses, such as protocols, that are intrinsic to an application or system (for example, sendmail, HTTP, and FTP) Often use ports that are allowed through a firewall (for example, TCP port 80 used in an attack against a web server behind a firewall) Can never be completely eliminated, because new vulnerabilities are always being discovered
  • 57. 57© 2009 Cisco Systems, Inc. All rights reserved. Application Layer Attacks Mitigation • Some measures you can take to reduce your risks are as follows: Read operating system and network log files, or have them analyzed by log analysis applications. Subscribe to mailing lists that publicize vulnerabilities. Keep your operating system and applications current with the latest patches. IDSs can scan for known attacks, monitor and log attacks, and in some cases, prevent attacks.
  • 58. 58© 2009 Cisco Systems, Inc. All rights reserved. Virus and Trojan Horses Viruses refer to malicious software that are attached to another program to execute a particular unwanted function on a user’s workstation. End-user workstations are the primary targets. A Trojan horse is different only in that the entire application was written to look like something else, when in fact it is an attack tool. A Trojan horse is mitigated by antivirus software at the user level and possibly the network level.
  • 59. 59© 2009 Cisco Systems, Inc. All rights reserved. Virus Attacks
  • 60. 60© 2009 Cisco Systems, Inc. All rights reserved. Worm attack mitigation
  • 61. 61© 2009 Cisco Systems, Inc. All rights reserved. Vulnerabilities Exist at all OSI Layers
  • 62. 62© 2009 Cisco Systems, Inc. All rights reserved. Attacks Mitigation
  • 63. 63© 2009 Cisco Systems, Inc. All rights reserved. Opportunities
  • 64. 64© 2009 Cisco Systems, Inc. All rights reserved. Module 1 – Overview of Network Security 1.4 Vulnerability Analysis
  • 65. 65© 2009 Cisco Systems, Inc. All rights reserved. Network Security Policy • The network security policy is a broad, end-to- end document designed to be clearly applicable to an organization's operations. The policy is used to aid in network design, convey security principles, and facilitate network deployments. • The network security policy outlines rules for network access, determines how policies are enforced, and describes the basic architecture of the organization's network security environment.
  • 66. 66© 2009 Cisco Systems, Inc. All rights reserved. Policy Identification • The policy should identify the assets that require protection. This will help the designer provide the correct level of protection for sensitive computing resources, and identify the flow of sensitive data in the network. • The policy should identify possible attackers. This will give the designer insight into the level of trust assigned to internal and external users, ideally identified by more specific categories such as business partners, customers of an organization, outsourcing IT partners.
  • 67. 67© 2009 Cisco Systems, Inc. All rights reserved. Network security Policies
  • 68. 68© 2009 Cisco Systems, Inc. All rights reserved. Cisco SDN
  • 69. 69© 2009 Cisco Systems, Inc. All rights reserved. SDN Topology Cisco NAC Appliance & Cisco Security Agent Cisco IOS Firewall, VPN Software, access control & Filtering Cisco IOS Firewall, VPN Software, access control & Filtering Cisco IOS Firewall, Cisco adaptive security appliance Traffic inspection and threat mitigation Cisco security monitoring, analisys, and response system Cisco security Manager provides policy-based management
  • 70. 70© 2009 Cisco Systems, Inc. All rights reserved. Auto Secure To secure the management and forwarding planes of the router, use the auto secure command in privileged EXEC mode. auto secure [management | forwarding] [no-interact] Syntax Description • management (Optional) Only the management plane will be secured. • forwarding (Optional) Only the forwarding plane will be secured. • no-interact (Optional) The user will not be prompted for any interactive configurations. If this keyword is not enabled, the command will show the user the noninteractive configuration and the interactive configurations thereafter.
  • 71. 71© 2009 Cisco Systems, Inc. All rights reserved. NSA Router Security Guide
  • 72. 72© 2009 Cisco Systems, Inc. All rights reserved. CIS RAT Report
  • 73. 73© 2009 Cisco Systems, Inc. All rights reserved. Host Analysis • Network Mapper (Nmap) – Nmap is a very popular free tool used for security scanning and auditing. It can rapidly perform a port scan of a single host or a range of hosts. Nmap was originally written to be run on UNIX systems, and it is now available for use on Microsoft Windows platforms . • Nessus – Nessus is a vulnerability scanner that is available for UNIX and Microsoft Windows platforms. New vulnerability testing capabilities can be added to Nessus through the installation of modular plugins. Nessus includes a built in port scanner, or it can be used along with Nmap. Once the Nessus scan is finished, a report is created. This report displays the results of the scan and provides steps that can be taken to mitigate vulnerabilities.
  • 74. 74© 2009 Cisco Systems, Inc. All rights reserved. Microsoft Baseline Security Analyzer • The Microsoft Baseline Security Analyzer (MBSA) can be used to scan hosts running Windows 2000, Windows Vista, Windows XP, and Windows Server 2003 & 2008 operating systems to determine potential security risks. • MBSA scans for common system misconfigurations and missing security updates. MBSA includes both a graphical and command line interface that can perform local or remote scans. • After a system scan, the MBSA provides a report outlining potential vulnerabilities and the steps required to correct them.

Editor's Notes

  1. <number>
  2. <number> Security has one purpose, to protect assets. For most of history, this meant building strong walls to stop the bad guys, and establishing small, well-guarded doors to provide secure access for the good guys. This strategy worked well for the centralized, fortress-like world of mainframe computers and closed networks . The closed network typically consists of a network designed and implemented in a corporate environment, and provides connectivity only to known parties and sites without connecting to public networks. Networks were designed this way in the past and thought to be reasonably secure because of no outside connectivity.
  3. With the advent of personal computers, LANs, and the wide-open world of the Internet, the networks of today are more open . As e-business and Internet applications continue to grow, finding the balance between being isolated and being open will be critical, along with the ability to distinguish the good guys from the bad guys. Furthermore, the rise of mobile commerce and wireless networks will be as the cannon was to the castle walls, exploding the old model and demanding that security solutions become seamlessly integrated, more transparent, and more flexible. With the increased number of LANs and personal computers, the Internet began to create untold numbers of security risks. Firewall devices, which are software or hardware that enforce an access control policy between two or more networks, were introduced. This technology gave businesses a balance between security and simple outbound access to the Internet which was mostly used for e-mail and Web surfing. This balance was short lived however as the use of extranets began to grow, which connected internal and external business processes. Businesses were soon realizing tremendous cost savings by connecting supply-chain management and enterprise resource planning systems to their business partners, and by connecting sales-force automation systems to mobile employees, and by providing electronic commerce connections to business customers and consumers. The firewall began to include intrusion detection, authentication, authorization, and vulnerability assessment systems. Today, successful companies have once again struck a balance by keeping the bad guys out with increasingly complex ways of letting the good guys in. Most people expect security measures to ensure the following: Users can perform only authorized tasks. Users can obtain only authorized information. Users cannot cause damage to the data, applications, or operating environment of a system. The word security means protection against malicious attack by outsiders, and involves controlling the effects of errors and equipment failures. Anything that can protect against an attack will probably prevent random misfortune as well. Throughout this course many definitions, acronyms and logical device symbols dealing with security will be introduced . Refer to the glossary for further explanation when encountering unknown terms and acronyms.
  4. Asset Identification Before the network can be secured, the individual components that make up the network must be identified. An asset inventory needs to be created. All of the network devices and endpoints, such as hosts and servers, should be included in the asset inventory. Once the inventory is complete, the components can be prioritized and assessed for vulnerabilities. Vulnerability Assessment Once the network components have been identified, they can be assessed for vulnerabilities. These vulnerabilities could be weaknesses in the technology, configuration, or security policy. Any vulnerability that is discovered will need to be addressed to mitigate any threat that could take advantage of the vulnerability. Vulnerabilities can be fixed by various methods, including applying software patches, reconfiguring devices, or deploying countermeasures, such as firewalls and anti-virus software. Threat Identification A threat is an event that can take advantage of a vulnerability and cause a negative impact on the network. Potential threats to the network need to be identified, and the related vulnerabilities need to be addressed to minimize the risk of the threat.
  5. Asset Identification Before the network can be secured, the individual components that make up the network must be identified. An asset inventory needs to be created. All of the network devices and endpoints, such as hosts and servers, should be included in the asset inventory. Once the inventory is complete, the components can be prioritized and assessed for vulnerabilities. Vulnerability Assessment Once the network components have been identified, they can be assessed for vulnerabilities. These vulnerabilities could be weaknesses in the technology, configuration, or security policy. Any vulnerability that is discovered will need to be addressed to mitigate any threat that could take advantage of the vulnerability. Vulnerabilities can be fixed by various methods, including applying software patches, reconfiguring devices, or deploying countermeasures, such as firewalls and anti-virus software. Threat Identification A threat is an event that can take advantage of a vulnerability and cause a negative impact on the network. Potential threats to the network need to be identified, and the related vulnerabilities need to be addressed to minimize the risk of the threat.
  6. With all security designs, there is some trade-off between user productivity and security measures. The goal of any security design is to provide maximum security with minimum impact on user access and productivity. Some security measures, such as network data encryption, do not restrict access and productivity. On the other hand, cumbersome or unnecessarily redundant verification and authorization systems can frustrate users and prevent access to critical network resources. Business needs should dictate the security policy. A security policy should not determine how a business operates. Because organizations are constantly subject to change, security policies must be systematically updated to reflect new business directions, technological changes, and resource allocations. Security policies can vary greatly in design. Three general types of security models are open, restrictive, and closed. Some important points are as follows : Security model can be open or closed as a starting point. Choose the best end-to-end mix of security products and technology to implement the model. Application-level security can include Secure Socket Layer (SSL) technology. Like security models, many devices can be classified as open, restrictive, or closed. For example, routers and switches are typically open devices, allowing high functionality and services by default. On the other hand, a firewall is typically a closed system that does not allow any services until they are switched on. Server operating systems can fall into any of the three categories, depending on the vendor. It is important to understand these principles when deploying these devices.
  7. Open Access An open security model is the easiest to implement  –  . Very few security measures are implemented in this design. Administrators configure existing hardware and software basic security capabilities. Firewall, Virtual Private Networks (VPN), Intrusion Detection Systems (IDS) and other measures that incur additional costs are typically not implemented. Simple passwords and server security become the foundation of this model. If encryption is used, it is implemented by individual users or on servers. This model assumes that the protected assets are minimal, users are trusted and threats are minimal. However, this does not exclude the need for data backup systems in most open security policy scenarios. LANs, which are not connected to the Internet or public WANs, are more likely to implement this type of model. This type of network design gives users free access to all areas. When security breaches occur, they are likely to result in great damage and loss. Network administrators are usually not held responsible for network breaches or abuse.
  8. Restrictive Access A restrictive security model is more difficult to implement  –  . Many security measures are implemented in this design. Administrators configure existing hardware and software for security capabilities in addition to deploying more costly hardware and software solutions such as firewalls, VPN, IDS, and identity servers. Firewalls and identity servers become the foundation of this model. This model assumes that the protected assets are substantial, some users are not trustworthy, and that threats are likely. LANs, which are connected to the Internet or public WANs, are more likely to implement this type of model. Ease of use for users is diminished as security is tightened.
  9. Closed Access A closed security model is most difficult to implement. All available security measures are implemented in this design. Administrators configure existing hardware and software for maximum-security capabilities in addition to deploying more costly hardware and software solutions such as firewalls, VPN, IDS, and identity servers  –  . This model assumes that the protected assets are premium, all users are not trustworthy, and that threats are frequent. User access is very difficult and cumbersome. Network administrators require greater skills and more time to administer the network. Furthermore, companies require a higher number of network administrators to maintain this tight security. In many corporations and organizations, these administrators are likely to be very unpopular while implementing and maintaining security. Network security departments must clarify that they only implement the policy, which is designed, written, and approved by the corporation. Politics behind the closed security model can be monumental. In the event of a security breach or network outage, network administrators may be held more accountable for problems.
  10. As in any fast-growing industry, changes are to be expected. The types of potential threats to network security are always evolving. If the security of the network is compromised, there could be serious consequences, such as loss of privacy, theft of information, and even legal liability . Legal Issues and Privacy Concerns For many businesses today, one of the biggest reasons to create and follow a security policy is compliance with the law. Any business is potentially liable should a hacker or a virus take down the operation. Similarly, if a business is running a publicly held e-business and a catastrophic attack seriously impairs the business, a lawsuit is possible. Legal liability in such cases is likely to depend on what prevention technologies and practices are available and on whether these technologies and practices are reasonably cost-effective to implement. As a result, showing due diligence will mean everything from implementing technologies such as firewalls, intrusion-detection tools, content filters, traffic analyzers, and virtual private networks to having best practices for continuous risk assessment and vulnerability testing. Of course, litigation is not the only legal consideration that e-businesses are facing today. Lawmakers concern over the lack of Internet security, particularly where it hampers rights to privacy, is growing. In 1998, the European Union passed the comprehensive Data Privacy Directives that provide consumers with strong control over their personal data. Many countries outside the United States have adopted the equivalent of these privacy principles. In the United States, over 1000 privacy-related bills were introduced in state legislatures in 1999 and 2000, and numerous bills are currently pending. In the United States, education, financial services, government, and healthcare are currently scrambling to meet federally mandated guidelines for network security and privacy. In financial services, there is the Gramm-Leach-Blilely (GLB) bill, which was passed in 1999. The GLB Act erased long-standing antitrust laws that prohibited banks, insurance companies, and securities firms from merging and sharing information with one another. The idea was that smaller firms would then be able to pursue acquisitions and/or alliances that would help drive competition against many of the larger financial institutions. Included in that law were several consumer privacy protections. Namely, companies must tell their customers what sorts of data they plan to share and with whom and then give customers a chance to opt out of that data sharing. The law required banks to send those notices to customers by July 1, 2001. The US Government is contending with the Government Information Security Reform Act, which was passed in October of 2002, and directs federal agencies to increase security plans for their computer systems. Representatives from the General Accounting Office (GAO) and other organizations recently told Congress that, despite this legislation, federal agencies are still falling short of dealing with key security issues. On the healthcare side, The Health Insurance Portability and Accountability Act of 1996 (HIPAA) requires the US Department of Health and Human Services to develop a set of national standards for healthcare transactions and provide assurance that the electronic transfer of confidential patient information will be as safe as or safer than paper-based patient records. Compliance with HIPAA is estimated to cost the healthcare industry $4 billion. Finally, many education institutions in the US must comply with the Children Internet Protection Act (CIPA) if they wish to receive any form of US Federal funding. Wireless Access The increasing use of wireless local area network (LAN) connections and the rapid rise of Internet access from cell phones in Europe and Asia are requiring entirely whole new approaches to security. RF connections do not respect firewalls the way wired connections do. Moreover, the slow processors, small screens, and nonexistent keyboards on cell phones and personal digital assistants (PDAs) break many of the standard approaches to access, authentication, and authorization. The Need for Speed The number of broadband connections to the Internet from homes is exceeding projections. Many businesses are finding that multiple T1 or E1 connections to the Internet are no longer sufficient. Current software-based security approaches have problems scaling to OC-1 and higher rates. IT Staffing Shortages The IT staffing shortage is especially evident in the security field. To solve this problem, many enterprises are increasingly outsourcing day-to-day security management tasks. The application service provider (ASP) business model will become increasingly common in the security world. Therefore, security solutions will need to be more manageable in this outsourced model. Clearly, there is a demand for skilled network security professionals.
  11. <number> Hackers White Hat Black Hat Attack tools, worms, etc Legislation GLB HIPPA CIPA Privacy Act Litigation Network Insurance against losses Remember, these are why many companies are allocating the money for security initiatives.
  12. ISO/IEC 17799 ISO/IEC 17799, Information technology – Code of practice for information security management, is an information security standard that is published by the International Organization for Standardization (ISO) and the International Electrotechnical Commission (IEC). ISO/IEC 17799 is intended to be a common basis and practical guideline for developing organizational security standards and effective security management practices. ISO/IEC 17799 was originally published in 2000 and is scheduled to be revised and republished in 2005. The 2005 revision of ISO/IEC 17799 is made up of the following eleven sections: Security policy Organization of information security Asset management Human resources security Physical and environmental security Communications and operations management Access control Information systems acquisition, development and maintenance Information security incident management Business continuity management Compliance
  13. <number> Technology Routed Protocols TCP/IP, IPX, Appletalk Routing Protocols RIP, OSPF, EIGRP, BGP Operating Systems Server and PC Windows, Mac, Unix, etc
  14. Unstructured threats Unstructured threats consist of mostly inexperienced individuals using easily available hacking tools such as shell scripts and password crackers . Even unstructured threats that are only executed with the intent of testing and challenging a hacker’s skills can still do serious damage to a company. For example, if an external company Web site is hacked, the integrity of the company is damaged. Even if the external Web site is separate from the internal information that sits behind a protective firewall, the public does not know that. All the public knows is that the site is not a safe environment to conduct business. Structured threats Structured threats come from hackers that are more highly motivated and technically competent. These people know system vulnerabilities, and can understand and develop exploit-code and scripts. They understand, develop, and use sophisticated hacking techniques to penetrate unsuspecting businesses. These groups are often involved with the major fraud and theft cases reported to law enforcement agencies. External threats External threats can arise from individuals or organizations working outside of a company. They do not have authorized access to the computer systems or network. They work their way into a network mainly from the Internet or dialup access servers. Internal threats Internal threats occur when someone has authorized access to the network with either an account on a server or physical access to the network. According to the FBI, internal access and misuse account for 60 to 80 percent of reported incidents. As the types of threats, attacks, and exploits have evolved, various terms have been coined to describe different groups of individuals. Some of the most common terms are as follows: Hacker – Hacker is a general term that has historically been used to describe a computer programming expert. More recently, this term is commonly used in a negative way to describe an individual that attempts to gain unauthorized access to network resources with malicious intent. Cracker – Cracker is the term that is generally regarded as the more accurate word that is used to describe an individual that attempts to gain unauthorized access to network resources with malicious intent. Phreaker – A phreaker is an individual that manipulates the phone network in order to cause it to perform a function that is normally not allowed. A common goal of phreaking is breaking into the phone network, usually through a payphone, to make free long distance calls. Spammer – A spammer is an individual that sends large quantities of unsolicited email messages. Spammers often use viruses to take control of home computers in order to use these computers to send out their bulk messages. Phisher – A Phisher uses email or other means in an attempt to trick others into providing sensitive information, such as credit card numbers or passwords. The Phisher will masquerade as a trusted party that would have a legitimate need for the sensitive information. White hat – White hat is a term used to describe individuals that use their abilities to find vulnerabilities in systems or networks, and then report these vulnerabilities to the owners of the system so that they can be fixed. Black hat – Black hat is another term for individuals that use their knowledge of computer systems to break into systems or networks that they are not authorized to use
  15. <number> Reconnaissance attacks can consist of the following : Packet sniffers Port scans Ping sweeps Internet information queries A malicious intruder typically ping sweeps the target network to determine which IP addresses are alive . After this, the intruder uses a port scanner to determine what network services or ports are active on the live IP addresses . From this information, the intruder queries the ports to determine the application type and version, as well as the type and version of operating system running on the target host. Based on this information, the intruder can determine if a possible vulnerability exists that can be exploited. Using, for example, the nslookup and whois utilities, an attacker can easily determine the IP address space assigned to a given corporation or entity . The ping command tells the attacker what IP addresses are alive. Network snooping and packet sniffing are common terms for eavesdropping. Eavesdropping is listening in to a conversation, spying, prying, or snooping. The information gathered by eavesdropping can be used to pose other attacks to the network. An example of data susceptible to eavesdropping is SNMP version 1 community strings, which are sent in clear text. An intruder could eavesdrop on SNMP queries and gather valuable data on network equipment configuration. Another example is the capture of usernames and passwords as they cross a network. Types of Eavesdropping A common method for eavesdropping on communications is to capture TCP/IP or other protocol packets and decode the contents using a protocol analyzer or similar utility . Two common uses of eavesdropping are as follows: Information gathering – Network intruders can identify usernames, passwords, or information carried in the packet such as credit card numbers or sensitive personal information. Information theft – Network eavesdropping can lead to information theft. The theft can occur as data is transmitted over the internal or external network. The network intruder can also steal data from networked computers by gaining unauthorized access. Examples include breaking into or eavesdropping on financial institutions and obtaining credit card numbers. Another example is using a computer to crack a password file. Tools Used to Perform Eavesdropping The following tools are used for eavesdropping: Network or protocol analyzers Packet capturing utilities on networked computers Methods to Counteract Attacks Three of the most effective methods for counteracting eavesdropping are as follows: Implementing and enforcing a policy directive that forbids the use of protocols with known susceptibilities to eavesdropping Using encryption that meets the data security needs of the organization without imposing an excessive burden on the system resources or the users Using switched networks Encrypted Data Encryption provides protection for data susceptible to eavesdropping attacks, password crackers, or manipulation. Some benefits of data encryption are as follows: Almost every company has transactions, which, if viewed by an eavesdropper, could have negative consequences. Encryption ensures that when sensitive data passes over a medium susceptible to eavesdropping, it cannot be altered or observed. Decryption is necessary when the data reaches the router or other termination device on the far receiving LAN where the destination host resides. By encrypting after the User Datagram Protocol (UDP) or Transmission Control Protocol (TCP) headers, so that only the IP payload data is encrypted, Cisco IOS network-layer encryption allows all intermediate routers and switches to forward the traffic as they would any other IP packets. Payload-only encryption allows flow switching and all access-list features to work with the encrypted traffic just as they would with plain text traffic, thereby preserving desired quality of service (QoS) for all data.
  16. <number>
  17. <number>
  18. <number>
  19. Access attacks exploit known vulnerabilities in authentication services, FTP services, and Web services to gain entry to Web accounts, confidential databases, and other sensitive information . Access attacks can consist of the following: Password Attacks Password attacks can be implemented using several methods, including brute-force attacks, Trojan horse programs, IP spoofing, and packet sniffers , . Although packet sniffers and IP spoofing can yield user accounts and passwords, password attacks usually refer to repeated attempts to identify a user account, password, or both. These repeated attempts are called brute force attacks. Often a brute-force attack is performed using a program that runs across the network and attempts to log in to a shared resource, such as a server. When an attacker gains access to a resource, he or she has the same access rights as the user whose account has been compromised. If this account has sufficient privileges, the attacker can create a back door for future access, without concern for any status and password changes to the compromised user account The following are the two methods for computing passwords: Dictionary cracking – The password hashes for all of the words in a dictionary file are computed and compared against all of the password hashes for the users. This method is extremely fast and finds very simple passwords. Brute-force computation – This method uses a particular character set, such as A to Z, or A to Z plus 0 to 9, and computes the hash for every possible password made up of those characters. It will always compute the password if that password is made up of the character set you have selected to test. The downside is that time is required for completion of this type of attack. Trust Exploitation Although it is more of a technique than a hack itself, trust exploitation refers to an attack in which an individual takes advantage of a trust relationship within a network , . The classic example is a perimeter network connection from a corporation. These network segments often house Domain Name System (DNS), Simple Mail Transfer Protocol (SMTP), and Hypertext Transfer Protocol (HTTP) servers. Because all these servers reside on the same segment, the compromise of one system can lead to the compromise of other systems because these systems usually trust other systems attached to the same network. Another example is a system on the outside of a firewall that has a trust relationship with a system on the inside of a firewall. When the outside system is compromised, it can take advantage of that trust relationship to attack the inside network. Another form of an access attack involves privilege escalation. Privilege escalation occurs when a user obtains privileges or rights to objects that were not assigned to the user by an administrator. Objects can be files, commands, or other components on a network device. The intent is to gain access to information or execute unauthorized procedures. This information will be used to gain administrative privileges to a system or device. They use these privileges to install sniffers, create backdoor accounts, or delete log files. Trust exploitation-based attacks can be mitigated through tight constraints on trust levels within a network. Systems on the outside of a firewall should never be absolutely trusted by systems on the inside of a firewall. Such trust should be limited to specific protocols and should be authenticated by something other than an IP address where possible Port Redirection Port redirection attacks are a type of trust exploitation attack that uses a compromised host to pass traffic through a firewall that would otherwise be dropped . Consider a firewall with three interfaces and a host on each interface. The host on the outside can reach the host on the public services segment, but not the host on the inside. This publicly accessible segment is commonly referred to as a Demilitarized Zone (DMZ). The host on the public services segment can reach the host on both the outside and the inside. If hackers were able to compromise the public services segment host, they could install software to redirect traffic from the outside host directly to the inside host. Though neither communication violates the rules implemented in the firewall, the outside host has now achieved connectivity to the inside host through the port redirection process on the public services host. An example of an application that can provide this type of access is netcat. Port redirection can be mitigated primarily through the use of proper trust models, which are network specific (as mentioned earlier). Assuming a system under attack, a host-based IDS can help detect a hacker and prevent installation of such utilities on a host. Man-in-the-middle Attack A man-in-the-middle attack requires that the hacker have access to network packets that come across a network. An example could be someone who is working for an Internet service provider (ISP) and has access to all network packets transferred between the ISP network and any other network. Such attacks are often implemented using network packet sniffers and routing and transport protocols. The possible uses of such attacks are theft of information, hijacking of an ongoing session to gain access to private network resources, traffic analysis to derive information about a network and its users, Denial of Service (DoS), corruption of transmitted data, and introduction of new information into network sessions. Man-in-the-middle attack mitigation is achieved by encrypting traffic in an IPSec tunnel, which would allow the hacker to see only cipher text. Social Engineering The easiest hack involves no computer skill at all. If an intruder can trick a member of an organization into giving over valuable information, such as locations of files, and servers, and passwords, then the process of hacking is made immeasurably easier. Phishing Phishing is a type of social engineering attack that involves using email or other types of messages in an attempt to trick others into providing sensitive information, such as credit card numbers or passwords. The phisher will masquerade as a trusted party that has a seemingly legitimate need for the sensitive information. Frequent phishing scams involve sending out spam emails that appear to be from common online banking or auction sites. These emails contain hyperlinks that appear to be legitimate, but will actually cause the user to visit a phony site set up by the phisher to capture their information. The site will appear to belong to the party that was faked in the email, and when the user enters their information it is recorded for the phisher to use.
  20. <number>
  21. DDoS attacks are designed to saturate network links with spurious data. This data can overwhelm an Internet link, causing legitimate traffic to be dropped. DDoS uses attack methods similar to standard DoS attacks but operates on a much larger scale. Typically hundreds or thousands of attack points attempt to overwhelm a target. Examples of DDoS attacks include the following: Smurf Tribe Flood Network (TFN) Stacheldraht SMURF Attack The Smurf attack starts with a perpetrator sending a large number of spoofed ICMP echo, or ping, requests to broadcast addresses, hoping that these packets will be magnified and sent to the spoofed addresses . If the routing device delivering traffic to those broadcast addresses performs the Layer 3 broadcast-to-Layer 2 broadcast function, most hosts on that IP network will each reply to the ICMP echo request with an ICMP echo reply, multiplying the traffic by the number of hosts responding. On a multi-access broadcast network, there could potentially be hundreds of machines replying to each echo packet. Assume the network has 100 hosts and that the attacker has a T1 link. The attacker sends a 768-kbps stream of ICMP echo, or ping packets, with a spoofed source address of the victim, to the broadcast address of the "bounce site". These ping packets hit the bounce site broadcast network of 100 hosts, and each of them takes the packet and responds to it, creating 100 outbound ping replies. A total of 76.8 megabits per second (Mbps) of bandwidth is used outbound from the bounce site after the traffic is multiplied. This is then sent to the victim, or the spoofed source of the originating packets. Turning off directed broadcast capability in the network infrastructure prevents the network from being used as a bounce site. Tribe Flood Network (TFN) Tribe Flood Network (TFN) and Tribe Flood Network 2000 (TFN2K) are distributed tools used to launch coordinated DoS attacks from many sources against one or more targets. A TFN attack has the capability to generate packets with spoofed source IP addresses. An intruder instructing a master to send attack instructions to a list of TFN servers or daemons carries out a DoS attack using a TFN network. The daemons then generate the specified type of DoS attack against one or more target IP addresses. Source IP addresses and source ports can be randomized, and packet sizes can be altered. Use of the TFN master requires an intruder-supplied list of IP addresses for the daemons. Stacheldraht Attack Stacheldraht, German for "barbed wire", combines features of several DoS attacks, including Tribe Flood Network (TFN). It also adds features such as encryption of communication between the attacker and stacheldraht masters, and automated update of the agents. There is an initial mass-intrusion phase, in which automated tools are used to remotely root-compromise large numbers of systems to be used in the attack. This is followed by a DoS attack phase, in which these compromised systems are used to attack one or more site
  22. <number>
  23. <number>
  24. <number>
  25. <number>
  26. The primary vulnerabilities for end-user workstations are worm, virus, and Trojan horse attacks . A worm executes arbitrary code and installs copies of itself in the infected computer’s memory, which infects other hosts. A virus is malicious software that is attached to another program to execute a particular unwanted function on a user's workstation. A Trojan horse is different only in that the entire application was written to look like something else, when in fact it is an attack tool. Worms The anatomy of a worm attack is as follows: The enabling vulnerability – A worm installs itself using an exploit vector on a vulnerable system. Propagation mechanism – After gaining access to devices, a worm replicates and selects new targets. Payload – Once the device is infected with a worm, the attacker has access to the host – often as a privileged user. Attackers could use a local exploit to escalate their privilege level to administrator. Typically, worms are self-contained programs that attack a system and try to exploit a specific vulnerability in the target. Upon successful exploitation of the vulnerability, the worm copies its program from the attacking host to the newly exploited system to begin the cycle again. A virus normally requires a vector to carry the virus code from one system to another. The vector can be a word-processing document, an e-mail message, or an executable program. The key element that distinguishes a computer worm from a computer virus is that human interaction is required to facilitate the spread of a virus. Worm attack mitigation requires diligence on the part of system and network administration staff. Coordination between system administration, network engineering, and security operations personnel is critical in responding effectively to a worm incident. The following are the recommended steps for worm attack mitigation: Containment Inoculation Quarantine Treatment Viruses and Trojan Horses Viruses are malicious software that is attached to another program to execute a particular unwanted function on a user’s workstation. An example of a virus is a program that is attached to command.com (the primary interpreter for Windows systems) that deletes certain files and infects any other versions of command.com that it can find. A Trojan horse is different only in that the entire application was written to look like something else, when in fact it is an attack tool . An example of a Trojan horse is a software application that runs a simple game on the user’s workstation. While the user is occupied with the game, the Trojan horse mails a copy of itself to every user in the user’s address book. The other users receive the game and then play it, thus spreading the Trojan horse. These kinds of applications can be contained through the effective use of antivirus software at the user level and potentially at the network level . Antivirus software can detect most viruses and many Trojan horse applications and prevent them from spreading in the network. Keeping up-to-date with the latest developments in these sorts of attacks can also lead to a more effective posture against these attacks. As new virus or Trojan applications are released, enterprises need to keep up-to-date with the latest antivirus software and application versions
  27. As a result of hacker exploits, the sophistication of hacker tools, and government legislation, network security solutions developed rapidly in the 1990s. By the late 1990s, many sophisticated network security solutions had been developed for organizations to strategically deploy within their networks. With these solutions came new job opportunities and increased compensation in the field of network security. The annual income for a network security professional is on the high end of the scale for careers in technology because of the depth and breadth of knowledge required. Network security professionals must constantly upgrade their skill set to keep abreast of the latest threats. The challenge of gaining and maintaining the necessary knowledge often translates into a shortage of network security professionals. Network security professionals are responsible for maintaining data assurance for an organization and ensuring the integrity and confidentiality of information. A network security professional might be responsible for setting up firewalls and intrusion prevention systems as well as ensuring encryption of company data. Implementing enterprise authentication schemes is another important task. The job entails maintaining detailed logs of suspicious activity on the network to use for reprimanding or prosecuting violators. As a network security professional, it is also important to maintain familiarity with network security organizations. These organizations often have the latest information on threats and vulnerabilities.
  28. The network security policy is a broad, end-to-end document designed to be clearly applicable to an organization's operations. The policy is used to aid in network design, convey security principles, and facilitate network deployments. The network security policy outlines rules for network access, determines how policies are enforced, and describes the basic architecture of the organization's network security environment. The document is generally several pages. Because of its breadth of coverage and impact, it is usually compiled by a committee. It is a complex document meant to govern items such as data access, web browsing, password usage, encryption, and email attachments. A security policy should keep ill-intentioned users out and have control over potentially risky users. When a policy is created, it must be understood first what services are available to which users. The network security policy establishes a hierarchy of access permissions, giving employees only the minimal access necessary to perform their work. The network security policy outlines what assets need to be protected and gives guidance on how it should be protected. This will then be used to determine the security devices and mitigation strategies and procedures that should be implemented on the network.