SlideShare a Scribd company logo
01- Fundamentals of Network Security 
Ahmed Sultan 
CCNA | CCNA Security | CCNP Security | JNCIA-Junos | CEH 
© 2009 Cisco Learning Institute. 1
What is Network Security? 
National Security Telecommunications and 
Information Systems Security Committee (NSTISSC) 
Network security is the protection of information and 
systems and hardware that use, store, and transmit that 
information. 
Network security encompasses those steps that are taken 
to ensure the confidentiality, integrity, and availability of 
data or resources. 
© 2009 Cisco Learning Institute. 2
Rationale for Network Security 
Network security initiatives and network security 
specialists can be found in private and public, large and 
small companies and organizations. The need for network 
security and its growth are driven by many factors: 
1. Internet connectivity is 24/7 and is worldwide 
2. Increase in cyber crime 
3. Impact on business and individuals 
4. Legislation & liabilities 
5. Proliferation of threats 
6. Sophistication of threats 
© 2009 Cisco Learning Institute. 3
Cyber Crime 
• Fraud/Scams 
• Identity Theft 
• Child Pornography 
• Theft of Telecommunications Services 
• Electronic Vandalism, Terrorism and Extortion 
WASHINGTON, D.C. –– An estimated 
3.6 million households, or about 3 
percent of all households in the nation, 
learned that they had been the victim of 
at least one type of identity theft during 
a six-month period in 2004, according 
to the Justice Department’s Bureau of 
Justice Statistics 
© 2009 Cisco Learning Institute. 4
Business Impact 
1. Decrease in productivity 
2. Loss of sales revenue 
3. Release of unauthorized sensitive data 
4. Threat of trade secrets or formulas 
5. Compromise of reputation and trust 
6. Loss of communications 
7. Threat to environmental and safety systems 
8. Loss of time 
© 2009 Cisco Learning Institute. 5
Proliferation of Threats 
In 2001, the National Infrastructure Protection Center at the FBI 
released a document summarizing the 
Ten Most Critical Internet Security Vulnerabilities. 
Since that time, thousands of organizations rely on this list to 
prioritize their efforts so they can close the most dangerous holes 
first. 
The threat landscape is very 
dynamic, which in turn makes it 
necessary to adopt newer 
security measures. 
Just over the last few years, the 
kinds of vulnerabilities that are 
being exploited are very different 
from the ones being exploited in 
the past. 
© 2009 Cisco Learning Institute. 6
Sophistication of Threats 
© 2009 Cisco Learning Institute. 7
Legislation 
Federal and local government has passed legislation that 
holds organizations and individuals liable for 
mismanagement of sensitive data. These laws include: 
1.The Health Insurance Portability and Accountability Act of 1996 2.The Sarbanes-Oxley Act of 2002 (Sarbox) 
3.The Gramm-Leach-Blilely Act (GLBA) 
4.US PATRIOT Act 2001 
© 2009 Cisco Learning Institute. 8
Goals of an Information 
Security Program 
• Confidentiality 
- Prevent the disclosure of sensitive information from unauthorized 
people, resources, and processes 
• Integrity 
- The protection of system information or processes from 
intentional or accidental modification 
• Availability 
- The assurance that systems and data are 
accessible by authorized users when needed 
© 2009 Cisco Learning Institute. 9
Risk Management 
• Risk Analysis 
• Threats 
• Vulnerabilities 
• Countermeasures 
© 2009 Cisco Learning Institute. 10
Risk Management 
Control physical access Password protection 
Develop a Security Policy 
• The process of assessing and quantifying risk and establishing an 
acceptable level of risk for the organization 
• Risk can be mitigated, but cannot be eliminated 
© 2009 Cisco Learning Institute. 11
Risk Assessment 
• Risk assessment involves determining the likelihood that 
the vulnerability is a risk to the organization 
• Each vulnerability can be ranked by the scale 
• Sometimes calculating anticipated losses can be helpful 
in determining the impact of a vulnerability 
© 2009 Cisco Learning Institute. 12
Asset Identification 
• Categories of assets 
- Information Assets (people, hardware, software, systems) 
- Supporting Assets (facilities, utilities, services) 
- Critical Assets (can be either of those listed above) 
• Determine each item’s relative value 
- How much revenue/profit does it generate? 
- What is the cost to replace it? 
- How difficult would it be to replace? 
- How quickly can it be replaced? 
© 2009 Cisco Learning Institute. 13
Network Security “Threat” 
• A potential danger to information or a system 
• An example: the ability to gain unauthorized access to systems or 
information in order to commit fraud, network intrusion, industrial 
espionage, identity theft, or simply to disrupt the system or network 
• There may be weaknesses that greatly increase the likelihood of a 
threat manifesting 
• Threats may include equipment failure, 
structured attacks, natural disasters, 
physical attacks, theft, viruses and 
many other potential events causing 
danger or damage 
© 2009 Cisco Learning Institute. 14
Types of Network Threats 
• Eavesdropping 
• Denial-of-service 
• Packet replay 
• Man-in-the-middle 
• Packet modification 
© 2009 Cisco Learning Institute. 15
Vulnerability 
• A network vulnerability is a weakness in a system, 
technology, product or policy 
• In today’s environment, several organizations track, 
organize and test these vulnerabilities 
• The US government has a contract with an organization 
to track and publish network vulnerabilities 
• Each vulnerability is given an ID and can be reviewed by 
network security professionals over the Internet. 
• The common vulnerability exposure (CVE) list also 
publishes ways to prevent the vulnerability from being 
attacked 
© 2009 Cisco Learning Institute. 16
Vulnerability Appraisal 
• It is very important that network security specialists 
comprehend the importance of vulnerability appraisal 
• A vulnerability appraisal is a snapshot of the current 
security of the organization as it now stands 
• What current security weaknesses may expose the 
assets to these threats? 
• Vulnerability scanners are tools available as free Internet 
downloads and as commercial products 
- These tools compare the asset against a database of known 
vulnerabilities and produce a discovery report that exposes the 
vulnerability and assesses its severity 
© 2009 Cisco Learning Institute. 17
Risk Management Terms 
• Vulnerability – a system, network or device weakness 
• Threat – potential danger posed by a vulnerability 
• Threat Agent – the entity that indentifies a vulnerability 
and uses it to attack the victim 
• Risk – likelihood of a threat agent taking advantage of 
a vulnerability and the corresponding business impact 
• Exposure – potential to experience losses from a threat 
agent 
• Countermeasure – put into place to mitigate the 
potential risk 
© 2009 Cisco Learning Institute. 18
Understanding Risk 
Threat 
Agent 
Leads to 
Risk 
Gives rise to 
Threat 
Exploits 
Vulnerability 
Asset 
Directly affects 
Countermeasure 
Exposure 
Can damage 
Causes 
Can be safeguarded by 
© 2009 Cisco Learning Institute. 19
Types of Attacks 
Structured attack 
Come from hackers who are more highly motivated and technically 
competent. These people know system vulnerabilities and can 
understand and develop exploit code and scripts. They understand, 
develop, and use sophisticated hacking techniques to penetrate 
unsuspecting businesses. These groups are often involved with the 
major fraud and theft cases reported to law enforcement agencies. 
Unstructured attack 
Consists of mostly inexperienced individuals using easily available 
hacking tools such as shell scripts and password crackers. Even 
unstructured threats that are only executed with the intent of testing 
and challenging a hacker’s skills can still do serious damage to a 
company. 
© 2009 Cisco Learning Institute. 20
Types of Attacks 
External attacks 
Initiated by individuals or groups working outside of a company. 
They do not have authorized access to the computer systems or 
network. They gather information in order to work their way into a 
network mainly from the Internet or dialup access servers. 
Internal attacks 
More common and dangerous. Internal attacks are initiated by 
someone who has authorized access to the network. According to 
the FBI, internal access and misuse account for 60 to 80 percent of 
reported incidents. These attacks often are traced to disgruntled 
employees. 
© 2009 Cisco Learning Institute. 21
Types of Attacks 
• Passive Attack 
- Listen to system passwords 
- Release of message content 
- Traffic analysis 
- Data capturing 
• Active Attack 
- Attempt to log into someone else’s account 
- Wire taps 
- Denial of services 
- Message modifications 
© 2009 Cisco Learning Institute. 22
Specific Network Attacks 
• ARP Attack 
• Brute Force Attack 
• Worms 
• Flooding 
• Sniffers 
• Spoofing 
• Redirected Attacks 
• Tunneling Attack 
• Covert Channels 
© 2009 Cisco Learning Institute. 23
Information Leakage Attacks 
• Attackers can sometimes get data without having to 
directly use computers 
• Exploit Internet services that are intended to give out 
information 
• Induce these services to reveal extra information or to 
give it out to unauthorized people 
• Many services designed for use on local area networks 
do not have the security needed for safe use across the 
Internet 
• Thus these services become the means for important 
information leakage 
© 2009 Cisco Learning Institute. 24
Social Engineering Attacks 
• Hacker-speak for tricking a person into revealing some 
confidential information 
• Social Engineering is defined as an attack based on 
deceiving users or administrators at the target site 
• Done to gain illicit access to systems or useful 
information 
• The goals of social engineering are fraud, network 
intrusion, industrial espionage, identity theft, etc. 
© 2009 Cisco Learning Institute. 25
Attack Methodology 
Stages - the methodology of network attacks is well 
documented and researched. This research has led to 
greater understanding of network attacks and an entire 
specialization of engineers that test and protect networks 
against attacks (Certified Ethical Hackers/Penetration 
Testers) 
Tools - penetration testers have a variety of power tools that 
are now commercially available. They also have may open 
source free tools. This proliferation of powerful tools has 
increased the threat of attack due to the fact that even 
technical novices can now launch sophisticated attacks. 
© 2009 Cisco Learning Institute. 26
Stages of an Attack 
• Today’s attackers have a abundance of targets. In fact 
their greatest challenge is to select the most vulnerable 
victims. This has resulted in very well- planned and 
structured attacks. These attacks have common logistical 
and strategic stages. These stages include; 
- Reconnaissance 
- Scanning (addresses, ports, vulnerabilities) 
- Gaining access 
- Maintaining Access 
- Covering Tracks 
© 2009 Cisco Learning Institute. 27
Tools of the Attacker 
• The following are a few of the most popular tools used by 
network attackers: 
- Enumeration tools (dumpreg, netview and netuser) 
- Port/address scanners (AngryIP, nmap, Nessus) 
- Vulnerability scanners (Meta Sploit, Core Impact, ISS) 
- Packet Sniffers (Snort, Wire Shark, Air Magnet) 
- Root kits 
- Cryptographic cracking tools (Cain, WepCrack) 
- Malicious codes (worms, Trojan horse, time bombs) 
- System hijack tools (netcat, MetaSploit, Core Impact) 
© 2009 Cisco Learning Institute. 28
Countermeasures 
• DMZ/NAT 
• IDS/IPS 
• Content Filtering/NAC 
• Firewalls/proxy services 
• Authentication/Authorization/Accounting 
• Self-defending networks 
• Policies, procedures, standards guidelines 
• Training and awareness 
© 2009 Cisco Learning Institute. 29
Security Administration 
• Policies 
• Standards 
• Guidelines 
• Procedures 
• Baselines 
Domains of Network Security 
1. Risk Assessment 
2. Security Policy 
3. Organization of Information Security 
4. Asset Management 
5. Human Resources Security 
6. Physical and Environmental Security 
7. Communications and Operations Management 
8. Access Control 
9. Information Systems Acquisition, Development 
and Maintenance 
10. Information Security Incident Management 
11. Business Continuity Management 
12. Compliance 
© 2009 Cisco Learning Institute. 30
What Is a Security Policy? 
• A document that states how an organization plans to 
protect its tangible and intangible information assets 
- Management instructions indicating a course of action, a guiding 
principle, or appropriate procedure 
- High-level statements that provide guidance to workers who 
must make present and future decisions 
- Generalized requirements that must be written down and 
communicated to others 
© 2009 Cisco Learning Institute. 31
Example: The Policy 
• All users must have a unique user ID and 
password that conforms to the company 
password standard 
• Users must not share their password with 
anyone regardless of title or position 
• Passwords must not be stored in written or any 
readable form 
• If a compromise is suspected, it must be 
reported to the help desk and a new password 
must be requested 
© 2009 Cisco Learning Institute. 32
Example: The Standards 
• Minimum of 8 upper- and lowercase 
alphanumeric characters 
• Must include a special character 
• Must be changed every 30 days 
© 2009 Cisco Learning Institute. 33
Network Security Organizations 
www.infosyssec.com 
www.sans.org 
www.cisecurity.org 
www.cert.org 
www.isc2.org 
www.first.org 
www.infragard.net 
www.mitre.org 
www.cnss.gov 
© 2009 Cisco Learning Institute. 34
SANS 
© 2009 Cisco Learning Institute. 35
CERT 
© 2009 Cisco Learning Institute. 36
Information security certifications Offered by (ISC)2 
ISC2 
Systems Security Certified Practitioner (SCCP) 
Certification and Accreditation Professional (CAP) 
Certified Secure Software Lifecycle Professional (CSSLP) 
Certified Information Systems Security Professional (CISSP) 
© 2009 Cisco Learning Institute. 37
Network Security Jobs 
• Network Security Administrator 
• Risk Analyst 
• VPN Specialist 
• Penetration Tester 
• Network Perimeter/Firewall Specialist 
• Security Response IDS/IPS Engineer 
© 2009 Cisco Learning Institute. 38
Network Security Jobs 
Examples from Salary.com: 
• Network Security Administrator 
Troubleshoots network access problems and implements network security 
policies and procedures. Ensures network security access and protects 
against unauthorized access, modification, or destruction. Requires a 
bachelor's degree with at least 5 years of experience in the field. Familiar 
with a variety of the field's concepts, practices, and procedures. Relies on 
extensive experience and judgment to plan and accomplish goals. Performs 
a variety of tasks. May lead and direct the work of others. A wide degree of 
creativity and latitude is expected. 
• Risk Analyst 
Performs risk analysis studies in order to maintain maximum protection of 
an organization's assets. Investigates any incidences that may result in 
asset loss and compiles findings in reports for further review. Requires a 
bachelor's degree and 0-2 years of experience in the field or in a related 
area. Has knowledge of commonly-used concepts, practices, and 
procedures within a particular field. Relies on instructions and pre-established 
guidelines to perform the functions of the job. Works under 
immediate supervision. Primary job functions do not typically require 
exercising independent judgment. 
© 2009 Cisco Learning Institute. 39
Network Security Jobs, 2 
• Chief Information Security Officer 
Responsible for determining enterprise information security standards. 
Develops and implements information security standards and procedures. 
Ensures that all information systems are functional and secure. Requires a 
bachelor's degree with at least 12 years of experience in the field. Familiar 
with a variety of the field's concepts, practices, and procedures. Relies on 
extensive experience and judgment to plan and accomplish goals. 
Performs a variety of tasks. Leads and directs the work of others. A wide 
degree of creativity and latitude is expected. Typically reports to top 
management. 
• Network Perimeter/Firewall Specialist 
This position requires Experience and Skills working with perimeter 
protection devices and network firewalls. The candidate must have 
experience with PIX Firewalls and MPLS Network experience. Cisco Switch 
and Router experience is a plus. Experience with Network Transformation 
and Server Re-IP projects is a definite plus. Other Firewall experience is a 
definite plus. 
© 2009 Cisco Learning Institute. 40
Network Security Jobs, 3 
• Ethical hacker/Penetration Tester 
Responsible for testing and improving network and information system 
security systems. This is a very sensitive hands-on front line position. This 
person will be working in a team environment. This individual will be 
performing mostly network and web application ethical hacking 
assessments on multi-protocol enterprise network and application systems. 
Duties may include: Requirements analysis and design, scoping of testing 
activity, vulnerability assessment, assessing tools/script testing, 
troubleshooting and physical security audits, logical security audits, logical 
protocol and traffic audits. 
• Security Response IDS/IPS Engineer 
Provides support for the Intrusion Detection/Prevention Service, Host Log 
Monitoring Service, and Wireless IPS Service associated with Managed 
Security Services. Must have a well-rounded security background and are 
responsible for performing extensive troubleshooting of customer issues 
via Customer Support escalations from the Security Operations Center 
(SOC) Analysts. This individual performs both infrastructure engineering 
and customer focused projects to resolve all incidents in timely manner. 
These needs may involve performing device upgrades, investigating and 
responding to advanced security threats, and making changes to the 
security policy of a customer's device. 
© 2009 Cisco Learning Institute. 41
CCNA Security 02-  fundamentals of network security

More Related Content

What's hot

Secure Code Review 101
Secure Code Review 101Secure Code Review 101
Secure Code Review 101
Narudom Roongsiriwong, CISSP
 
Overview of the Cyber Kill Chain [TM]
Overview of the Cyber Kill Chain [TM]Overview of the Cyber Kill Chain [TM]
Overview of the Cyber Kill Chain [TM]
David Sweigert
 
CCNA Security - Chapter 1
CCNA Security - Chapter 1CCNA Security - Chapter 1
CCNA Security - Chapter 1Irsandi Hasan
 
SOC presentation- Building a Security Operations Center
SOC presentation- Building a Security Operations CenterSOC presentation- Building a Security Operations Center
SOC presentation- Building a Security Operations Center
Michael Nickle
 
Chapter 1 Presentation
Chapter 1 PresentationChapter 1 Presentation
Chapter 1 Presentation
Amy McMullin
 
Network security - Defense in Depth
Network security - Defense in DepthNetwork security - Defense in Depth
Network security - Defense in Depth
Dilum Bandara
 
Cisco Web and Email Security Overview
Cisco Web and Email Security OverviewCisco Web and Email Security Overview
Cisco Web and Email Security Overview
Cisco Security
 
Cloud security Presentation
Cloud security PresentationCloud security Presentation
Cloud security Presentation
Ajay p
 
Vulnerability Management
Vulnerability ManagementVulnerability Management
Vulnerability Management
asherad
 
Top 10 Reasons to Learn Cybersecurity | Why Cybersecurity is Important | Edureka
Top 10 Reasons to Learn Cybersecurity | Why Cybersecurity is Important | EdurekaTop 10 Reasons to Learn Cybersecurity | Why Cybersecurity is Important | Edureka
Top 10 Reasons to Learn Cybersecurity | Why Cybersecurity is Important | Edureka
Edureka!
 
Cloud Computing Security Challenges
Cloud Computing Security ChallengesCloud Computing Security Challenges
Cloud Computing Security Challenges
Yateesh Yadav
 
Threat Modelling
Threat ModellingThreat Modelling
Q radar architecture deep dive
Q radar architecture   deep diveQ radar architecture   deep dive
Q radar architecture deep dive
Kamal Mouline
 
IT Security
IT SecurityIT Security
IT Security
Mohsin Laiq
 
Introduction Network security
Introduction Network securityIntroduction Network security
Introduction Network security
IGZ Software house
 
Ise 1 2-bdm-v4
Ise 1 2-bdm-v4Ise 1 2-bdm-v4
Ise 1 2-bdm-v4
Danny Liu
 
Security architecture, engineering and operations
Security architecture, engineering and operationsSecurity architecture, engineering and operations
Security architecture, engineering and operations
Piyush Jain
 
Chapter 3 Presentation
Chapter 3 PresentationChapter 3 Presentation
Chapter 3 Presentation
Amy McMullin
 
IT Security management and risk assessment
IT Security management and risk assessmentIT Security management and risk assessment
IT Security management and risk assessment
CAS
 
Cloud Security Architecture.pptx
Cloud Security Architecture.pptxCloud Security Architecture.pptx
Cloud Security Architecture.pptx
Moshe Ferber
 

What's hot (20)

Secure Code Review 101
Secure Code Review 101Secure Code Review 101
Secure Code Review 101
 
Overview of the Cyber Kill Chain [TM]
Overview of the Cyber Kill Chain [TM]Overview of the Cyber Kill Chain [TM]
Overview of the Cyber Kill Chain [TM]
 
CCNA Security - Chapter 1
CCNA Security - Chapter 1CCNA Security - Chapter 1
CCNA Security - Chapter 1
 
SOC presentation- Building a Security Operations Center
SOC presentation- Building a Security Operations CenterSOC presentation- Building a Security Operations Center
SOC presentation- Building a Security Operations Center
 
Chapter 1 Presentation
Chapter 1 PresentationChapter 1 Presentation
Chapter 1 Presentation
 
Network security - Defense in Depth
Network security - Defense in DepthNetwork security - Defense in Depth
Network security - Defense in Depth
 
Cisco Web and Email Security Overview
Cisco Web and Email Security OverviewCisco Web and Email Security Overview
Cisco Web and Email Security Overview
 
Cloud security Presentation
Cloud security PresentationCloud security Presentation
Cloud security Presentation
 
Vulnerability Management
Vulnerability ManagementVulnerability Management
Vulnerability Management
 
Top 10 Reasons to Learn Cybersecurity | Why Cybersecurity is Important | Edureka
Top 10 Reasons to Learn Cybersecurity | Why Cybersecurity is Important | EdurekaTop 10 Reasons to Learn Cybersecurity | Why Cybersecurity is Important | Edureka
Top 10 Reasons to Learn Cybersecurity | Why Cybersecurity is Important | Edureka
 
Cloud Computing Security Challenges
Cloud Computing Security ChallengesCloud Computing Security Challenges
Cloud Computing Security Challenges
 
Threat Modelling
Threat ModellingThreat Modelling
Threat Modelling
 
Q radar architecture deep dive
Q radar architecture   deep diveQ radar architecture   deep dive
Q radar architecture deep dive
 
IT Security
IT SecurityIT Security
IT Security
 
Introduction Network security
Introduction Network securityIntroduction Network security
Introduction Network security
 
Ise 1 2-bdm-v4
Ise 1 2-bdm-v4Ise 1 2-bdm-v4
Ise 1 2-bdm-v4
 
Security architecture, engineering and operations
Security architecture, engineering and operationsSecurity architecture, engineering and operations
Security architecture, engineering and operations
 
Chapter 3 Presentation
Chapter 3 PresentationChapter 3 Presentation
Chapter 3 Presentation
 
IT Security management and risk assessment
IT Security management and risk assessmentIT Security management and risk assessment
IT Security management and risk assessment
 
Cloud Security Architecture.pptx
Cloud Security Architecture.pptxCloud Security Architecture.pptx
Cloud Security Architecture.pptx
 

Similar to CCNA Security 02- fundamentals of network security

CCNA_Security_01.ppt
CCNA_Security_01.pptCCNA_Security_01.ppt
CCNA_Security_01.ppt
veracru1
 
Chapter 1 overview
Chapter 1 overviewChapter 1 overview
Chapter 1 overviewali raza
 
Network Security for Computer science and Engineering.ppt
Network Security for Computer science and Engineering.pptNetwork Security for Computer science and Engineering.ppt
Network Security for Computer science and Engineering.ppt
AkfeteAssefa
 
ENSA_Module_3.pptx
ENSA_Module_3.pptxENSA_Module_3.pptx
ENSA_Module_3.pptx
SkyBlue659156
 
Information Technology Security Basics
Information Technology Security BasicsInformation Technology Security Basics
Information Technology Security Basics
Mohan Jadhav
 
Cyber security for Developers
Cyber security for DevelopersCyber security for Developers
Cyber security for Developers
techtutorus
 
Lec 1- Intro to cyber security and recommendations
Lec 1- Intro to cyber security and recommendationsLec 1- Intro to cyber security and recommendations
Lec 1- Intro to cyber security and recommendations
BilalMehmood44
 
30ITSecurityThreatsVulnerabilitiesandCountermeasuresV1.ppt
30ITSecurityThreatsVulnerabilitiesandCountermeasuresV1.ppt30ITSecurityThreatsVulnerabilitiesandCountermeasuresV1.ppt
30ITSecurityThreatsVulnerabilitiesandCountermeasuresV1.ppt
Kaukau9
 
Webinar - Reducing the Risk of a Cyber Attack on Utilities
Webinar - Reducing the Risk of a Cyber Attack on UtilitiesWebinar - Reducing the Risk of a Cyber Attack on Utilities
Webinar - Reducing the Risk of a Cyber Attack on Utilities
WPICPE
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
56ushodayareddy
 
Cisco 2014 - Anual Security Report
Cisco 2014 - Anual Security Report Cisco 2014 - Anual Security Report
Cisco 2014 - Anual Security Report Mandar Kharkar
 
Cloud Security.pptx
Cloud Security.pptxCloud Security.pptx
Cloud Security.pptx
Binod Rimal
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
AkshayKhade21
 
Information Assurance And Security - Chapter 2 - Lesson 2
Information Assurance And Security - Chapter 2 - Lesson 2Information Assurance And Security - Chapter 2 - Lesson 2
Information Assurance And Security - Chapter 2 - Lesson 2
MLG College of Learning, Inc
 
Principles of Computer Security, Fourth Edition Copyright .docx
Principles of Computer Security, Fourth Edition Copyright .docxPrinciples of Computer Security, Fourth Edition Copyright .docx
Principles of Computer Security, Fourth Edition Copyright .docx
harrisonhoward80223
 
Toward Continuous Cybersecurity with Network Automation
Toward Continuous Cybersecurity with Network AutomationToward Continuous Cybersecurity with Network Automation
Toward Continuous Cybersecurity with Network Automation
E.S.G. JR. Consulting, Inc.
 
Toward Continuous Cybersecurity With Network Automation
Toward Continuous Cybersecurity With Network AutomationToward Continuous Cybersecurity With Network Automation
Toward Continuous Cybersecurity With Network Automation
Ken Flott
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
MBRoman1
 

Similar to CCNA Security 02- fundamentals of network security (20)

CCNA_Security_01.ppt
CCNA_Security_01.pptCCNA_Security_01.ppt
CCNA_Security_01.ppt
 
Chapter 1 overview
Chapter 1 overviewChapter 1 overview
Chapter 1 overview
 
Network Security for Computer science and Engineering.ppt
Network Security for Computer science and Engineering.pptNetwork Security for Computer science and Engineering.ppt
Network Security for Computer science and Engineering.ppt
 
ENSA_Module_3.pptx
ENSA_Module_3.pptxENSA_Module_3.pptx
ENSA_Module_3.pptx
 
Information Technology Security Basics
Information Technology Security BasicsInformation Technology Security Basics
Information Technology Security Basics
 
Cyber security for Developers
Cyber security for DevelopersCyber security for Developers
Cyber security for Developers
 
Lec 1- Intro to cyber security and recommendations
Lec 1- Intro to cyber security and recommendationsLec 1- Intro to cyber security and recommendations
Lec 1- Intro to cyber security and recommendations
 
30ITSecurityThreatsVulnerabilitiesandCountermeasuresV1.ppt
30ITSecurityThreatsVulnerabilitiesandCountermeasuresV1.ppt30ITSecurityThreatsVulnerabilitiesandCountermeasuresV1.ppt
30ITSecurityThreatsVulnerabilitiesandCountermeasuresV1.ppt
 
Webinar - Reducing the Risk of a Cyber Attack on Utilities
Webinar - Reducing the Risk of a Cyber Attack on UtilitiesWebinar - Reducing the Risk of a Cyber Attack on Utilities
Webinar - Reducing the Risk of a Cyber Attack on Utilities
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
 
Cisco 2014 - Anual Security Report
Cisco 2014 - Anual Security Report Cisco 2014 - Anual Security Report
Cisco 2014 - Anual Security Report
 
Cloud Security.pptx
Cloud Security.pptxCloud Security.pptx
Cloud Security.pptx
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
 
Information Assurance And Security - Chapter 2 - Lesson 2
Information Assurance And Security - Chapter 2 - Lesson 2Information Assurance And Security - Chapter 2 - Lesson 2
Information Assurance And Security - Chapter 2 - Lesson 2
 
Lesson 2
Lesson 2Lesson 2
Lesson 2
 
Presentación AMIB Los Cabos
Presentación AMIB Los CabosPresentación AMIB Los Cabos
Presentación AMIB Los Cabos
 
Principles of Computer Security, Fourth Edition Copyright .docx
Principles of Computer Security, Fourth Edition Copyright .docxPrinciples of Computer Security, Fourth Edition Copyright .docx
Principles of Computer Security, Fourth Edition Copyright .docx
 
Toward Continuous Cybersecurity with Network Automation
Toward Continuous Cybersecurity with Network AutomationToward Continuous Cybersecurity with Network Automation
Toward Continuous Cybersecurity with Network Automation
 
Toward Continuous Cybersecurity With Network Automation
Toward Continuous Cybersecurity With Network AutomationToward Continuous Cybersecurity With Network Automation
Toward Continuous Cybersecurity With Network Automation
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
 

More from Ahmed Habib

CCNA Security 012- cryptographic systems
CCNA Security 012- cryptographic systemsCCNA Security 012- cryptographic systems
CCNA Security 012- cryptographic systems
Ahmed Habib
 
CCNA Security 011- implementing ios-based ips
CCNA Security 011- implementing ios-based ipsCCNA Security 011- implementing ios-based ips
CCNA Security 011- implementing ios-based ips
Ahmed Habib
 
CCNA Security 010-configuring cisco asa
CCNA Security 010-configuring cisco asaCCNA Security 010-configuring cisco asa
CCNA Security 010-configuring cisco asa
Ahmed Habib
 
CCNA Security 09- ios firewall fundamentals
CCNA Security 09- ios firewall fundamentalsCCNA Security 09- ios firewall fundamentals
CCNA Security 09- ios firewall fundamentals
Ahmed Habib
 
CCNA Security 07-Securing the local area network
CCNA Security 07-Securing the local area networkCCNA Security 07-Securing the local area network
CCNA Security 07-Securing the local area network
Ahmed Habib
 
CCNA Security 06- AAA
CCNA Security 06- AAACCNA Security 06- AAA
CCNA Security 06- AAA
Ahmed Habib
 
CCNA Security 05- securing the management plane
CCNA Security 05- securing the management planeCCNA Security 05- securing the management plane
CCNA Security 05- securing the management plane
Ahmed Habib
 
CCNA Security 03- network foundation protection
CCNA Security 03- network foundation protectionCCNA Security 03- network foundation protection
CCNA Security 03- network foundation protection
Ahmed Habib
 

More from Ahmed Habib (8)

CCNA Security 012- cryptographic systems
CCNA Security 012- cryptographic systemsCCNA Security 012- cryptographic systems
CCNA Security 012- cryptographic systems
 
CCNA Security 011- implementing ios-based ips
CCNA Security 011- implementing ios-based ipsCCNA Security 011- implementing ios-based ips
CCNA Security 011- implementing ios-based ips
 
CCNA Security 010-configuring cisco asa
CCNA Security 010-configuring cisco asaCCNA Security 010-configuring cisco asa
CCNA Security 010-configuring cisco asa
 
CCNA Security 09- ios firewall fundamentals
CCNA Security 09- ios firewall fundamentalsCCNA Security 09- ios firewall fundamentals
CCNA Security 09- ios firewall fundamentals
 
CCNA Security 07-Securing the local area network
CCNA Security 07-Securing the local area networkCCNA Security 07-Securing the local area network
CCNA Security 07-Securing the local area network
 
CCNA Security 06- AAA
CCNA Security 06- AAACCNA Security 06- AAA
CCNA Security 06- AAA
 
CCNA Security 05- securing the management plane
CCNA Security 05- securing the management planeCCNA Security 05- securing the management plane
CCNA Security 05- securing the management plane
 
CCNA Security 03- network foundation protection
CCNA Security 03- network foundation protectionCCNA Security 03- network foundation protection
CCNA Security 03- network foundation protection
 

Recently uploaded

Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
EduSkills OECD
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
Levi Shapiro
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
Celine George
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
Jisc
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
Vivekanand Anglo Vedic Academy
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
JosvitaDsouza2
 
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdfAdversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Po-Chuan Chen
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
Balvir Singh
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
GeoBlogs
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
TechSoup
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
DeeptiGupta154
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
kaushalkr1407
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
timhan337
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
Vikramjit Singh
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
Delapenabediema
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
camakaiclarkmusic
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
Anna Sz.
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
EverAndrsGuerraGuerr
 

Recently uploaded (20)

Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
 
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdfAdversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
 

CCNA Security 02- fundamentals of network security

  • 1. 01- Fundamentals of Network Security Ahmed Sultan CCNA | CCNA Security | CCNP Security | JNCIA-Junos | CEH © 2009 Cisco Learning Institute. 1
  • 2. What is Network Security? National Security Telecommunications and Information Systems Security Committee (NSTISSC) Network security is the protection of information and systems and hardware that use, store, and transmit that information. Network security encompasses those steps that are taken to ensure the confidentiality, integrity, and availability of data or resources. © 2009 Cisco Learning Institute. 2
  • 3. Rationale for Network Security Network security initiatives and network security specialists can be found in private and public, large and small companies and organizations. The need for network security and its growth are driven by many factors: 1. Internet connectivity is 24/7 and is worldwide 2. Increase in cyber crime 3. Impact on business and individuals 4. Legislation & liabilities 5. Proliferation of threats 6. Sophistication of threats © 2009 Cisco Learning Institute. 3
  • 4. Cyber Crime • Fraud/Scams • Identity Theft • Child Pornography • Theft of Telecommunications Services • Electronic Vandalism, Terrorism and Extortion WASHINGTON, D.C. –– An estimated 3.6 million households, or about 3 percent of all households in the nation, learned that they had been the victim of at least one type of identity theft during a six-month period in 2004, according to the Justice Department’s Bureau of Justice Statistics © 2009 Cisco Learning Institute. 4
  • 5. Business Impact 1. Decrease in productivity 2. Loss of sales revenue 3. Release of unauthorized sensitive data 4. Threat of trade secrets or formulas 5. Compromise of reputation and trust 6. Loss of communications 7. Threat to environmental and safety systems 8. Loss of time © 2009 Cisco Learning Institute. 5
  • 6. Proliferation of Threats In 2001, the National Infrastructure Protection Center at the FBI released a document summarizing the Ten Most Critical Internet Security Vulnerabilities. Since that time, thousands of organizations rely on this list to prioritize their efforts so they can close the most dangerous holes first. The threat landscape is very dynamic, which in turn makes it necessary to adopt newer security measures. Just over the last few years, the kinds of vulnerabilities that are being exploited are very different from the ones being exploited in the past. © 2009 Cisco Learning Institute. 6
  • 7. Sophistication of Threats © 2009 Cisco Learning Institute. 7
  • 8. Legislation Federal and local government has passed legislation that holds organizations and individuals liable for mismanagement of sensitive data. These laws include: 1.The Health Insurance Portability and Accountability Act of 1996 2.The Sarbanes-Oxley Act of 2002 (Sarbox) 3.The Gramm-Leach-Blilely Act (GLBA) 4.US PATRIOT Act 2001 © 2009 Cisco Learning Institute. 8
  • 9. Goals of an Information Security Program • Confidentiality - Prevent the disclosure of sensitive information from unauthorized people, resources, and processes • Integrity - The protection of system information or processes from intentional or accidental modification • Availability - The assurance that systems and data are accessible by authorized users when needed © 2009 Cisco Learning Institute. 9
  • 10. Risk Management • Risk Analysis • Threats • Vulnerabilities • Countermeasures © 2009 Cisco Learning Institute. 10
  • 11. Risk Management Control physical access Password protection Develop a Security Policy • The process of assessing and quantifying risk and establishing an acceptable level of risk for the organization • Risk can be mitigated, but cannot be eliminated © 2009 Cisco Learning Institute. 11
  • 12. Risk Assessment • Risk assessment involves determining the likelihood that the vulnerability is a risk to the organization • Each vulnerability can be ranked by the scale • Sometimes calculating anticipated losses can be helpful in determining the impact of a vulnerability © 2009 Cisco Learning Institute. 12
  • 13. Asset Identification • Categories of assets - Information Assets (people, hardware, software, systems) - Supporting Assets (facilities, utilities, services) - Critical Assets (can be either of those listed above) • Determine each item’s relative value - How much revenue/profit does it generate? - What is the cost to replace it? - How difficult would it be to replace? - How quickly can it be replaced? © 2009 Cisco Learning Institute. 13
  • 14. Network Security “Threat” • A potential danger to information or a system • An example: the ability to gain unauthorized access to systems or information in order to commit fraud, network intrusion, industrial espionage, identity theft, or simply to disrupt the system or network • There may be weaknesses that greatly increase the likelihood of a threat manifesting • Threats may include equipment failure, structured attacks, natural disasters, physical attacks, theft, viruses and many other potential events causing danger or damage © 2009 Cisco Learning Institute. 14
  • 15. Types of Network Threats • Eavesdropping • Denial-of-service • Packet replay • Man-in-the-middle • Packet modification © 2009 Cisco Learning Institute. 15
  • 16. Vulnerability • A network vulnerability is a weakness in a system, technology, product or policy • In today’s environment, several organizations track, organize and test these vulnerabilities • The US government has a contract with an organization to track and publish network vulnerabilities • Each vulnerability is given an ID and can be reviewed by network security professionals over the Internet. • The common vulnerability exposure (CVE) list also publishes ways to prevent the vulnerability from being attacked © 2009 Cisco Learning Institute. 16
  • 17. Vulnerability Appraisal • It is very important that network security specialists comprehend the importance of vulnerability appraisal • A vulnerability appraisal is a snapshot of the current security of the organization as it now stands • What current security weaknesses may expose the assets to these threats? • Vulnerability scanners are tools available as free Internet downloads and as commercial products - These tools compare the asset against a database of known vulnerabilities and produce a discovery report that exposes the vulnerability and assesses its severity © 2009 Cisco Learning Institute. 17
  • 18. Risk Management Terms • Vulnerability – a system, network or device weakness • Threat – potential danger posed by a vulnerability • Threat Agent – the entity that indentifies a vulnerability and uses it to attack the victim • Risk – likelihood of a threat agent taking advantage of a vulnerability and the corresponding business impact • Exposure – potential to experience losses from a threat agent • Countermeasure – put into place to mitigate the potential risk © 2009 Cisco Learning Institute. 18
  • 19. Understanding Risk Threat Agent Leads to Risk Gives rise to Threat Exploits Vulnerability Asset Directly affects Countermeasure Exposure Can damage Causes Can be safeguarded by © 2009 Cisco Learning Institute. 19
  • 20. Types of Attacks Structured attack Come from hackers who are more highly motivated and technically competent. These people know system vulnerabilities and can understand and develop exploit code and scripts. They understand, develop, and use sophisticated hacking techniques to penetrate unsuspecting businesses. These groups are often involved with the major fraud and theft cases reported to law enforcement agencies. Unstructured attack Consists of mostly inexperienced individuals using easily available hacking tools such as shell scripts and password crackers. Even unstructured threats that are only executed with the intent of testing and challenging a hacker’s skills can still do serious damage to a company. © 2009 Cisco Learning Institute. 20
  • 21. Types of Attacks External attacks Initiated by individuals or groups working outside of a company. They do not have authorized access to the computer systems or network. They gather information in order to work their way into a network mainly from the Internet or dialup access servers. Internal attacks More common and dangerous. Internal attacks are initiated by someone who has authorized access to the network. According to the FBI, internal access and misuse account for 60 to 80 percent of reported incidents. These attacks often are traced to disgruntled employees. © 2009 Cisco Learning Institute. 21
  • 22. Types of Attacks • Passive Attack - Listen to system passwords - Release of message content - Traffic analysis - Data capturing • Active Attack - Attempt to log into someone else’s account - Wire taps - Denial of services - Message modifications © 2009 Cisco Learning Institute. 22
  • 23. Specific Network Attacks • ARP Attack • Brute Force Attack • Worms • Flooding • Sniffers • Spoofing • Redirected Attacks • Tunneling Attack • Covert Channels © 2009 Cisco Learning Institute. 23
  • 24. Information Leakage Attacks • Attackers can sometimes get data without having to directly use computers • Exploit Internet services that are intended to give out information • Induce these services to reveal extra information or to give it out to unauthorized people • Many services designed for use on local area networks do not have the security needed for safe use across the Internet • Thus these services become the means for important information leakage © 2009 Cisco Learning Institute. 24
  • 25. Social Engineering Attacks • Hacker-speak for tricking a person into revealing some confidential information • Social Engineering is defined as an attack based on deceiving users or administrators at the target site • Done to gain illicit access to systems or useful information • The goals of social engineering are fraud, network intrusion, industrial espionage, identity theft, etc. © 2009 Cisco Learning Institute. 25
  • 26. Attack Methodology Stages - the methodology of network attacks is well documented and researched. This research has led to greater understanding of network attacks and an entire specialization of engineers that test and protect networks against attacks (Certified Ethical Hackers/Penetration Testers) Tools - penetration testers have a variety of power tools that are now commercially available. They also have may open source free tools. This proliferation of powerful tools has increased the threat of attack due to the fact that even technical novices can now launch sophisticated attacks. © 2009 Cisco Learning Institute. 26
  • 27. Stages of an Attack • Today’s attackers have a abundance of targets. In fact their greatest challenge is to select the most vulnerable victims. This has resulted in very well- planned and structured attacks. These attacks have common logistical and strategic stages. These stages include; - Reconnaissance - Scanning (addresses, ports, vulnerabilities) - Gaining access - Maintaining Access - Covering Tracks © 2009 Cisco Learning Institute. 27
  • 28. Tools of the Attacker • The following are a few of the most popular tools used by network attackers: - Enumeration tools (dumpreg, netview and netuser) - Port/address scanners (AngryIP, nmap, Nessus) - Vulnerability scanners (Meta Sploit, Core Impact, ISS) - Packet Sniffers (Snort, Wire Shark, Air Magnet) - Root kits - Cryptographic cracking tools (Cain, WepCrack) - Malicious codes (worms, Trojan horse, time bombs) - System hijack tools (netcat, MetaSploit, Core Impact) © 2009 Cisco Learning Institute. 28
  • 29. Countermeasures • DMZ/NAT • IDS/IPS • Content Filtering/NAC • Firewalls/proxy services • Authentication/Authorization/Accounting • Self-defending networks • Policies, procedures, standards guidelines • Training and awareness © 2009 Cisco Learning Institute. 29
  • 30. Security Administration • Policies • Standards • Guidelines • Procedures • Baselines Domains of Network Security 1. Risk Assessment 2. Security Policy 3. Organization of Information Security 4. Asset Management 5. Human Resources Security 6. Physical and Environmental Security 7. Communications and Operations Management 8. Access Control 9. Information Systems Acquisition, Development and Maintenance 10. Information Security Incident Management 11. Business Continuity Management 12. Compliance © 2009 Cisco Learning Institute. 30
  • 31. What Is a Security Policy? • A document that states how an organization plans to protect its tangible and intangible information assets - Management instructions indicating a course of action, a guiding principle, or appropriate procedure - High-level statements that provide guidance to workers who must make present and future decisions - Generalized requirements that must be written down and communicated to others © 2009 Cisco Learning Institute. 31
  • 32. Example: The Policy • All users must have a unique user ID and password that conforms to the company password standard • Users must not share their password with anyone regardless of title or position • Passwords must not be stored in written or any readable form • If a compromise is suspected, it must be reported to the help desk and a new password must be requested © 2009 Cisco Learning Institute. 32
  • 33. Example: The Standards • Minimum of 8 upper- and lowercase alphanumeric characters • Must include a special character • Must be changed every 30 days © 2009 Cisco Learning Institute. 33
  • 34. Network Security Organizations www.infosyssec.com www.sans.org www.cisecurity.org www.cert.org www.isc2.org www.first.org www.infragard.net www.mitre.org www.cnss.gov © 2009 Cisco Learning Institute. 34
  • 35. SANS © 2009 Cisco Learning Institute. 35
  • 36. CERT © 2009 Cisco Learning Institute. 36
  • 37. Information security certifications Offered by (ISC)2 ISC2 Systems Security Certified Practitioner (SCCP) Certification and Accreditation Professional (CAP) Certified Secure Software Lifecycle Professional (CSSLP) Certified Information Systems Security Professional (CISSP) © 2009 Cisco Learning Institute. 37
  • 38. Network Security Jobs • Network Security Administrator • Risk Analyst • VPN Specialist • Penetration Tester • Network Perimeter/Firewall Specialist • Security Response IDS/IPS Engineer © 2009 Cisco Learning Institute. 38
  • 39. Network Security Jobs Examples from Salary.com: • Network Security Administrator Troubleshoots network access problems and implements network security policies and procedures. Ensures network security access and protects against unauthorized access, modification, or destruction. Requires a bachelor's degree with at least 5 years of experience in the field. Familiar with a variety of the field's concepts, practices, and procedures. Relies on extensive experience and judgment to plan and accomplish goals. Performs a variety of tasks. May lead and direct the work of others. A wide degree of creativity and latitude is expected. • Risk Analyst Performs risk analysis studies in order to maintain maximum protection of an organization's assets. Investigates any incidences that may result in asset loss and compiles findings in reports for further review. Requires a bachelor's degree and 0-2 years of experience in the field or in a related area. Has knowledge of commonly-used concepts, practices, and procedures within a particular field. Relies on instructions and pre-established guidelines to perform the functions of the job. Works under immediate supervision. Primary job functions do not typically require exercising independent judgment. © 2009 Cisco Learning Institute. 39
  • 40. Network Security Jobs, 2 • Chief Information Security Officer Responsible for determining enterprise information security standards. Develops and implements information security standards and procedures. Ensures that all information systems are functional and secure. Requires a bachelor's degree with at least 12 years of experience in the field. Familiar with a variety of the field's concepts, practices, and procedures. Relies on extensive experience and judgment to plan and accomplish goals. Performs a variety of tasks. Leads and directs the work of others. A wide degree of creativity and latitude is expected. Typically reports to top management. • Network Perimeter/Firewall Specialist This position requires Experience and Skills working with perimeter protection devices and network firewalls. The candidate must have experience with PIX Firewalls and MPLS Network experience. Cisco Switch and Router experience is a plus. Experience with Network Transformation and Server Re-IP projects is a definite plus. Other Firewall experience is a definite plus. © 2009 Cisco Learning Institute. 40
  • 41. Network Security Jobs, 3 • Ethical hacker/Penetration Tester Responsible for testing and improving network and information system security systems. This is a very sensitive hands-on front line position. This person will be working in a team environment. This individual will be performing mostly network and web application ethical hacking assessments on multi-protocol enterprise network and application systems. Duties may include: Requirements analysis and design, scoping of testing activity, vulnerability assessment, assessing tools/script testing, troubleshooting and physical security audits, logical security audits, logical protocol and traffic audits. • Security Response IDS/IPS Engineer Provides support for the Intrusion Detection/Prevention Service, Host Log Monitoring Service, and Wireless IPS Service associated with Managed Security Services. Must have a well-rounded security background and are responsible for performing extensive troubleshooting of customer issues via Customer Support escalations from the Security Operations Center (SOC) Analysts. This individual performs both infrastructure engineering and customer focused projects to resolve all incidents in timely manner. These needs may involve performing device upgrades, investigating and responding to advanced security threats, and making changes to the security policy of a customer's device. © 2009 Cisco Learning Institute. 41

Editor's Notes

  1. Typically carried out by telephoning users or operators and pretending to be an authorized user or an administrator
  2. Systems Security Certified Practitioner (SCCP) Only available to qualified candidates who subscribe to the (ISC)2 code of ethics and pass the SSCP Certification examination based on the relevant SSCP Common Body of Knowledge (CBK). Candidates must also be able to prove at least one-year experience in one of the 7 domains that comprise the SSCP Certification: Access Controls Administration Audit and Monitoring Risk, Response and Recovery Cryptography Data Communications Malicious Code/Malware Certification and Accreditation Professional (CAP) Co-developed by the U.S. Department of State's Office of Information Assurance and (ISC)², the CAP credential is used as a measure of the knowledge, skills and abilities of personnel involved in assessing risk and establishing security requirements, as well as ensuring information systems possess appropriate security measures. Certified Secure Software Lifecycle Professional (CSSLP) The newest certification from (ISC)², this is the only certification in the industry that ensures that security throughout the software lifecycle. It centers around seven common bodies of knowledge (CBK). Secure Software Concepts Secure Software Requirements Secure Software Design Secure Software Implementation/Coding Secure Software Testing Software Acceptance Software Deployment, Operations, Maintenance and Disposal Certified Information Systems Security Professional (CISSP) One of the most popular certifications in the network security profession, the CISSP was the first credential in the field of information security, accredited by the American National Standards Institute (ANSI). For CISSP credential, in addition to 5 years of experience, professional experience must be in two or more of 10 defined (ISC)² CISSP domains including: Access Control Application Security Business Continuity and Disaster Recovery Planning Cryptography Information Security and Risk Management Legal, Regulations, Compliance and Investigations Operations Security Physical (Environmental) Security Security Architecture and Design Telecommunications and Network Security