SlideShare a Scribd company logo
Chapter 4
Securing Your
Network
CompTIA Security+
Get Certified Get Ahead
1
Introduction
• Exploring advanced security
devices
• Securing wireless networks
• Understanding wireless attacks
• Using VPNs for remote access
Understanding
IDSs and IPSs
• Intrusion Detection System (IDS)
– Detective control
– Attempts to detect attacks after
they occur
• Firewall is a preventive control
– Attempts to prevent the attacks
before they occur.
• Intrusion Prevent System (IPS)
– A preventive control
– Will stop an attack in progress.
Packet Sniffing
• Also called protocol analyzer
• Captures and analyzes network
traffic
• Wireshark – free packet sniffer
• IDSs and IPSs include packet
sniffing capabilities
Host- and
Network-
Based IDS
• Additional software on a
workstation or server
• Can detect attacks on the local
system
• Protects local resources on the
host such as operating system
files
• Cannot monitor network traffic
HIDS
Host- and
Network-
Based IDS
• Installed on network devices,
such as routers or firewalls
• Monitors network traffic
• Can detect network-based
attacks such as smurf attacks
• Cannot monitor encrypted
traffic and cannot monitor
traffic on individual hosts.
NIDS
Sensor and
Collector
Placement
IDS Detection
Methods
• Also called definition-based
• Use a database of predefined
traffic patterns (such as CVE list)
• Keep signature files up-to-date
• Most basic form of detection
• Easiest to implement
Signature-based
Heuristic-, behavior-based
• Also called anomaly-based
• Starts with a performance baseline of
normal behavior
• IDS compares activity against this
baseline
• Alerts on traffic anomalies
• Update the baseline if the
environment changes
IDS
Considerations
• Data sources and trends
• Reporting
• IDS thresholds
• False positives
• Increase administrator’s
workload
• False negatives
• No report during an incident
IDS Responses
Passive
• Notifies
– Pop-up window
– Central monitor
– E-mail
– Page
– Text message
Active
• Notifies
• Modifies environment
– Modify ACLs
– Close processes
– Divert the attack
Counterattacks
• Don’t do it
– Attackers are dedicated
– Attackers have unlimited time
IDS vs IPS
• IPS is a preventive control
– Can actively monitor data streams
– Can detect malicious content
– Can stop attacks in progress
• IPS is placed in line with traffic
– IDS is out-of-band
SSL/TLS Tools
• SSL/TLS accelerators
– Offloads encryption services to
another hardware device
– Place close server needing the
service
• SSL decryptors
– Placed in DMZ between users and
Internet
– Allows inspection of content
Other Tools
• Honeypots and Honeynets
– Used to divert an attacker
– Allow IT administrators an opportunity
to observe methodologies
– Can be useful to observe zero day
exploits
• 802.1x port security
– Provides port-based authentication
– Prevents rogue devices from connecting
Securing
Wireless
Networks
• WAPS and wireless routers
– All wireless routers are WAPs
– Not all WAPs are wireless routers
Wireless Routers
Fat vs Thin APs
• Fat AP
– Also known as stand-alone, intelligent,
or autonomous AP
– Includes everything needed to run
wireless network
• Thin AP
– Controller-based AP
Band Selection
and Channel
Widths
Access Point
SSID
• Network name
• Change default SSID
• Disabling SSID broadcast
– Hides from some devices
– Does not hide from attackers
MAC Filtering
Wireless
Antennas
• Antenna types and placement
• Wireless power and signal strength
Network
Architecture
and Zones
• Wireless
– Provides wireless devices access to
wired networks
• Guest
– Typically provides Internet access to
guests
– Rarely gives access to network
resources
• Ad hoc
– Network between two or more wireless
networks
– As needed
Wireless
Cryptographic
Protocols
• WPA – Interim replacement for
WEP
– Deprecated
• WPA2 – Current standard
– Provides best security when used with
CCMP
• TKIP
– Older encryption protocol used with
WPA
• CCMP
– Based on AES
– Recommended to be used with WPA2
Wireless
Settings
PSK vs Open
Enterprise
Mode
• Adds strong authentication
• Uses an 802.1X server
(implemented as a RADIUS server)
to add authentication
– RADIUS server
– RADIUS port
– Shared secret
• Similar to a password
Enterprise Mode
Authentication
Protocols
• EAP-TLS
– Most secure (compared to other EAP
methods)
– Provides mutual authentication
– Requires certificate on 802.1x server
– Requires certificate on the clients
• EAP
– Uses pairwise master key
• EAP-FAST
– Replaced LEAP
• PEAP
– Requires certificate on server
• EAP-TTLS
– Requires certificate on 802.1x server
Wireless
• RADIUS federation
– Provides single sign-on for two or more
entities
– Federation includes multiple 802.1x
servers
– Can use any of the EAP versions
• Captive Portals
– Free Internet access
– Paid Internet access
– Alternative to IEEE 802.1x
Wireless
Attacks
• Disassociation attack
– Removes a wireless client from a
wireless network
• WPS
– Streamlines process of configuring
wireless clients
• WPS attack
– Brute force method to discover WPS PIN
– Reaver
Wireless
Attacks
• Rogue access points
– Unauthorized AP
• Evil twins
– Rogue AP with same SSID as legitimate
AP
• Jamming attack
– Broadcasts noise or other signals on
same frequency
Wireless
Attacks
• IV attack
– Attempts to discover PSK from the IV
• NFC attack
– Uses an NFC reader to capture data
Bluetooth
Wireless
• Bluejacking
– Unauthorized sending of text messages
from a Bluetooth device
• Bluesnarfing
– Unauthorized access to or theft of
information from a Bluetooth device
• Bluebugging
– Allows an attacker to take over a mobile
phone
Wireless
Attacks
• Wireless replay attacks
– Captures data
– Attempts to use to impersonate client
• RFID attacks
– Sniffing or eavesdropping
– Replay
– DoS
Misconfigured
Access Points
• Use WPA2 with CCMP
• Disable WPS
Exploring
Remote Access
VPNs and VPN concentrators
VPN Tunnel
Comparisons
• Split tunnel
– Encrypts only some traffic (such as traffic
going to private network)
• Full tunnel
– Encrypts all traffic from client
– Can route client traffic through UTM in
private network for monitoring and
protection
Site-to-Site
VPNs
• Gateways as VPN servers
Always-On
VPNs
• Site-to-site VPNs
• Regular VPNs for users
• Mobile devices
Network
Access Control
• Health agents
– Inspects clients for predefined conditions
– Restricts access of unhealthy clients to a
remediation network
– Used for VPN clients
and internal clients
NAC Agents
• Permanent
– Installed on client and remains on client
– Persistent NAC agent
• Dissolvable
– Does not stay on client
– Downloaded to client when session starts
– Removed during or after session
– Commonly used for mobile devices
Identity and
Access
Services
• PAP – Sends passwords in cleartext
• CHAP – uses shared secret
• MS-CHAP – replaced by MS-CHAPv2
• MS-CHAPv2 – provides mutual
authentication
Identity and
Access
Services
• RADIUS
Identity and
Access
Services
• TACACS+
– Cisco alternative to RADIUS
– Uses TCP port 49
– Encrypts entire authentication process
– Uses multiple challenges and responses
• Diameter
– Extension of RADIUS
– Supports EAP
AAA Protocols
• Provide authentication,
authorization, and accounting
– Authentication verifies a user’s
identification
– Authorization provides access
– Accounting tracks user access with logs
Chapter 4
Summary
• Exploring advanced security devices
• Securing wireless networks
• Understanding wireless attacks
• Using VPNs for remote access

More Related Content

What's hot

gkkCloudtechnologyassociate(cta)day 1
gkkCloudtechnologyassociate(cta)day 1gkkCloudtechnologyassociate(cta)day 1
gkkCloudtechnologyassociate(cta)day 1
Anne Starr
 
01. 03.-introduction-to-infrastructure
01. 03.-introduction-to-infrastructure01. 03.-introduction-to-infrastructure
01. 03.-introduction-to-infrastructure
Muhammad Ahad
 
05. performance-concepts-26-slides
05. performance-concepts-26-slides05. performance-concepts-26-slides
05. performance-concepts-26-slides
Muhammad Ahad
 
39245175 intro-es-ii
39245175 intro-es-ii39245175 intro-es-ii
39245175 intro-es-ii
Embeddedbvp
 
ETS Services Outline
ETS Services OutlineETS Services Outline
ETS Services Outline
Tony DeGonia (LION)
 
Fundamentals of Servers, server storage and server security.
Fundamentals of Servers, server storage and server security.Fundamentals of Servers, server storage and server security.
Fundamentals of Servers, server storage and server security.
Aakash Panchal
 
Cincinnati window shade technology overview
Cincinnati window shade technology overviewCincinnati window shade technology overview
Cincinnati window shade technology overview
rippea
 
Analyzing Kernel Security and Approaches for Improving it
Analyzing Kernel Security and Approaches for Improving itAnalyzing Kernel Security and Approaches for Improving it
Analyzing Kernel Security and Approaches for Improving it
Milan Rajpara
 
10. compute-part-2
10. compute-part-210. compute-part-2
10. compute-part-2
Muhammad Ahad
 
Kernel security Concepts
Kernel security ConceptsKernel security Concepts
Kernel security Concepts
Mohit Saxena
 
B sep ds-21194634.en-us
B sep ds-21194634.en-usB sep ds-21194634.en-us
B sep ds-21194634.en-us
Pelos TCHIKAYA
 
Kernel security of Systems
Kernel security of SystemsKernel security of Systems
Kernel security of Systems
Jamal Jamali
 
Cisco Standard Network Platform (SNP) - Catholic Relief Services Case Study
Cisco Standard Network Platform (SNP) - Catholic Relief Services Case StudyCisco Standard Network Platform (SNP) - Catholic Relief Services Case Study
Cisco Standard Network Platform (SNP) - Catholic Relief Services Case Study
nicholas njoroge
 
04. availability-concepts
04. availability-concepts04. availability-concepts
04. availability-concepts
Muhammad Ahad
 
CNIT 121: 8 Forensic Duplication
CNIT 121: 8 Forensic DuplicationCNIT 121: 8 Forensic Duplication
CNIT 121: 8 Forensic Duplication
Sam Bowne
 
09. storage-part-1
09. storage-part-109. storage-part-1
09. storage-part-1
Muhammad Ahad
 
Network_Intrusion_Detection_System_Team1
Network_Intrusion_Detection_System_Team1Network_Intrusion_Detection_System_Team1
Network_Intrusion_Detection_System_Team1
Saksham Agrawal
 
Security for io t apr 29th mentor embedded hangout
Security for io t apr 29th mentor embedded hangoutSecurity for io t apr 29th mentor embedded hangout
Security for io t apr 29th mentor embedded hangout
mentoresd
 
IT Network Asset Discovery & Inventory
IT Network Asset Discovery & InventoryIT Network Asset Discovery & Inventory
IT Network Asset Discovery & Inventory
ikirmer
 
Firewall
FirewallFirewall
Firewall
Tapan Khilar
 

What's hot (20)

gkkCloudtechnologyassociate(cta)day 1
gkkCloudtechnologyassociate(cta)day 1gkkCloudtechnologyassociate(cta)day 1
gkkCloudtechnologyassociate(cta)day 1
 
01. 03.-introduction-to-infrastructure
01. 03.-introduction-to-infrastructure01. 03.-introduction-to-infrastructure
01. 03.-introduction-to-infrastructure
 
05. performance-concepts-26-slides
05. performance-concepts-26-slides05. performance-concepts-26-slides
05. performance-concepts-26-slides
 
39245175 intro-es-ii
39245175 intro-es-ii39245175 intro-es-ii
39245175 intro-es-ii
 
ETS Services Outline
ETS Services OutlineETS Services Outline
ETS Services Outline
 
Fundamentals of Servers, server storage and server security.
Fundamentals of Servers, server storage and server security.Fundamentals of Servers, server storage and server security.
Fundamentals of Servers, server storage and server security.
 
Cincinnati window shade technology overview
Cincinnati window shade technology overviewCincinnati window shade technology overview
Cincinnati window shade technology overview
 
Analyzing Kernel Security and Approaches for Improving it
Analyzing Kernel Security and Approaches for Improving itAnalyzing Kernel Security and Approaches for Improving it
Analyzing Kernel Security and Approaches for Improving it
 
10. compute-part-2
10. compute-part-210. compute-part-2
10. compute-part-2
 
Kernel security Concepts
Kernel security ConceptsKernel security Concepts
Kernel security Concepts
 
B sep ds-21194634.en-us
B sep ds-21194634.en-usB sep ds-21194634.en-us
B sep ds-21194634.en-us
 
Kernel security of Systems
Kernel security of SystemsKernel security of Systems
Kernel security of Systems
 
Cisco Standard Network Platform (SNP) - Catholic Relief Services Case Study
Cisco Standard Network Platform (SNP) - Catholic Relief Services Case StudyCisco Standard Network Platform (SNP) - Catholic Relief Services Case Study
Cisco Standard Network Platform (SNP) - Catholic Relief Services Case Study
 
04. availability-concepts
04. availability-concepts04. availability-concepts
04. availability-concepts
 
CNIT 121: 8 Forensic Duplication
CNIT 121: 8 Forensic DuplicationCNIT 121: 8 Forensic Duplication
CNIT 121: 8 Forensic Duplication
 
09. storage-part-1
09. storage-part-109. storage-part-1
09. storage-part-1
 
Network_Intrusion_Detection_System_Team1
Network_Intrusion_Detection_System_Team1Network_Intrusion_Detection_System_Team1
Network_Intrusion_Detection_System_Team1
 
Security for io t apr 29th mentor embedded hangout
Security for io t apr 29th mentor embedded hangoutSecurity for io t apr 29th mentor embedded hangout
Security for io t apr 29th mentor embedded hangout
 
IT Network Asset Discovery & Inventory
IT Network Asset Discovery & InventoryIT Network Asset Discovery & Inventory
IT Network Asset Discovery & Inventory
 
Firewall
FirewallFirewall
Firewall
 

Similar to 501 ch 4 securing your network

Telecommunications and Network Security Presentation
Telecommunications and Network Security PresentationTelecommunications and Network Security Presentation
Telecommunications and Network Security Presentation
Wajahat Rajab
 
Attacking and Securing WPA Enterprise Networks
Attacking and Securing WPA Enterprise NetworksAttacking and Securing WPA Enterprise Networks
Attacking and Securing WPA Enterprise Networks
Northeast Ohio Information Security Forum
 
Unit08
Unit08Unit08
Chapter08
Chapter08Chapter08
Chapter08
Muhammad Ahad
 
Unit 5.ppt
Unit 5.pptUnit 5.ppt
PLNOG 8: Merike Kaeo - Guide to Building Secure Infrastructures
PLNOG 8: Merike Kaeo -  Guide to Building Secure InfrastructuresPLNOG 8: Merike Kaeo -  Guide to Building Secure Infrastructures
PLNOG 8: Merike Kaeo - Guide to Building Secure Infrastructures
PROIDEA
 
08. networking-part-2
08. networking-part-208. networking-part-2
08. networking-part-2
Muhammad Ahad
 
Material best practices in network security using ethical hacking
Material best practices in network security using ethical hackingMaterial best practices in network security using ethical hacking
Material best practices in network security using ethical hacking
Desmond Devendran
 
Network security and protocols
Network security and protocolsNetwork security and protocols
Network security and protocols
Online
 
Ccna sec 01
Ccna sec 01Ccna sec 01
Ccna sec 01
EduclentMegasoftel
 
Network sec 1
Network sec 1Network sec 1
Network sec 1
Jasleen Kaur
 
Enterprise Network Monitoring Software by ServicePilot
Enterprise Network Monitoring Software by ServicePilotEnterprise Network Monitoring Software by ServicePilot
Enterprise Network Monitoring Software by ServicePilot
ServicePilot
 
98 366 mva slides lesson 8
98 366 mva slides lesson 898 366 mva slides lesson 8
98 366 mva slides lesson 8
suddenven
 
MVA slides lesson 8
MVA slides lesson 8MVA slides lesson 8
Airheads barcelona 2010 securing wireless la ns
Airheads barcelona 2010   securing wireless la nsAirheads barcelona 2010   securing wireless la ns
Airheads barcelona 2010 securing wireless la ns
Aruba, a Hewlett Packard Enterprise company
 
Virtual Private Networks
Virtual Private NetworksVirtual Private Networks
Virtual Private Networks
primeteacher32
 
501 ch 3 network technologies tools
501 ch 3 network technologies tools501 ch 3 network technologies tools
501 ch 3 network technologies tools
gocybersec
 
Introduction to firewalls
Introduction to firewallsIntroduction to firewalls
Introduction to firewalls
Divya Jyoti
 
Ch 13: Network Protection Systems
Ch 13: Network Protection SystemsCh 13: Network Protection Systems
Ch 13: Network Protection Systems
Sam Bowne
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Network
Greater Noida Institute Of Technology
 

Similar to 501 ch 4 securing your network (20)

Telecommunications and Network Security Presentation
Telecommunications and Network Security PresentationTelecommunications and Network Security Presentation
Telecommunications and Network Security Presentation
 
Attacking and Securing WPA Enterprise Networks
Attacking and Securing WPA Enterprise NetworksAttacking and Securing WPA Enterprise Networks
Attacking and Securing WPA Enterprise Networks
 
Unit08
Unit08Unit08
Unit08
 
Chapter08
Chapter08Chapter08
Chapter08
 
Unit 5.ppt
Unit 5.pptUnit 5.ppt
Unit 5.ppt
 
PLNOG 8: Merike Kaeo - Guide to Building Secure Infrastructures
PLNOG 8: Merike Kaeo -  Guide to Building Secure InfrastructuresPLNOG 8: Merike Kaeo -  Guide to Building Secure Infrastructures
PLNOG 8: Merike Kaeo - Guide to Building Secure Infrastructures
 
08. networking-part-2
08. networking-part-208. networking-part-2
08. networking-part-2
 
Material best practices in network security using ethical hacking
Material best practices in network security using ethical hackingMaterial best practices in network security using ethical hacking
Material best practices in network security using ethical hacking
 
Network security and protocols
Network security and protocolsNetwork security and protocols
Network security and protocols
 
Ccna sec 01
Ccna sec 01Ccna sec 01
Ccna sec 01
 
Network sec 1
Network sec 1Network sec 1
Network sec 1
 
Enterprise Network Monitoring Software by ServicePilot
Enterprise Network Monitoring Software by ServicePilotEnterprise Network Monitoring Software by ServicePilot
Enterprise Network Monitoring Software by ServicePilot
 
98 366 mva slides lesson 8
98 366 mva slides lesson 898 366 mva slides lesson 8
98 366 mva slides lesson 8
 
MVA slides lesson 8
MVA slides lesson 8MVA slides lesson 8
MVA slides lesson 8
 
Airheads barcelona 2010 securing wireless la ns
Airheads barcelona 2010   securing wireless la nsAirheads barcelona 2010   securing wireless la ns
Airheads barcelona 2010 securing wireless la ns
 
Virtual Private Networks
Virtual Private NetworksVirtual Private Networks
Virtual Private Networks
 
501 ch 3 network technologies tools
501 ch 3 network technologies tools501 ch 3 network technologies tools
501 ch 3 network technologies tools
 
Introduction to firewalls
Introduction to firewallsIntroduction to firewalls
Introduction to firewalls
 
Ch 13: Network Protection Systems
Ch 13: Network Protection SystemsCh 13: Network Protection Systems
Ch 13: Network Protection Systems
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Network
 

More from gocybersec

501 ch 3 network technologies and tools
501 ch 3 network technologies and tools501 ch 3 network technologies and tools
501 ch 3 network technologies and tools
gocybersec
 
501 ch 10 understanding cryptography and pki
501 ch 10 understanding cryptography and pki501 ch 10 understanding cryptography and pki
501 ch 10 understanding cryptography and pki
gocybersec
 
501 ch 9 implementing controls to protect assets
501 ch 9 implementing controls to protect assets501 ch 9 implementing controls to protect assets
501 ch 9 implementing controls to protect assets
gocybersec
 
501 ch 8 risk managment tool
501 ch 8 risk managment tool501 ch 8 risk managment tool
501 ch 8 risk managment tool
gocybersec
 
501 ch 7 protecting against advanced attacks
501 ch 7 protecting against advanced attacks501 ch 7 protecting against advanced attacks
501 ch 7 protecting against advanced attacks
gocybersec
 
501 ch 6 threats vulnerabilities and common attacks
501 ch 6 threats vulnerabilities and common attacks501 ch 6 threats vulnerabilities and common attacks
501 ch 6 threats vulnerabilities and common attacks
gocybersec
 
501 ch 5 securing hosts and data
501 ch 5 securing hosts and data501 ch 5 securing hosts and data
501 ch 5 securing hosts and data
gocybersec
 
501 ch 4 securing your network
501 ch 4 securing your network501 ch 4 securing your network
501 ch 4 securing your network
gocybersec
 
501 ch 3 network technologies tools
501 ch 3 network technologies tools501 ch 3 network technologies tools
501 ch 3 network technologies tools
gocybersec
 
501 ch 2 understanding iam
501 ch 2 understanding iam501 ch 2 understanding iam
501 ch 2 understanding iam
gocybersec
 
501 ch 1 mastering security basics
501 ch 1 mastering security basics501 ch 1 mastering security basics
501 ch 1 mastering security basics
gocybersec
 
501 ch 7 advanced attacks
501 ch 7 advanced attacks501 ch 7 advanced attacks
501 ch 7 advanced attacks
gocybersec
 
501 ch 11 operational security
501 ch 11 operational security501 ch 11 operational security
501 ch 11 operational security
gocybersec
 
501 ch 9 implementing controls
501 ch 9 implementing controls501 ch 9 implementing controls
501 ch 9 implementing controls
gocybersec
 
501 ch 8 risk management tools
501 ch 8 risk management tools501 ch 8 risk management tools
501 ch 8 risk management tools
gocybersec
 
501 ch 6 threats vulnerabilities attacks
501 ch 6 threats vulnerabilities attacks501 ch 6 threats vulnerabilities attacks
501 ch 6 threats vulnerabilities attacks
gocybersec
 
501 ch 7 advanced attacks
501 ch 7 advanced attacks501 ch 7 advanced attacks
501 ch 7 advanced attacks
gocybersec
 
501 ch 2 understanding iam
501 ch 2 understanding iam501 ch 2 understanding iam
501 ch 2 understanding iam
gocybersec
 
501 ch-1-mastering-security-basics
501 ch-1-mastering-security-basics501 ch-1-mastering-security-basics
501 ch-1-mastering-security-basics
gocybersec
 

More from gocybersec (19)

501 ch 3 network technologies and tools
501 ch 3 network technologies and tools501 ch 3 network technologies and tools
501 ch 3 network technologies and tools
 
501 ch 10 understanding cryptography and pki
501 ch 10 understanding cryptography and pki501 ch 10 understanding cryptography and pki
501 ch 10 understanding cryptography and pki
 
501 ch 9 implementing controls to protect assets
501 ch 9 implementing controls to protect assets501 ch 9 implementing controls to protect assets
501 ch 9 implementing controls to protect assets
 
501 ch 8 risk managment tool
501 ch 8 risk managment tool501 ch 8 risk managment tool
501 ch 8 risk managment tool
 
501 ch 7 protecting against advanced attacks
501 ch 7 protecting against advanced attacks501 ch 7 protecting against advanced attacks
501 ch 7 protecting against advanced attacks
 
501 ch 6 threats vulnerabilities and common attacks
501 ch 6 threats vulnerabilities and common attacks501 ch 6 threats vulnerabilities and common attacks
501 ch 6 threats vulnerabilities and common attacks
 
501 ch 5 securing hosts and data
501 ch 5 securing hosts and data501 ch 5 securing hosts and data
501 ch 5 securing hosts and data
 
501 ch 4 securing your network
501 ch 4 securing your network501 ch 4 securing your network
501 ch 4 securing your network
 
501 ch 3 network technologies tools
501 ch 3 network technologies tools501 ch 3 network technologies tools
501 ch 3 network technologies tools
 
501 ch 2 understanding iam
501 ch 2 understanding iam501 ch 2 understanding iam
501 ch 2 understanding iam
 
501 ch 1 mastering security basics
501 ch 1 mastering security basics501 ch 1 mastering security basics
501 ch 1 mastering security basics
 
501 ch 7 advanced attacks
501 ch 7 advanced attacks501 ch 7 advanced attacks
501 ch 7 advanced attacks
 
501 ch 11 operational security
501 ch 11 operational security501 ch 11 operational security
501 ch 11 operational security
 
501 ch 9 implementing controls
501 ch 9 implementing controls501 ch 9 implementing controls
501 ch 9 implementing controls
 
501 ch 8 risk management tools
501 ch 8 risk management tools501 ch 8 risk management tools
501 ch 8 risk management tools
 
501 ch 6 threats vulnerabilities attacks
501 ch 6 threats vulnerabilities attacks501 ch 6 threats vulnerabilities attacks
501 ch 6 threats vulnerabilities attacks
 
501 ch 7 advanced attacks
501 ch 7 advanced attacks501 ch 7 advanced attacks
501 ch 7 advanced attacks
 
501 ch 2 understanding iam
501 ch 2 understanding iam501 ch 2 understanding iam
501 ch 2 understanding iam
 
501 ch-1-mastering-security-basics
501 ch-1-mastering-security-basics501 ch-1-mastering-security-basics
501 ch-1-mastering-security-basics
 

Recently uploaded

Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Dr. Vinod Kumar Kanvaria
 
PIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf IslamabadPIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf Islamabad
AyyanKhan40
 
Pride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School DistrictPride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School District
David Douglas School District
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
camakaiclarkmusic
 
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
National Information Standards Organization (NISO)
 
Types of Herbal Cosmetics its standardization.
Types of Herbal Cosmetics its standardization.Types of Herbal Cosmetics its standardization.
Types of Herbal Cosmetics its standardization.
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
TechSoup
 
The Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collectionThe Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collection
Israel Genealogy Research Association
 
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat  Leveraging AI for Diversity, Equity, and InclusionExecutive Directors Chat  Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
TechSoup
 
How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17
Celine George
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
thanhdowork
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
tarandeep35
 
Main Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docxMain Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docx
adhitya5119
 
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective UpskillingYour Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Excellence Foundation for South Sudan
 
How to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP ModuleHow to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP Module
Celine George
 
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
PECB
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
Nguyen Thanh Tu Collection
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
Peter Windle
 
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdfবাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
eBook.com.bd (প্রয়োজনীয় বাংলা বই)
 

Recently uploaded (20)

Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
 
PIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf IslamabadPIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf Islamabad
 
Pride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School DistrictPride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School District
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
 
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
 
Types of Herbal Cosmetics its standardization.
Types of Herbal Cosmetics its standardization.Types of Herbal Cosmetics its standardization.
Types of Herbal Cosmetics its standardization.
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
 
The Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collectionThe Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collection
 
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat  Leveraging AI for Diversity, Equity, and InclusionExecutive Directors Chat  Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
 
How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
 
Main Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docxMain Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docx
 
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective UpskillingYour Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective Upskilling
 
How to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP ModuleHow to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP Module
 
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
 
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdfবাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
 

501 ch 4 securing your network

  • 1. Chapter 4 Securing Your Network CompTIA Security+ Get Certified Get Ahead 1
  • 2. Introduction • Exploring advanced security devices • Securing wireless networks • Understanding wireless attacks • Using VPNs for remote access
  • 3. Understanding IDSs and IPSs • Intrusion Detection System (IDS) – Detective control – Attempts to detect attacks after they occur • Firewall is a preventive control – Attempts to prevent the attacks before they occur. • Intrusion Prevent System (IPS) – A preventive control – Will stop an attack in progress.
  • 4. Packet Sniffing • Also called protocol analyzer • Captures and analyzes network traffic • Wireshark – free packet sniffer • IDSs and IPSs include packet sniffing capabilities
  • 5. Host- and Network- Based IDS • Additional software on a workstation or server • Can detect attacks on the local system • Protects local resources on the host such as operating system files • Cannot monitor network traffic HIDS
  • 6. Host- and Network- Based IDS • Installed on network devices, such as routers or firewalls • Monitors network traffic • Can detect network-based attacks such as smurf attacks • Cannot monitor encrypted traffic and cannot monitor traffic on individual hosts. NIDS
  • 8. IDS Detection Methods • Also called definition-based • Use a database of predefined traffic patterns (such as CVE list) • Keep signature files up-to-date • Most basic form of detection • Easiest to implement Signature-based Heuristic-, behavior-based • Also called anomaly-based • Starts with a performance baseline of normal behavior • IDS compares activity against this baseline • Alerts on traffic anomalies • Update the baseline if the environment changes
  • 9. IDS Considerations • Data sources and trends • Reporting • IDS thresholds • False positives • Increase administrator’s workload • False negatives • No report during an incident
  • 10. IDS Responses Passive • Notifies – Pop-up window – Central monitor – E-mail – Page – Text message Active • Notifies • Modifies environment – Modify ACLs – Close processes – Divert the attack Counterattacks • Don’t do it – Attackers are dedicated – Attackers have unlimited time
  • 11. IDS vs IPS • IPS is a preventive control – Can actively monitor data streams – Can detect malicious content – Can stop attacks in progress • IPS is placed in line with traffic – IDS is out-of-band
  • 12. SSL/TLS Tools • SSL/TLS accelerators – Offloads encryption services to another hardware device – Place close server needing the service • SSL decryptors – Placed in DMZ between users and Internet – Allows inspection of content
  • 13. Other Tools • Honeypots and Honeynets – Used to divert an attacker – Allow IT administrators an opportunity to observe methodologies – Can be useful to observe zero day exploits • 802.1x port security – Provides port-based authentication – Prevents rogue devices from connecting
  • 14. Securing Wireless Networks • WAPS and wireless routers – All wireless routers are WAPs – Not all WAPs are wireless routers
  • 16. Fat vs Thin APs • Fat AP – Also known as stand-alone, intelligent, or autonomous AP – Includes everything needed to run wireless network • Thin AP – Controller-based AP
  • 18. Access Point SSID • Network name • Change default SSID • Disabling SSID broadcast – Hides from some devices – Does not hide from attackers
  • 20. Wireless Antennas • Antenna types and placement • Wireless power and signal strength
  • 21. Network Architecture and Zones • Wireless – Provides wireless devices access to wired networks • Guest – Typically provides Internet access to guests – Rarely gives access to network resources • Ad hoc – Network between two or more wireless networks – As needed
  • 22. Wireless Cryptographic Protocols • WPA – Interim replacement for WEP – Deprecated • WPA2 – Current standard – Provides best security when used with CCMP • TKIP – Older encryption protocol used with WPA • CCMP – Based on AES – Recommended to be used with WPA2
  • 24. Enterprise Mode • Adds strong authentication • Uses an 802.1X server (implemented as a RADIUS server) to add authentication – RADIUS server – RADIUS port – Shared secret • Similar to a password
  • 26. Authentication Protocols • EAP-TLS – Most secure (compared to other EAP methods) – Provides mutual authentication – Requires certificate on 802.1x server – Requires certificate on the clients • EAP – Uses pairwise master key • EAP-FAST – Replaced LEAP • PEAP – Requires certificate on server • EAP-TTLS – Requires certificate on 802.1x server
  • 27. Wireless • RADIUS federation – Provides single sign-on for two or more entities – Federation includes multiple 802.1x servers – Can use any of the EAP versions • Captive Portals – Free Internet access – Paid Internet access – Alternative to IEEE 802.1x
  • 28. Wireless Attacks • Disassociation attack – Removes a wireless client from a wireless network • WPS – Streamlines process of configuring wireless clients • WPS attack – Brute force method to discover WPS PIN – Reaver
  • 29. Wireless Attacks • Rogue access points – Unauthorized AP • Evil twins – Rogue AP with same SSID as legitimate AP • Jamming attack – Broadcasts noise or other signals on same frequency
  • 30. Wireless Attacks • IV attack – Attempts to discover PSK from the IV • NFC attack – Uses an NFC reader to capture data
  • 31. Bluetooth Wireless • Bluejacking – Unauthorized sending of text messages from a Bluetooth device • Bluesnarfing – Unauthorized access to or theft of information from a Bluetooth device • Bluebugging – Allows an attacker to take over a mobile phone
  • 32. Wireless Attacks • Wireless replay attacks – Captures data – Attempts to use to impersonate client • RFID attacks – Sniffing or eavesdropping – Replay – DoS
  • 33. Misconfigured Access Points • Use WPA2 with CCMP • Disable WPS
  • 34. Exploring Remote Access VPNs and VPN concentrators
  • 35. VPN Tunnel Comparisons • Split tunnel – Encrypts only some traffic (such as traffic going to private network) • Full tunnel – Encrypts all traffic from client – Can route client traffic through UTM in private network for monitoring and protection
  • 37. Always-On VPNs • Site-to-site VPNs • Regular VPNs for users • Mobile devices
  • 38. Network Access Control • Health agents – Inspects clients for predefined conditions – Restricts access of unhealthy clients to a remediation network – Used for VPN clients and internal clients
  • 39. NAC Agents • Permanent – Installed on client and remains on client – Persistent NAC agent • Dissolvable – Does not stay on client – Downloaded to client when session starts – Removed during or after session – Commonly used for mobile devices
  • 40. Identity and Access Services • PAP – Sends passwords in cleartext • CHAP – uses shared secret • MS-CHAP – replaced by MS-CHAPv2 • MS-CHAPv2 – provides mutual authentication
  • 42. Identity and Access Services • TACACS+ – Cisco alternative to RADIUS – Uses TCP port 49 – Encrypts entire authentication process – Uses multiple challenges and responses • Diameter – Extension of RADIUS – Supports EAP
  • 43. AAA Protocols • Provide authentication, authorization, and accounting – Authentication verifies a user’s identification – Authorization provides access – Accounting tracks user access with logs
  • 44. Chapter 4 Summary • Exploring advanced security devices • Securing wireless networks • Understanding wireless attacks • Using VPNs for remote access