SlideShare a Scribd company logo
1 of 44
1
CompTIA Security+ Guide to Network
Security Fundamentals, Sixth Edition
Chapter 7
Administering a Secure Network
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use
as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for
classroom use.
Objectives
7.1 List and describe the functions of secure network
protocols
7.2 Explain the placement of security devices and
technologies
7.3 Tell how security data can be analyzed
7.4 Explain how to manage and secure network
platforms
© 2018 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-
protected website for classroom use.
3
Secure Network Protocols (1 of 4)
• Protocols
• Rules for communication
• Essential for proper communication between network devices
• Transmission Control Protocol/Internet Protocol (TCP/IP)
• Most common protocol suite used for local area networks and
the Internet
• Comprises several protocols that all function together
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or
otherwise on a password-protected website for classroom use.
4
Secure Network Protocols (2 of 4)
• IP
• Protocol that functions primarily at Open Systems Interconnection (OSI)
Network Layer (Layer 3)
• Provides network addressing and routing
• TCP
• Transport Layer (Layer 4) protocol
• Establishes connections and ensures reliable data transport between
devices
• TCP/IP uses a four layer architecture
• Network Interface, Internet, Transport, Application
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or
otherwise on a password-protected website for classroom use.
5
Secure Network Protocols (3 of 4)
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or
otherwise on a password-protected website for classroom use.
6
Secure Network Protocols (4 of 4)
• Several basic TCP/IP Protocols that relate to security:
• Simple Network Management Protocol (SNMP)
• Domain Name System (DNS)
• File Transfer Protocol
• There are also email protocols that are not natively secure
• Steps can be taken to protect email correspondence
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or
otherwise on a password-protected website for classroom use.
7
Simple Network Management Protocol
(SNMP) (1 of 2)
• Used to manage network equipment and is supported by most network
equipment manufacturers
• Allows administrators to remotely monitor, manage, and configure
network devices
• Functions by exchanging management information between network
devices
• Each SNMP-managed device has an agent or a service
• Listens for and executes commands
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or
otherwise on a password-protected website for classroom use.
8
Simple Network Management Protocol
(SNMP) (2 of 2)
• Agents are password protected
• Password is known as a community string
• Security vulnerabilities were present in SMNP versions 1 and 2
• Version 3 uses usernames and passwords along with encryption
to address vulnerabilities
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or
otherwise on a password-protected website for classroom use.
9
Domain Name System (DNS) (1 of 3)
• DNS
• A TCP/IP protocol that maps IP addresses to their symbolic name
• The DNS database is organized as a hierarchy
• Database consists of the name of a site and a corresponding IP
number
• The database is distributed to many different servers on the Internet
• To prevent bottlenecking and to ensure efficiency
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or
otherwise on a password-protected website for classroom use.
10
Domain Name System (DNS) (2 of 3)
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or
otherwise on a password-protected website for classroom use.
11
Domain Name System (DNS) (3 of 3)
• DNS is often the focus of attacks
• DNS poisoning substitutes fraudulent IP address
-Can be done in local host table or external DNS server
-Can be thwarted by using Domain Name System Security Extensions
(DNSSEC)
-DNSSEC adds additional resource records and message header
information which can be used to verify the requested data has not
been altered in transmission
• Attacker asks the valid DNS for a zone transfer
-A zone transfer allows attacker access to network, hardware, and
operating system information
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or
otherwise on a password-protected website for classroom use.
12
File Transfer Protocol (FTP) (1 of 4)
• TCP/IP protocol used for transferring files
• File transfer protocol (FTP) – an unsecure protocol used to connect
to an FTP server
• Methods for using FTP on local host computer
• From a command prompt
• Using a web browser
• Using an FTP client
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or
otherwise on a password-protected website for classroom use.
13
File Transfer Protocol (FTP) (2 of 4)
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or
otherwise on a password-protected website for classroom use.
14
File Transfer Protocol (FTP) (3 of 4)
• Using FTP behind a firewall can present challenges
• FTP uses two ports
-Port 21 is the FTP control part
-Port 20 is the data port
• FTP active mode
-Client’s firewall may sometimes drop packets on Port 20 (the data
channel connection)
• FTP passive mode
-The client sends a PASV command to the command channel and
the server responds with the TCP port number to use to establish
the data channel
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or
otherwise on a password-protected website for classroom use.
15
File Transfer Protocol (FTP) (4 of 4)
• FTP vulnerabilities
• Does not use encryption
• Files transferred using FTP are vulnerable to man-in-the-middle attacks
• Secure transmission options over FTP
• Secure sockets layer (FTPS) encrypts commands
-Uses SSL or TLS to encrypt commands sent over the control port
(port 21); data port may not be encrypted
• Secure FTP (SFTP)
-Uses only a single TCP port instead of two ports
-All data and commands are encrypted
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or
otherwise on a password-protected website for classroom use.
16
Secure Email Protocols
• Secure/Multipurpose Internet Mail Extensions (S/MIME)
• A protocol for securing email messages
• S/MIME has limitations:
• Cannot be used when mail is accessed through a web browser
instead of a dedicated email application
• Because S/MIME encrypts the entire message, this makes it difficult
for any third-party tools that inspect email for malware
-Because it also would be encrypted
• Some enterprises and government agencies automate encrypting and
decrypting email
• Use a mail gateway appliance
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or
otherwise on a password-protected website for classroom use.
17
Using Secure Network Protocols
Application or technology Recommended secure protocol
Voice and video Secure Real-time Transport Protocol (SRTP)
Time synchronization Network Time Protocol (NTP)
Email Secure/Multipurpose Internet Mail Extensions
(S/MIME)
Web browsing Hypertext Transport Protocol Secure (HTTPS)
File transfer Secure FTP (SFTP)
Remote access Virtual Private Network (VPN)
Domain name resolution DNS Security Extensions (DNSSEC)
Routing and switching IP Security (IPsec)
Network address translation IP Security (IPsec)
Subscription services IP Security (IPsec)
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or
otherwise on a password-protected website for classroom use.
18
Placement of Security Devices and
Technologies (1 of 5)
• The protection that security devices provide can be easily negated if
those devices are not properly located in the network architecture
• SSL/TLS accelerator – a separate hardware card that inserts into a
web server that contains co-processors to handle SSL/TLS
processing
• a SSL/TLS hardware module can be installed as a “virtual SSL/TLS server”
alongside the forward proxy server
• Port mirrors – allows the administrator to configure a switch to copy
traffic that occurs on some or all ports to a designated port on the
switch (see Figure 7-4)
• Network tap (test access point) – a device that can monitor traffic
(see Figure 7-5)
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or
otherwise on a password-protected website for classroom use.
19
Placement of Security Devices and
Technologies (2 of 5)
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or
otherwise on a password-protected website for classroom use.
20
Placement of Security Devices and
Technologies (3 of 5)
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or
otherwise on a password-protected website for classroom use.
21
Placement of Security Devices and
Technologies (4 of 5)
• Sensors, collectors, and filters – should be placed where the stream of
data is largest
• Sensors – monitor traffic for network intrusion detection and prevention
devices
• Collectors – gather traffic for SIEM devices
• Filters – block traffic for Internet content filters
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or
otherwise on a password-protected website for classroom use.
22
Placement of Security Devices and
Technologies (5 of 5)
• Aggregation switch – used to combine multiple network connections
into a single link
• Should be located between routers and servers where they can detect
and stop attacks directed at a server or application
• Correlation engine – aggregates and correlates content from different
sources to uncover an attack
• Should be in the protected internal network using data collected from
the logs of different hardware devices
• DDoS mitigator – a hardware device that identifies and blocks real-time
distributed denial of service (DDoS) attacks
• Should be in the network where they can monitor the largest stream of
data
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or
otherwise on a password-protected website for classroom use.
23
Analyzing Security Data (1 of 2)
• Security logs
• Can reveal types of attacks that are being directed at the network
and if attacks were successful
• Access logs
• Provide details regarding requests for specific files
• Audit logs
• Used to record which user performed an action
• Event logs
• Document any unsuccessful events and the most significant
successful events
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or
otherwise on a password-protected website for classroom use.
24
Analyzing Security Data (2 of 2)
• A routine review of logs helps to identify:
• Security incidents
• Policy violations
• Fraudulent activity
• Operational problems
• Logs can be useful for:
• Performing auditing analysis
• Supporting the organization’s internal investigations
• Identifying operational trends and long-term problems
• Logs can provide documentation that the organization is complying
with laws and regulatory requirements
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or
otherwise on a password-protected website for classroom use.
25
Data from Security Devices
• Almost every hardware device designed for security can generate logs
• Firewall log items to be examined
• IP addresses rejected and dropped
• Probes to ports that have no application services on them
• Source-routed packets
• Suspicious outbound connections
• Unsuccessful logins
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or
otherwise on a password-protected website for classroom use.
26
Data from Security Software
• Security software can produce important data that can be analyzed
• Data Execution Prevention (DEP)
• A Microsoft Windows feature that prevents attackers from using
buffer overflow to execute malware
• DEP events and those from similar software can be logged along
with the level of severity
• File integrity check (FIC)
• A service that can monitor any changes made to computer files,
such as OS files
• These changes can compromise security and indicate a security
breach has occurred
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or
otherwise on a password-protected website for classroom use.
27
Data from Security Tools
Tool Description Explanation
Application Whitelisting A whitelist is an inventory of
applications and associated
components that have been
pre-approved and
authorized to be active and
present on the device
Application whitelisting
technologies are designed
to permit only known good
activity and block
everything else
Removable media control Removable media control is
a tool that can be used to
restrict which removable
media can be attached to a
system
Removable media can
introduce malware into a
system and be used to
steal valuable information
Advanced malware
management
Often a third-party service,
advanced malware
management tools monitor
a network for any unusual
activity
Advanced malware
management tools often
use experience-based
techniques such as
heuristic monitoring to
determine if a threat exists
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or
otherwise on a password-protected website for classroom use.
28
Issues in Analyzing Security Data (1 of 2)
• There are issues with log management
• Generating, transmitting, storing, analyzing, and disposing
of computer security log data
• This is due to:
• Multiple devices generating logs
• Very large volume of data
• Different log formats
• A solution:
• Use a centralized device log analyzer
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or
otherwise on a password-protected website for classroom use.
29
Issues in Analyzing Security Data (2 of 2)
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or
otherwise on a password-protected website for classroom use.
30
Managing and Securing Network Platforms
• Some applications and platforms require special security considerations:
• Virtualization
• Cloud computing
• Software defined networking
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or
otherwise on a password-protected website for classroom use.
31
Virtualization (1 of 7)
• Virtualization
• A means of managing and presenting computer resources without
regard to physical layout or location
• Host virtualization
• An entire operating system environment is simulated
• Virtual machine - a simulated software-based emulation of a computer
• The host system runs a hypervisor that manages the virtual operating
systems and supports one or more guest systems
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or
otherwise on a password-protected website for classroom use.
32
Virtualization (2 of 7)
• The VM monitor program is called a hypervisor
• Manages the VM operating systems
• Two types of hypervisor:
• Type I – runs directly on the computer’s hardware instead of the underlying OS
• Type II – run on the host OS, much like an application
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or
otherwise on a password-protected website for classroom use.
33
Virtualization (3 of 7)
• Container or application cell
• Holds only the necessary OS components that are needed for that specific
application to run
• Reduces the necessary hard drive storage space and RAM needed
• Allows for containers to start more quickly because the OS does not have
to be started
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or
otherwise on a password-protected website for classroom use.
34
Virtualization (4 of 7)
• Virtual Desktop Infrastructure (VDI)
• The process of running a user desktop inside a VM that resides
on a server
• Enables personalized desktops for each user to be available on
any computer or device that can access the server
• Allows centralized management of all virtual desktops
• Virtual Distributed Ethernet (VDE)
• An Ethernet-compliant virtual network that can connect physical
computers and/or virtual machines together
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or
otherwise on a password-protected website for classroom use.
35
Virtualization (5 of 7)
• Virtualization advantages
• New virtual server machines can be made available (host availability)
and resources can easily be expanded or contracted as needed (host
elasticity)
• Can reduce costs
-Fewer physical computers must be purchased and maintained
• Can provided uninterrupted server access to users
-Supports live migration which allows a virtual machine to be
moved to a different physical computer with no impact to users
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or
otherwise on a password-protected website for classroom use.
36
Virtualization (6 of 7)
• Security-related advantages of virtualization:
• Test latest security updates by downloading on a virtual machine
before installing on production computers
• A snapshot of a particular state of a virtual machine can be saved for
later use
• Testing the existing security configuration (security control testing)
can be performed using a simulated network environment
• A suspicious program can be loaded into an isolated virtual machine
and executed (sandboxing)
-If malware, only the virtual machine will be impacted
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or
otherwise on a password-protected website for classroom use.
37
Virtualization (7 of 7)
• Security concerns for virtualized environments:
• Not all hypervisors have the necessary security controls to keep out
attackers
• Existing security tools were designed for single physical servers
• VMs must be protected from both outside networks and other VMs
on the same physical computer
• VMs may be able to “escape” from the contained environment and
directly interact with the host OS
-Important to have virtual machine escape protection
• Virtual machine sprawl
-The widespread proliferation of VMs without proper oversight or
management
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or
otherwise on a password-protected website for classroom use.
38
Cloud Computing (1 of 3)
• On-premises model
• Enterprises in the past purchased all the hardware and software
necessary to run the organization
• Resulted in spiraling costs
• Hosted services
• Servers, storage, and the supporting networking infrastructure are
shared by multiple enterprises over a remote network connection
• Cloud computing
• A model for enabling convenient, on-demand network access to a
shared pool of configurable computing resources
• It is a pay-per-use computing model
-Customers pay for only the resources they need
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or
otherwise on a password-protected website for classroom use.
39
Cloud Computing (2 of 3)
• Types of clouds
• Public cloud
• Community cloud
• Private cloud
• Hybrid cloud
• Four service models in cloud computing:
• Software as a Service (SaaS)
- Vendor provides access to the vendor’s software applications running on a cloud infrastructure
• Platform as a Service (PaaS)
- Consumers install and run their own specialized applications on the cloud computing network
• Infrastructure as a Service (IaaS)
- Vendor allows customers to deploy and run their own software, including OSs and applications
• Security as a Service (SECaaS)
- All security services are delivered from the cloud to the enterprise
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or
otherwise on a password-protected website for classroom use.
40
Cloud Computing (3 of 3)
• Cloud computing security challenges
• Cloud provider must guarantee means to approve authorized users and
deny imposters
• Transmissions from the cloud must be protected
• Customers’ data must be isolated from other customers
• The highest level of application availability and security must be maintained
• Cloud access security broker (CASB)
• A set of software tools or services that resides between the enterprises’ on-
premises infrastructure and the cloud provider’s infrastructure
• Acts as a “gatekeeper”
• Ensures that the security policies of the enterprise extend to its data in the
cloud
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or
otherwise on a password-protected website for classroom use.
41
Software Defined Network (SDN) (1 of 2)
• Software defined network (SDN)
• Virtualizes parts of the physical network so that it can be more quickly
and easily reconfigured
• Accomplished by separating the control plane from the data plane
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or
otherwise on a password-protected website for classroom use.
42
Software Defined Network (SDN) (2 of 2)
• If traffic needs to flow through the network
• It receives permission from the SDN controller, which verifies the
communication is permitted by the network policy of the enterprise
• Once approved, the SDN controller computes a route for the flow to
take
• Adds an entry for that flow in each of the switches along the path
• SDN s can provide stronger protection
• Simplifies extending VLAN beyond the perimeter of the building, which
can help secure data
• An SDN can ensure that all network traffic is routed through a firewall
• Can help capture data for NIDS and NIPS
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or
otherwise on a password-protected website for classroom use.
43
Chapter Summary (1 of 2)
• TCP/IP is the most common protocol for LANs and the Internet
• Protocols for transferring files
• FTP and FTPS
• The correct placement of security devices is essential for protection
• An SSL/TLS accelerator can be a separate hardware card or a
separate SSL/TLS hardware module installed as a “virtual SSL server”
• Monitoring traffic on switches can be done in two ways:
• A managed switch that supports port mirroring
• Install a network tap (test access point)
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or
otherwise on a password-protected website for classroom use.
44
Chapter Summary (2 of 2)
• A log is a record of events that occur
• Security logs are particularly important because they can reveal the
types of attacks that are being directed at the network
• A solution to log management is to use a centralized device log analyzer
• Some applications and platforms require special security considerations
• Virtualization
• Cloud computing
• Software defined network (SDN)
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or
otherwise on a password-protected website for classroom use.

More Related Content

What's hot

Chapter 1 Presentation
Chapter 1 PresentationChapter 1 Presentation
Chapter 1 PresentationAmy McMullin
 
Intruders
IntrudersIntruders
Intruderstechn
 
Fundamentals of Information Systems Security Chapter 11
Fundamentals of Information Systems Security Chapter 11Fundamentals of Information Systems Security Chapter 11
Fundamentals of Information Systems Security Chapter 11Dr. Ahmed Al Zaidy
 
Chapter 4 Advanced Cryptography and P K I
Chapter 4 Advanced Cryptography and P K IChapter 4 Advanced Cryptography and P K I
Chapter 4 Advanced Cryptography and P K IDr. Ahmed Al Zaidy
 
Chapter 8 Wireless Network Security
Chapter 8 Wireless Network SecurityChapter 8 Wireless Network Security
Chapter 8 Wireless Network SecurityDr. Ahmed Al Zaidy
 
Email security
Email securityEmail security
Email securitySultanErbo
 
Hacking With Nmap - Scanning Techniques
Hacking With Nmap - Scanning TechniquesHacking With Nmap - Scanning Techniques
Hacking With Nmap - Scanning Techniquesamiable_indian
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber SecurityStephen Lahanas
 
Chapter 2 Malware and Social Engineering Attacks
Chapter 2 Malware and Social Engineering AttacksChapter 2 Malware and Social Engineering Attacks
Chapter 2 Malware and Social Engineering AttacksDr. Ahmed Al Zaidy
 
Virtual Private Network main
Virtual Private Network mainVirtual Private Network main
Virtual Private Network mainKanika Gupta
 
IPSec (Internet Protocol Security) - PART 1
IPSec (Internet Protocol Security) - PART 1IPSec (Internet Protocol Security) - PART 1
IPSec (Internet Protocol Security) - PART 1Shobhit Sharma
 
Network security - Defense in Depth
Network security - Defense in DepthNetwork security - Defense in Depth
Network security - Defense in DepthDilum Bandara
 

What's hot (20)

Whitman_Ch02.pptx
Whitman_Ch02.pptxWhitman_Ch02.pptx
Whitman_Ch02.pptx
 
Chapter 1 Presentation
Chapter 1 PresentationChapter 1 Presentation
Chapter 1 Presentation
 
Web security
Web securityWeb security
Web security
 
Intruders
IntrudersIntruders
Intruders
 
Chapter 4
Chapter 4Chapter 4
Chapter 4
 
Fundamentals of Information Systems Security Chapter 11
Fundamentals of Information Systems Security Chapter 11Fundamentals of Information Systems Security Chapter 11
Fundamentals of Information Systems Security Chapter 11
 
Chapter 4 Advanced Cryptography and P K I
Chapter 4 Advanced Cryptography and P K IChapter 4 Advanced Cryptography and P K I
Chapter 4 Advanced Cryptography and P K I
 
Chapter 8 Wireless Network Security
Chapter 8 Wireless Network SecurityChapter 8 Wireless Network Security
Chapter 8 Wireless Network Security
 
Email security
Email securityEmail security
Email security
 
CA_Module_1.pptx
CA_Module_1.pptxCA_Module_1.pptx
CA_Module_1.pptx
 
Hacking With Nmap - Scanning Techniques
Hacking With Nmap - Scanning TechniquesHacking With Nmap - Scanning Techniques
Hacking With Nmap - Scanning Techniques
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber Security
 
Chapter 2 Malware and Social Engineering Attacks
Chapter 2 Malware and Social Engineering AttacksChapter 2 Malware and Social Engineering Attacks
Chapter 2 Malware and Social Engineering Attacks
 
Virtual Private Network main
Virtual Private Network mainVirtual Private Network main
Virtual Private Network main
 
IPsec
IPsecIPsec
IPsec
 
Chapter 15 Risk Mitigation
Chapter 15 Risk MitigationChapter 15 Risk Mitigation
Chapter 15 Risk Mitigation
 
Encryption
EncryptionEncryption
Encryption
 
Ipsec
IpsecIpsec
Ipsec
 
IPSec (Internet Protocol Security) - PART 1
IPSec (Internet Protocol Security) - PART 1IPSec (Internet Protocol Security) - PART 1
IPSec (Internet Protocol Security) - PART 1
 
Network security - Defense in Depth
Network security - Defense in DepthNetwork security - Defense in Depth
Network security - Defense in Depth
 

Similar to CompTIA Security+ Guide to Network Security Fundamentals

Chapter 8 Presentaion
Chapter 8 PresentaionChapter 8 Presentaion
Chapter 8 PresentaionAmy McMullin
 
9781305094352 ppt ch08
9781305094352 ppt ch089781305094352 ppt ch08
9781305094352 ppt ch08Amy McMullin
 
Cybersecurity controlling ports and network devices
Cybersecurity controlling ports and network devices Cybersecurity controlling ports and network devices
Cybersecurity controlling ports and network devices Jim Kaplan CIA CFE
 
topicCybersecurity_4
topicCybersecurity_4topicCybersecurity_4
topicCybersecurity_4Anne Starr
 
gkk_2021123rg5hSecurity essentials domain 2
gkk_2021123rg5hSecurity essentials   domain 2gkk_2021123rg5hSecurity essentials   domain 2
gkk_2021123rg5hSecurity essentials domain 2Anne Starr
 
gkkSecurity essentials domain 2
gkkSecurity essentials   domain 2gkkSecurity essentials   domain 2
gkkSecurity essentials domain 2Anne Starr
 
gkk20211e4djwew4dSecurity essentials domain 2
gkk20211e4djwew4dSecurity essentials   domain 2gkk20211e4djwew4dSecurity essentials   domain 2
gkk20211e4djwew4dSecurity essentials domain 2Anne Starr
 
Module 7 Firewalls Part - 2 Presentation
Module 7 Firewalls Part - 2 PresentationModule 7 Firewalls Part - 2 Presentation
Module 7 Firewalls Part - 2 Presentation9921103075
 
What Technology Lies Behind VPN
What Technology Lies Behind VPNWhat Technology Lies Behind VPN
What Technology Lies Behind VPNSovello Hildebrand
 
network security / information security
network security / information securitynetwork security / information security
network security / information securityRohan Choudhari
 
Web technology-guide
Web technology-guideWeb technology-guide
Web technology-guideSrihari
 
TCP - TCP breaks data into manageable packets and tracks information.pdf
TCP - TCP breaks data into manageable packets and tracks information.pdfTCP - TCP breaks data into manageable packets and tracks information.pdf
TCP - TCP breaks data into manageable packets and tracks information.pdfanjanacottonmills
 
Trisul Trai compliance
Trisul Trai complianceTrisul Trai compliance
Trisul Trai compliancetrisulnsm
 

Similar to CompTIA Security+ Guide to Network Security Fundamentals (20)

Chapter 8 Presentaion
Chapter 8 PresentaionChapter 8 Presentaion
Chapter 8 Presentaion
 
9780840024220 ppt ch08
9780840024220 ppt ch089780840024220 ppt ch08
9780840024220 ppt ch08
 
9781305094352 ppt ch08
9781305094352 ppt ch089781305094352 ppt ch08
9781305094352 ppt ch08
 
Topic22
Topic22Topic22
Topic22
 
Securityic2
Securityic2Securityic2
Securityic2
 
Cybersecurity controlling ports and network devices
Cybersecurity controlling ports and network devices Cybersecurity controlling ports and network devices
Cybersecurity controlling ports and network devices
 
topicCybersecurity_4
topicCybersecurity_4topicCybersecurity_4
topicCybersecurity_4
 
Python Fundamentals
Python FundamentalsPython Fundamentals
Python Fundamentals
 
gkk_2021123rg5hSecurity essentials domain 2
gkk_2021123rg5hSecurity essentials   domain 2gkk_2021123rg5hSecurity essentials   domain 2
gkk_2021123rg5hSecurity essentials domain 2
 
gkkSecurity essentials domain 2
gkkSecurity essentials   domain 2gkkSecurity essentials   domain 2
gkkSecurity essentials domain 2
 
gkk20211e4djwew4dSecurity essentials domain 2
gkk20211e4djwew4dSecurity essentials   domain 2gkk20211e4djwew4dSecurity essentials   domain 2
gkk20211e4djwew4dSecurity essentials domain 2
 
Module 7 Firewalls Part - 2 Presentation
Module 7 Firewalls Part - 2 PresentationModule 7 Firewalls Part - 2 Presentation
Module 7 Firewalls Part - 2 Presentation
 
Network security
Network securityNetwork security
Network security
 
What Technology Lies Behind VPN
What Technology Lies Behind VPNWhat Technology Lies Behind VPN
What Technology Lies Behind VPN
 
network security / information security
network security / information securitynetwork security / information security
network security / information security
 
Web technology-guide
Web technology-guideWeb technology-guide
Web technology-guide
 
TCP - TCP breaks data into manageable packets and tracks information.pdf
TCP - TCP breaks data into manageable packets and tracks information.pdfTCP - TCP breaks data into manageable packets and tracks information.pdf
TCP - TCP breaks data into manageable packets and tracks information.pdf
 
Orascom-tehnical study final
Orascom-tehnical study finalOrascom-tehnical study final
Orascom-tehnical study final
 
Trisul Trai compliance
Trisul Trai complianceTrisul Trai compliance
Trisul Trai compliance
 
9780840024220 ppt ch04
9780840024220 ppt ch049780840024220 ppt ch04
9780840024220 ppt ch04
 

More from Dr. Ahmed Al Zaidy

Chapter 14 Exploring Object-based Programming
Chapter 14 Exploring Object-based ProgrammingChapter 14 Exploring Object-based Programming
Chapter 14 Exploring Object-based ProgrammingDr. Ahmed Al Zaidy
 
Chapter 13 Programming for web forms
Chapter 13 Programming for web formsChapter 13 Programming for web forms
Chapter 13 Programming for web formsDr. Ahmed Al Zaidy
 
Chapter 12 Working with Document nodes and style sheets
Chapter 12 Working with Document nodes and style sheetsChapter 12 Working with Document nodes and style sheets
Chapter 12 Working with Document nodes and style sheetsDr. Ahmed Al Zaidy
 
Chapter 11 Working with Events and Styles
Chapter 11 Working with Events and StylesChapter 11 Working with Events and Styles
Chapter 11 Working with Events and StylesDr. Ahmed Al Zaidy
 
Chapter 10 Exploring arrays, loops, and conditional statements
Chapter 10 Exploring arrays, loops, and conditional statementsChapter 10 Exploring arrays, loops, and conditional statements
Chapter 10 Exploring arrays, loops, and conditional statementsDr. Ahmed Al Zaidy
 
Chapter 9 Getting Started with JavaScript
Chapter 9 Getting Started with JavaScriptChapter 9 Getting Started with JavaScript
Chapter 9 Getting Started with JavaScriptDr. Ahmed Al Zaidy
 
Chapter 8 Enhancing a website with multimedia
Chapter 8 Enhancing a website with multimediaChapter 8 Enhancing a website with multimedia
Chapter 8 Enhancing a website with multimediaDr. Ahmed Al Zaidy
 
Chapter 7 Designing a web form
Chapter 7 Designing a web formChapter 7 Designing a web form
Chapter 7 Designing a web formDr. Ahmed Al Zaidy
 
Chapter 6 Working with Tables and Columns
Chapter 6 Working with Tables and ColumnsChapter 6 Working with Tables and Columns
Chapter 6 Working with Tables and ColumnsDr. Ahmed Al Zaidy
 
Chapter 5 Designing for the mobile web
Chapter 5 Designing for the mobile webChapter 5 Designing for the mobile web
Chapter 5 Designing for the mobile webDr. Ahmed Al Zaidy
 
Chapter 4 Graphic Design with CSS
Chapter 4 Graphic Design with CSSChapter 4 Graphic Design with CSS
Chapter 4 Graphic Design with CSSDr. Ahmed Al Zaidy
 
Chapter 3 Designing a Page Layout
Chapter 3 Designing a Page LayoutChapter 3 Designing a Page Layout
Chapter 3 Designing a Page LayoutDr. Ahmed Al Zaidy
 
Chapter 2 Getting Started with CSS
Chapter 2 Getting Started with CSSChapter 2 Getting Started with CSS
Chapter 2 Getting Started with CSSDr. Ahmed Al Zaidy
 
Chapter 1 Getting Started with HTML5
Chapter 1 Getting Started with HTML5Chapter 1 Getting Started with HTML5
Chapter 1 Getting Started with HTML5Dr. Ahmed Al Zaidy
 
testing throughout-the-software-life-cycle-section-2
testing throughout-the-software-life-cycle-section-2testing throughout-the-software-life-cycle-section-2
testing throughout-the-software-life-cycle-section-2Dr. Ahmed Al Zaidy
 
Chapter 13 Vulnerability Assessment and Data Security
Chapter 13 Vulnerability Assessment and Data SecurityChapter 13 Vulnerability Assessment and Data Security
Chapter 13 Vulnerability Assessment and Data SecurityDr. Ahmed Al Zaidy
 

More from Dr. Ahmed Al Zaidy (19)

Chapter 14 Exploring Object-based Programming
Chapter 14 Exploring Object-based ProgrammingChapter 14 Exploring Object-based Programming
Chapter 14 Exploring Object-based Programming
 
Chapter 13 Programming for web forms
Chapter 13 Programming for web formsChapter 13 Programming for web forms
Chapter 13 Programming for web forms
 
Chapter 12 Working with Document nodes and style sheets
Chapter 12 Working with Document nodes and style sheetsChapter 12 Working with Document nodes and style sheets
Chapter 12 Working with Document nodes and style sheets
 
Chapter 11 Working with Events and Styles
Chapter 11 Working with Events and StylesChapter 11 Working with Events and Styles
Chapter 11 Working with Events and Styles
 
Chapter 10 Exploring arrays, loops, and conditional statements
Chapter 10 Exploring arrays, loops, and conditional statementsChapter 10 Exploring arrays, loops, and conditional statements
Chapter 10 Exploring arrays, loops, and conditional statements
 
Chapter 9 Getting Started with JavaScript
Chapter 9 Getting Started with JavaScriptChapter 9 Getting Started with JavaScript
Chapter 9 Getting Started with JavaScript
 
Chapter 8 Enhancing a website with multimedia
Chapter 8 Enhancing a website with multimediaChapter 8 Enhancing a website with multimedia
Chapter 8 Enhancing a website with multimedia
 
Chapter 7 Designing a web form
Chapter 7 Designing a web formChapter 7 Designing a web form
Chapter 7 Designing a web form
 
Chapter 6 Working with Tables and Columns
Chapter 6 Working with Tables and ColumnsChapter 6 Working with Tables and Columns
Chapter 6 Working with Tables and Columns
 
Chapter 5 Designing for the mobile web
Chapter 5 Designing for the mobile webChapter 5 Designing for the mobile web
Chapter 5 Designing for the mobile web
 
Chapter 4 Graphic Design with CSS
Chapter 4 Graphic Design with CSSChapter 4 Graphic Design with CSS
Chapter 4 Graphic Design with CSS
 
Chapter 3 Designing a Page Layout
Chapter 3 Designing a Page LayoutChapter 3 Designing a Page Layout
Chapter 3 Designing a Page Layout
 
Chapter 2 Getting Started with CSS
Chapter 2 Getting Started with CSSChapter 2 Getting Started with CSS
Chapter 2 Getting Started with CSS
 
Chapter 1 Getting Started with HTML5
Chapter 1 Getting Started with HTML5Chapter 1 Getting Started with HTML5
Chapter 1 Getting Started with HTML5
 
Integer overflows
Integer overflowsInteger overflows
Integer overflows
 
testing throughout-the-software-life-cycle-section-2
testing throughout-the-software-life-cycle-section-2testing throughout-the-software-life-cycle-section-2
testing throughout-the-software-life-cycle-section-2
 
Fundamental of testing
Fundamental of testingFundamental of testing
Fundamental of testing
 
Chapter 13 Vulnerability Assessment and Data Security
Chapter 13 Vulnerability Assessment and Data SecurityChapter 13 Vulnerability Assessment and Data Security
Chapter 13 Vulnerability Assessment and Data Security
 
Chapter 12 Access Management
Chapter 12 Access ManagementChapter 12 Access Management
Chapter 12 Access Management
 

Recently uploaded

Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...RKavithamani
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 

Recently uploaded (20)

Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 

CompTIA Security+ Guide to Network Security Fundamentals

  • 1. 1 CompTIA Security+ Guide to Network Security Fundamentals, Sixth Edition Chapter 7 Administering a Secure Network © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 2. Objectives 7.1 List and describe the functions of secure network protocols 7.2 Explain the placement of security devices and technologies 7.3 Tell how security data can be analyzed 7.4 Explain how to manage and secure network platforms © 2018 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password- protected website for classroom use.
  • 3. 3 Secure Network Protocols (1 of 4) • Protocols • Rules for communication • Essential for proper communication between network devices • Transmission Control Protocol/Internet Protocol (TCP/IP) • Most common protocol suite used for local area networks and the Internet • Comprises several protocols that all function together © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 4. 4 Secure Network Protocols (2 of 4) • IP • Protocol that functions primarily at Open Systems Interconnection (OSI) Network Layer (Layer 3) • Provides network addressing and routing • TCP • Transport Layer (Layer 4) protocol • Establishes connections and ensures reliable data transport between devices • TCP/IP uses a four layer architecture • Network Interface, Internet, Transport, Application © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 5. 5 Secure Network Protocols (3 of 4) © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 6. 6 Secure Network Protocols (4 of 4) • Several basic TCP/IP Protocols that relate to security: • Simple Network Management Protocol (SNMP) • Domain Name System (DNS) • File Transfer Protocol • There are also email protocols that are not natively secure • Steps can be taken to protect email correspondence © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 7. 7 Simple Network Management Protocol (SNMP) (1 of 2) • Used to manage network equipment and is supported by most network equipment manufacturers • Allows administrators to remotely monitor, manage, and configure network devices • Functions by exchanging management information between network devices • Each SNMP-managed device has an agent or a service • Listens for and executes commands © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 8. 8 Simple Network Management Protocol (SNMP) (2 of 2) • Agents are password protected • Password is known as a community string • Security vulnerabilities were present in SMNP versions 1 and 2 • Version 3 uses usernames and passwords along with encryption to address vulnerabilities © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 9. 9 Domain Name System (DNS) (1 of 3) • DNS • A TCP/IP protocol that maps IP addresses to their symbolic name • The DNS database is organized as a hierarchy • Database consists of the name of a site and a corresponding IP number • The database is distributed to many different servers on the Internet • To prevent bottlenecking and to ensure efficiency © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 10. 10 Domain Name System (DNS) (2 of 3) © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 11. 11 Domain Name System (DNS) (3 of 3) • DNS is often the focus of attacks • DNS poisoning substitutes fraudulent IP address -Can be done in local host table or external DNS server -Can be thwarted by using Domain Name System Security Extensions (DNSSEC) -DNSSEC adds additional resource records and message header information which can be used to verify the requested data has not been altered in transmission • Attacker asks the valid DNS for a zone transfer -A zone transfer allows attacker access to network, hardware, and operating system information © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 12. 12 File Transfer Protocol (FTP) (1 of 4) • TCP/IP protocol used for transferring files • File transfer protocol (FTP) – an unsecure protocol used to connect to an FTP server • Methods for using FTP on local host computer • From a command prompt • Using a web browser • Using an FTP client © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 13. 13 File Transfer Protocol (FTP) (2 of 4) © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 14. 14 File Transfer Protocol (FTP) (3 of 4) • Using FTP behind a firewall can present challenges • FTP uses two ports -Port 21 is the FTP control part -Port 20 is the data port • FTP active mode -Client’s firewall may sometimes drop packets on Port 20 (the data channel connection) • FTP passive mode -The client sends a PASV command to the command channel and the server responds with the TCP port number to use to establish the data channel © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 15. 15 File Transfer Protocol (FTP) (4 of 4) • FTP vulnerabilities • Does not use encryption • Files transferred using FTP are vulnerable to man-in-the-middle attacks • Secure transmission options over FTP • Secure sockets layer (FTPS) encrypts commands -Uses SSL or TLS to encrypt commands sent over the control port (port 21); data port may not be encrypted • Secure FTP (SFTP) -Uses only a single TCP port instead of two ports -All data and commands are encrypted © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 16. 16 Secure Email Protocols • Secure/Multipurpose Internet Mail Extensions (S/MIME) • A protocol for securing email messages • S/MIME has limitations: • Cannot be used when mail is accessed through a web browser instead of a dedicated email application • Because S/MIME encrypts the entire message, this makes it difficult for any third-party tools that inspect email for malware -Because it also would be encrypted • Some enterprises and government agencies automate encrypting and decrypting email • Use a mail gateway appliance © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 17. 17 Using Secure Network Protocols Application or technology Recommended secure protocol Voice and video Secure Real-time Transport Protocol (SRTP) Time synchronization Network Time Protocol (NTP) Email Secure/Multipurpose Internet Mail Extensions (S/MIME) Web browsing Hypertext Transport Protocol Secure (HTTPS) File transfer Secure FTP (SFTP) Remote access Virtual Private Network (VPN) Domain name resolution DNS Security Extensions (DNSSEC) Routing and switching IP Security (IPsec) Network address translation IP Security (IPsec) Subscription services IP Security (IPsec) © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 18. 18 Placement of Security Devices and Technologies (1 of 5) • The protection that security devices provide can be easily negated if those devices are not properly located in the network architecture • SSL/TLS accelerator – a separate hardware card that inserts into a web server that contains co-processors to handle SSL/TLS processing • a SSL/TLS hardware module can be installed as a “virtual SSL/TLS server” alongside the forward proxy server • Port mirrors – allows the administrator to configure a switch to copy traffic that occurs on some or all ports to a designated port on the switch (see Figure 7-4) • Network tap (test access point) – a device that can monitor traffic (see Figure 7-5) © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 19. 19 Placement of Security Devices and Technologies (2 of 5) © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 20. 20 Placement of Security Devices and Technologies (3 of 5) © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 21. 21 Placement of Security Devices and Technologies (4 of 5) • Sensors, collectors, and filters – should be placed where the stream of data is largest • Sensors – monitor traffic for network intrusion detection and prevention devices • Collectors – gather traffic for SIEM devices • Filters – block traffic for Internet content filters © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 22. 22 Placement of Security Devices and Technologies (5 of 5) • Aggregation switch – used to combine multiple network connections into a single link • Should be located between routers and servers where they can detect and stop attacks directed at a server or application • Correlation engine – aggregates and correlates content from different sources to uncover an attack • Should be in the protected internal network using data collected from the logs of different hardware devices • DDoS mitigator – a hardware device that identifies and blocks real-time distributed denial of service (DDoS) attacks • Should be in the network where they can monitor the largest stream of data © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 23. 23 Analyzing Security Data (1 of 2) • Security logs • Can reveal types of attacks that are being directed at the network and if attacks were successful • Access logs • Provide details regarding requests for specific files • Audit logs • Used to record which user performed an action • Event logs • Document any unsuccessful events and the most significant successful events © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 24. 24 Analyzing Security Data (2 of 2) • A routine review of logs helps to identify: • Security incidents • Policy violations • Fraudulent activity • Operational problems • Logs can be useful for: • Performing auditing analysis • Supporting the organization’s internal investigations • Identifying operational trends and long-term problems • Logs can provide documentation that the organization is complying with laws and regulatory requirements © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 25. 25 Data from Security Devices • Almost every hardware device designed for security can generate logs • Firewall log items to be examined • IP addresses rejected and dropped • Probes to ports that have no application services on them • Source-routed packets • Suspicious outbound connections • Unsuccessful logins © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 26. 26 Data from Security Software • Security software can produce important data that can be analyzed • Data Execution Prevention (DEP) • A Microsoft Windows feature that prevents attackers from using buffer overflow to execute malware • DEP events and those from similar software can be logged along with the level of severity • File integrity check (FIC) • A service that can monitor any changes made to computer files, such as OS files • These changes can compromise security and indicate a security breach has occurred © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 27. 27 Data from Security Tools Tool Description Explanation Application Whitelisting A whitelist is an inventory of applications and associated components that have been pre-approved and authorized to be active and present on the device Application whitelisting technologies are designed to permit only known good activity and block everything else Removable media control Removable media control is a tool that can be used to restrict which removable media can be attached to a system Removable media can introduce malware into a system and be used to steal valuable information Advanced malware management Often a third-party service, advanced malware management tools monitor a network for any unusual activity Advanced malware management tools often use experience-based techniques such as heuristic monitoring to determine if a threat exists © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 28. 28 Issues in Analyzing Security Data (1 of 2) • There are issues with log management • Generating, transmitting, storing, analyzing, and disposing of computer security log data • This is due to: • Multiple devices generating logs • Very large volume of data • Different log formats • A solution: • Use a centralized device log analyzer © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 29. 29 Issues in Analyzing Security Data (2 of 2) © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 30. 30 Managing and Securing Network Platforms • Some applications and platforms require special security considerations: • Virtualization • Cloud computing • Software defined networking © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 31. 31 Virtualization (1 of 7) • Virtualization • A means of managing and presenting computer resources without regard to physical layout or location • Host virtualization • An entire operating system environment is simulated • Virtual machine - a simulated software-based emulation of a computer • The host system runs a hypervisor that manages the virtual operating systems and supports one or more guest systems © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 32. 32 Virtualization (2 of 7) • The VM monitor program is called a hypervisor • Manages the VM operating systems • Two types of hypervisor: • Type I – runs directly on the computer’s hardware instead of the underlying OS • Type II – run on the host OS, much like an application © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 33. 33 Virtualization (3 of 7) • Container or application cell • Holds only the necessary OS components that are needed for that specific application to run • Reduces the necessary hard drive storage space and RAM needed • Allows for containers to start more quickly because the OS does not have to be started © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 34. 34 Virtualization (4 of 7) • Virtual Desktop Infrastructure (VDI) • The process of running a user desktop inside a VM that resides on a server • Enables personalized desktops for each user to be available on any computer or device that can access the server • Allows centralized management of all virtual desktops • Virtual Distributed Ethernet (VDE) • An Ethernet-compliant virtual network that can connect physical computers and/or virtual machines together © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 35. 35 Virtualization (5 of 7) • Virtualization advantages • New virtual server machines can be made available (host availability) and resources can easily be expanded or contracted as needed (host elasticity) • Can reduce costs -Fewer physical computers must be purchased and maintained • Can provided uninterrupted server access to users -Supports live migration which allows a virtual machine to be moved to a different physical computer with no impact to users © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 36. 36 Virtualization (6 of 7) • Security-related advantages of virtualization: • Test latest security updates by downloading on a virtual machine before installing on production computers • A snapshot of a particular state of a virtual machine can be saved for later use • Testing the existing security configuration (security control testing) can be performed using a simulated network environment • A suspicious program can be loaded into an isolated virtual machine and executed (sandboxing) -If malware, only the virtual machine will be impacted © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 37. 37 Virtualization (7 of 7) • Security concerns for virtualized environments: • Not all hypervisors have the necessary security controls to keep out attackers • Existing security tools were designed for single physical servers • VMs must be protected from both outside networks and other VMs on the same physical computer • VMs may be able to “escape” from the contained environment and directly interact with the host OS -Important to have virtual machine escape protection • Virtual machine sprawl -The widespread proliferation of VMs without proper oversight or management © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 38. 38 Cloud Computing (1 of 3) • On-premises model • Enterprises in the past purchased all the hardware and software necessary to run the organization • Resulted in spiraling costs • Hosted services • Servers, storage, and the supporting networking infrastructure are shared by multiple enterprises over a remote network connection • Cloud computing • A model for enabling convenient, on-demand network access to a shared pool of configurable computing resources • It is a pay-per-use computing model -Customers pay for only the resources they need © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 39. 39 Cloud Computing (2 of 3) • Types of clouds • Public cloud • Community cloud • Private cloud • Hybrid cloud • Four service models in cloud computing: • Software as a Service (SaaS) - Vendor provides access to the vendor’s software applications running on a cloud infrastructure • Platform as a Service (PaaS) - Consumers install and run their own specialized applications on the cloud computing network • Infrastructure as a Service (IaaS) - Vendor allows customers to deploy and run their own software, including OSs and applications • Security as a Service (SECaaS) - All security services are delivered from the cloud to the enterprise © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 40. 40 Cloud Computing (3 of 3) • Cloud computing security challenges • Cloud provider must guarantee means to approve authorized users and deny imposters • Transmissions from the cloud must be protected • Customers’ data must be isolated from other customers • The highest level of application availability and security must be maintained • Cloud access security broker (CASB) • A set of software tools or services that resides between the enterprises’ on- premises infrastructure and the cloud provider’s infrastructure • Acts as a “gatekeeper” • Ensures that the security policies of the enterprise extend to its data in the cloud © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 41. 41 Software Defined Network (SDN) (1 of 2) • Software defined network (SDN) • Virtualizes parts of the physical network so that it can be more quickly and easily reconfigured • Accomplished by separating the control plane from the data plane © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 42. 42 Software Defined Network (SDN) (2 of 2) • If traffic needs to flow through the network • It receives permission from the SDN controller, which verifies the communication is permitted by the network policy of the enterprise • Once approved, the SDN controller computes a route for the flow to take • Adds an entry for that flow in each of the switches along the path • SDN s can provide stronger protection • Simplifies extending VLAN beyond the perimeter of the building, which can help secure data • An SDN can ensure that all network traffic is routed through a firewall • Can help capture data for NIDS and NIPS © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 43. 43 Chapter Summary (1 of 2) • TCP/IP is the most common protocol for LANs and the Internet • Protocols for transferring files • FTP and FTPS • The correct placement of security devices is essential for protection • An SSL/TLS accelerator can be a separate hardware card or a separate SSL/TLS hardware module installed as a “virtual SSL server” • Monitoring traffic on switches can be done in two ways: • A managed switch that supports port mirroring • Install a network tap (test access point) © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 44. 44 Chapter Summary (2 of 2) • A log is a record of events that occur • Security logs are particularly important because they can reveal the types of attacks that are being directed at the network • A solution to log management is to use a centralized device log analyzer • Some applications and platforms require special security considerations • Virtualization • Cloud computing • Software defined network (SDN) © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.