SlideShare a Scribd company logo
Module 1: Securing
Networks
Networking Security v1.0
(NETSEC)
2
© 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Module Objectives
Module Title: Securing Networks
Module Objective: Explain network security.
Topic Title Topic Objective
Current State of Affairs Describe the current network security landscape.
Network Topology Overview Describe how all types of networks need to be protected.
© 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
1.1 Current State of Affairs
3
© 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Current State of Affairs
Networks Are Targets
Networks are routinely under
attack. A quick internet search for
network attacks will return many
articles about them. Kapersky
maintains the interactive
Cyberthreat Real-Time Map
display of current network attacks.
The attack data is submitted from
Kapersky network security
products that are deployed
worldwide.
4
© 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Current State of Affairs
Reasons for Network Security
Network security breaches can disrupt e-commerce, cause the loss of business data, threaten people’s privacy,
and compromise the integrity of information. The Cisco Talos Intelligence Group website provides
comprehensive security and threat intelligence. The Cisco Product Security Incident Response Team (PSIRT),
is responsible for investigating and mitigating potential vulnerabilities in Cisco products.
5
© 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Current State of Affairs
Vectors of Network Attacks
An attack vector is a path by which a threat actor can gain access to a server, host, or network. Attack vectors
originate from inside or outside the corporate network. Threat actors may target a network through the internet,
to disrupt network operations and create a denial of service (DoS) attack.)
6
© 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Current State of Affairs
Data Loss
Term Definition
Email/Social Networking The most common vector for data loss includes instant messaging software and social media
sites. For instance, intercepted email or IMs could be captured and confidential information
revealed.
Unencrypted Devices A stolen corporate laptop typically contains confidential organizational data. If the data is not
stored using an encryption algorithm, the thief can retrieve valuable confidential data.
Cloud Storage Devices Saving data to the cloud has many potential benefits. However, sensitive data can be lost if
access to the cloud is compromised due to weak security settings.
Removable Media One risk is that an employee could perform an unauthorized transfer of data to a USB drive.
Another risk is that a USB drive containing valuable corporate data could be lost.
Hard Copy Sensitive data should be disposed of thoroughly. For example, confidential data should be
shredded when no longer required. Otherwise, a thief could retrieve discarded reports and
gain valuable information.
Improper Access Control Passwords are the first line of defense. Stolen passwords or weak passwords which have been
compromised can provide an attacker easy access to data.
7
© 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Current State of Affairs
Video - Anatomy of an Attack
8
© 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
1.2 Network Topology
Overview
9
© 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Network Topology Overview
Campus Area Networks
Term Definition
VPN The Cisco ISR is secured. It protects data in motion that is flowing from the CAN to the outside world by establishing
Virtual Private Networks (VPNs). VPNs ensure data confidentiality and integrity from authenticated sources.
ASA Firewall A Cisco Adaptive Security Appliance (ASA) firewall performs stateful packet filtering to filter return traffic from the
outside network into the campus network.
IPS A Cisco Intrusion Prevention System (IPS) device continuously monitors incoming and outgoing network traffic for
malicious activity. It logs information about the activity and attempts to block and report it.
Layer 3 Switches These distribution layer switches are secured and provide secure redundant trunk connections to the Layer 2 switches.
Several different security features can be implemented, such as ACLs, DHCP snooping, Dynamic ARP Inspection (DAI), and
IP source guard.
Layer 2 Switches These access layer switches are secured and connect user-facing ports to the network. Several different security features
can be implemented, such as port security, DHCP snooping, and 802.1X user authentication.
AAA Server An authentication, authorization, and accounting (AAA) server authenticates users, authorizes what they are allowed to
do, and tracks what they are doing.
Hosts End points are secured using various features including antivirus and antimalware software, Host Intrusion Protection
System features, and 802.1X authentication features.
10
© 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Network Topology Overview
Small Office and Home Office Networks
The figure displays a sample SOHO secured
with a consumer-grade wireless router which
provides integrated firewall features and
secure wireless connections. The Layer 2
Switch is an access layer switch that is
hardened with various security measures. It
connects user-facing ports that use port
security to the SOHO network. Wireless hosts
connect to the wireless network using WPA2
data encryption technology. Hosts typically
have antivirus and antimalware software
installed. Combined, these security measures
provide comprehensive defense at different
layers of the network.
11
© 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Network Topology Overview
Wide Area Networks
Wide Area Networks (WANs) span a
wide geographical area, often over the
public internet. Organizations must
ensure secure transport for the data in
motion as it travels between sites over
the public network. Network security
professionals must use secure devices
on the edge of the network. In the
figure, the main site is protected by an
Adaptive Security Appliance (ASA),
which provides stateful firewall
features and establishes secure Virtual
Private Network (VPN) tunnels to
various destinations.
12
© 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Network Topology Overview
Data Center Networks
Data center networks are typically housed in an off-site facility to store sensitive or proprietary data.
These sites are connected to corporate sites using VPN technology with ASA devices and integrated
data center switches. Because they store such vast quantities of sensitive, business-critical
information, physical security is critical to their operation. Physical security not only protects access to
the facility but also protects people and equipment. For example, fire alarms, sprinklers, seismically-
braced server racks, redundant heating, ventilation, and air conditioning (HVAC), and UPS systems
are in place to protect people, equipment, and data.
Data center physical security can be divided into two areas:
• Outside perimeter security - This can include on-premise security officers, fences, gates,
continuous video surveillance, and security breach alarms.
• Inside perimeter security - This can include continuous video surveillance, electronic motion
detectors, security traps, and biometric access and exit sensors.
13
Network Security v1.0 - Module 1.pptx

More Related Content

What's hot

Happy Windows Automation with Ansible
Happy Windows Automation with AnsibleHappy Windows Automation with Ansible
Happy Windows Automation with Ansible
sugoto
 
Putting Firepower Into The Next Generation Firewall
Putting Firepower Into The Next Generation FirewallPutting Firepower Into The Next Generation Firewall
Putting Firepower Into The Next Generation Firewall
Cisco Canada
 
Ixgbe internals
Ixgbe internalsIxgbe internals
Ixgbe internals
SUSE Labs Taipei
 
High availability virtualization with proxmox
High availability virtualization with proxmoxHigh availability virtualization with proxmox
High availability virtualization with proxmox
Oriol Izquierdo Vibalda
 
IP-VPN
IP-VPNIP-VPN
平成生まれのための MINIX 講座
平成生まれのための MINIX 講座平成生まれのための MINIX 講座
平成生まれのための MINIX 講座
TAKANO Mitsuhiro
 
Cisco ASA Firewalls
Cisco ASA FirewallsCisco ASA Firewalls
Cisco ASA Firewalls
Bryley Systems Inc.
 
From Cisco ACS to ISE
From Cisco ACS to ISE From Cisco ACS to ISE
From Cisco ACS to ISE
Mahzad Zahedi
 
今さら聞けない人のためのKubernetes超入門
今さら聞けない人のためのKubernetes超入門今さら聞けない人のためのKubernetes超入門
今さら聞けない人のためのKubernetes超入門
VirtualTech Japan Inc./Begi.net Inc.
 
C++でNVMeと(*´Д`)ハァハァ 戯れていたら一年経ってた。
C++でNVMeと(*´Д`)ハァハァ 戯れていたら一年経ってた。C++でNVMeと(*´Д`)ハァハァ 戯れていたら一年経ってた。
C++でNVMeと(*´Д`)ハァハァ 戯れていたら一年経ってた。
hiyohiyo
 
IETF111 RATS: Remote Attestation ProcedureS 報告
IETF111 RATS: Remote Attestation ProcedureS 報告IETF111 RATS: Remote Attestation ProcedureS 報告
IETF111 RATS: Remote Attestation ProcedureS 報告
Kuniyasu Suzaki
 
ACI Hands-on Lab
ACI Hands-on LabACI Hands-on Lab
ACI Hands-on Lab
Cisco Canada
 
Network Automation with Ansible
Network Automation with AnsibleNetwork Automation with Ansible
Network Automation with Ansible
Anas
 
Site-to-Site IPSEC VPN Between Cisco ASA and Pfsense
Site-to-Site IPSEC VPN Between Cisco ASA and PfsenseSite-to-Site IPSEC VPN Between Cisco ASA and Pfsense
Site-to-Site IPSEC VPN Between Cisco ASA and Pfsense
Harris Andrea
 
#ljstudy KVM勉強会
#ljstudy KVM勉強会#ljstudy KVM勉強会
#ljstudy KVM勉強会Etsuji Nakai
 
シスコ装置を使い倒す!組込み機能による可視化からセキュリティ強化
シスコ装置を使い倒す!組込み機能による可視化からセキュリティ強化シスコ装置を使い倒す!組込み機能による可視化からセキュリティ強化
シスコ装置を使い倒す!組込み機能による可視化からセキュリティ強化
シスコシステムズ合同会社
 
Mikrotik Hotspot
Mikrotik HotspotMikrotik Hotspot
Mikrotik Hotspot
GLC Networks
 
Layer 3 redundancy hsrp
Layer 3 redundancy   hsrpLayer 3 redundancy   hsrp
Layer 3 redundancy hsrp
Edgardo Scrimaglia
 
Ethernetの受信処理
Ethernetの受信処理Ethernetの受信処理
Ethernetの受信処理
Takuya ASADA
 
今話題のいろいろなコンテナランタイムを比較してみた
今話題のいろいろなコンテナランタイムを比較してみた今話題のいろいろなコンテナランタイムを比較してみた
今話題のいろいろなコンテナランタイムを比較してみた
Kohei Tokunaga
 

What's hot (20)

Happy Windows Automation with Ansible
Happy Windows Automation with AnsibleHappy Windows Automation with Ansible
Happy Windows Automation with Ansible
 
Putting Firepower Into The Next Generation Firewall
Putting Firepower Into The Next Generation FirewallPutting Firepower Into The Next Generation Firewall
Putting Firepower Into The Next Generation Firewall
 
Ixgbe internals
Ixgbe internalsIxgbe internals
Ixgbe internals
 
High availability virtualization with proxmox
High availability virtualization with proxmoxHigh availability virtualization with proxmox
High availability virtualization with proxmox
 
IP-VPN
IP-VPNIP-VPN
IP-VPN
 
平成生まれのための MINIX 講座
平成生まれのための MINIX 講座平成生まれのための MINIX 講座
平成生まれのための MINIX 講座
 
Cisco ASA Firewalls
Cisco ASA FirewallsCisco ASA Firewalls
Cisco ASA Firewalls
 
From Cisco ACS to ISE
From Cisco ACS to ISE From Cisco ACS to ISE
From Cisco ACS to ISE
 
今さら聞けない人のためのKubernetes超入門
今さら聞けない人のためのKubernetes超入門今さら聞けない人のためのKubernetes超入門
今さら聞けない人のためのKubernetes超入門
 
C++でNVMeと(*´Д`)ハァハァ 戯れていたら一年経ってた。
C++でNVMeと(*´Д`)ハァハァ 戯れていたら一年経ってた。C++でNVMeと(*´Д`)ハァハァ 戯れていたら一年経ってた。
C++でNVMeと(*´Д`)ハァハァ 戯れていたら一年経ってた。
 
IETF111 RATS: Remote Attestation ProcedureS 報告
IETF111 RATS: Remote Attestation ProcedureS 報告IETF111 RATS: Remote Attestation ProcedureS 報告
IETF111 RATS: Remote Attestation ProcedureS 報告
 
ACI Hands-on Lab
ACI Hands-on LabACI Hands-on Lab
ACI Hands-on Lab
 
Network Automation with Ansible
Network Automation with AnsibleNetwork Automation with Ansible
Network Automation with Ansible
 
Site-to-Site IPSEC VPN Between Cisco ASA and Pfsense
Site-to-Site IPSEC VPN Between Cisco ASA and PfsenseSite-to-Site IPSEC VPN Between Cisco ASA and Pfsense
Site-to-Site IPSEC VPN Between Cisco ASA and Pfsense
 
#ljstudy KVM勉強会
#ljstudy KVM勉強会#ljstudy KVM勉強会
#ljstudy KVM勉強会
 
シスコ装置を使い倒す!組込み機能による可視化からセキュリティ強化
シスコ装置を使い倒す!組込み機能による可視化からセキュリティ強化シスコ装置を使い倒す!組込み機能による可視化からセキュリティ強化
シスコ装置を使い倒す!組込み機能による可視化からセキュリティ強化
 
Mikrotik Hotspot
Mikrotik HotspotMikrotik Hotspot
Mikrotik Hotspot
 
Layer 3 redundancy hsrp
Layer 3 redundancy   hsrpLayer 3 redundancy   hsrp
Layer 3 redundancy hsrp
 
Ethernetの受信処理
Ethernetの受信処理Ethernetの受信処理
Ethernetの受信処理
 
今話題のいろいろなコンテナランタイムを比較してみた
今話題のいろいろなコンテナランタイムを比較してみた今話題のいろいろなコンテナランタイムを比較してみた
今話題のいろいろなコンテナランタイムを比較してみた
 

Similar to Network Security v1.0 - Module 1.pptx

Network Security v1.0 Network Security v
Network Security v1.0 Network Security vNetwork Security v1.0 Network Security v
Network Security v1.0 Network Security v
SYYULIANISKOMMT
 
CSE_Instructor_Materials_Chapter7.pptx
CSE_Instructor_Materials_Chapter7.pptxCSE_Instructor_Materials_Chapter7.pptx
CSE_Instructor_Materials_Chapter7.pptx
Mohammad512578
 
Residency research makeup project acme enterprise scenario resi
Residency research makeup project acme enterprise scenario resiResidency research makeup project acme enterprise scenario resi
Residency research makeup project acme enterprise scenario resi
SHIVA101531
 
Cisco cybersecurity essentials chapter - 2
Cisco cybersecurity essentials chapter - 2Cisco cybersecurity essentials chapter - 2
Cisco cybersecurity essentials chapter - 2
Mukesh Chinta
 
Lecture 07 networking
Lecture 07 networkingLecture 07 networking
Lecture 07 networking
HNDE Labuduwa Galle
 
Web Server Security Guidelines
Web Server Security GuidelinesWeb Server Security Guidelines
Web Server Security Guidelines
webhostingguy
 
Access Control For Local Area Network Performance Essay
Access Control For Local Area Network Performance EssayAccess Control For Local Area Network Performance Essay
Access Control For Local Area Network Performance Essay
Dotha Keller
 
Acme Enterprise Scenario Residency WeekAcme Enterprise is a pr.docx
Acme Enterprise Scenario Residency WeekAcme Enterprise is a pr.docxAcme Enterprise Scenario Residency WeekAcme Enterprise is a pr.docx
Acme Enterprise Scenario Residency WeekAcme Enterprise is a pr.docx
MARK547399
 
Protect your guest wifi - NOW
Protect your guest wifi - NOWProtect your guest wifi - NOW
Protect your guest wifi - NOW
Joshua Sibaja
 
PROJECT REPORT.docx
PROJECT REPORT.docxPROJECT REPORT.docx
PROJECT REPORT.docx
Sakamsivasankarreddy
 
Cloud Security Solution Overview
Cloud Security Solution OverviewCloud Security Solution Overview
Cloud Security Solution Overview
Cisco Service Provider
 
Protecting the movable Endeavor with Network-Based validation and Virtual Com...
Protecting the movable Endeavor with Network-Based validation and Virtual Com...Protecting the movable Endeavor with Network-Based validation and Virtual Com...
Protecting the movable Endeavor with Network-Based validation and Virtual Com...
IOSR Journals
 
Network security
Network security Network security
Network security
Madhumithah Ilango
 
IJISRT22MAR7471.docx
IJISRT22MAR7471.docxIJISRT22MAR7471.docx
IJISRT22MAR7471.docx
ballolliemin
 
www.ijerd.com
www.ijerd.comwww.ijerd.com
www.ijerd.com
IJERD Editor
 
Seminar (network security)
Seminar (network security)Seminar (network security)
Seminar (network security)
Gaurav Dalvi
 
CCNA RS_ITN - Chapter 11
CCNA RS_ITN - Chapter 11CCNA RS_ITN - Chapter 11
CCNA RS_ITN - Chapter 11
Irsandi Hasan
 
Information Security Technology for IPv6-based IoT (Internet-of-Things)
Information Security Technology for IPv6-based IoT (Internet-of-Things)Information Security Technology for IPv6-based IoT (Internet-of-Things)
Information Security Technology for IPv6-based IoT (Internet-of-Things)
IJAEMSJORNAL
 
CCNA 1 Routing and Switching v5.0 Chapter 11
CCNA 1 Routing and Switching v5.0 Chapter 11CCNA 1 Routing and Switching v5.0 Chapter 11
CCNA 1 Routing and Switching v5.0 Chapter 11
Nil Menon
 
A Study of Data Storage Security Issues in Cloud Computing
A Study of Data Storage Security Issues in Cloud ComputingA Study of Data Storage Security Issues in Cloud Computing
A Study of Data Storage Security Issues in Cloud Computing
vivatechijri
 

Similar to Network Security v1.0 - Module 1.pptx (20)

Network Security v1.0 Network Security v
Network Security v1.0 Network Security vNetwork Security v1.0 Network Security v
Network Security v1.0 Network Security v
 
CSE_Instructor_Materials_Chapter7.pptx
CSE_Instructor_Materials_Chapter7.pptxCSE_Instructor_Materials_Chapter7.pptx
CSE_Instructor_Materials_Chapter7.pptx
 
Residency research makeup project acme enterprise scenario resi
Residency research makeup project acme enterprise scenario resiResidency research makeup project acme enterprise scenario resi
Residency research makeup project acme enterprise scenario resi
 
Cisco cybersecurity essentials chapter - 2
Cisco cybersecurity essentials chapter - 2Cisco cybersecurity essentials chapter - 2
Cisco cybersecurity essentials chapter - 2
 
Lecture 07 networking
Lecture 07 networkingLecture 07 networking
Lecture 07 networking
 
Web Server Security Guidelines
Web Server Security GuidelinesWeb Server Security Guidelines
Web Server Security Guidelines
 
Access Control For Local Area Network Performance Essay
Access Control For Local Area Network Performance EssayAccess Control For Local Area Network Performance Essay
Access Control For Local Area Network Performance Essay
 
Acme Enterprise Scenario Residency WeekAcme Enterprise is a pr.docx
Acme Enterprise Scenario Residency WeekAcme Enterprise is a pr.docxAcme Enterprise Scenario Residency WeekAcme Enterprise is a pr.docx
Acme Enterprise Scenario Residency WeekAcme Enterprise is a pr.docx
 
Protect your guest wifi - NOW
Protect your guest wifi - NOWProtect your guest wifi - NOW
Protect your guest wifi - NOW
 
PROJECT REPORT.docx
PROJECT REPORT.docxPROJECT REPORT.docx
PROJECT REPORT.docx
 
Cloud Security Solution Overview
Cloud Security Solution OverviewCloud Security Solution Overview
Cloud Security Solution Overview
 
Protecting the movable Endeavor with Network-Based validation and Virtual Com...
Protecting the movable Endeavor with Network-Based validation and Virtual Com...Protecting the movable Endeavor with Network-Based validation and Virtual Com...
Protecting the movable Endeavor with Network-Based validation and Virtual Com...
 
Network security
Network security Network security
Network security
 
IJISRT22MAR7471.docx
IJISRT22MAR7471.docxIJISRT22MAR7471.docx
IJISRT22MAR7471.docx
 
www.ijerd.com
www.ijerd.comwww.ijerd.com
www.ijerd.com
 
Seminar (network security)
Seminar (network security)Seminar (network security)
Seminar (network security)
 
CCNA RS_ITN - Chapter 11
CCNA RS_ITN - Chapter 11CCNA RS_ITN - Chapter 11
CCNA RS_ITN - Chapter 11
 
Information Security Technology for IPv6-based IoT (Internet-of-Things)
Information Security Technology for IPv6-based IoT (Internet-of-Things)Information Security Technology for IPv6-based IoT (Internet-of-Things)
Information Security Technology for IPv6-based IoT (Internet-of-Things)
 
CCNA 1 Routing and Switching v5.0 Chapter 11
CCNA 1 Routing and Switching v5.0 Chapter 11CCNA 1 Routing and Switching v5.0 Chapter 11
CCNA 1 Routing and Switching v5.0 Chapter 11
 
A Study of Data Storage Security Issues in Cloud Computing
A Study of Data Storage Security Issues in Cloud ComputingA Study of Data Storage Security Issues in Cloud Computing
A Study of Data Storage Security Issues in Cloud Computing
 

Recently uploaded

Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
Mariano Tinti
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
Zilliz
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
Daiki Mogmet Ito
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
panagenda
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
Neo4j
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
panagenda
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
Zilliz
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
tolgahangng
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
Claudio Di Ciccio
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 

Recently uploaded (20)

Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 

Network Security v1.0 - Module 1.pptx

  • 1. Module 1: Securing Networks Networking Security v1.0 (NETSEC)
  • 2. 2 © 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Module Objectives Module Title: Securing Networks Module Objective: Explain network security. Topic Title Topic Objective Current State of Affairs Describe the current network security landscape. Network Topology Overview Describe how all types of networks need to be protected.
  • 3. © 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 1.1 Current State of Affairs 3
  • 4. © 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Current State of Affairs Networks Are Targets Networks are routinely under attack. A quick internet search for network attacks will return many articles about them. Kapersky maintains the interactive Cyberthreat Real-Time Map display of current network attacks. The attack data is submitted from Kapersky network security products that are deployed worldwide. 4
  • 5. © 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Current State of Affairs Reasons for Network Security Network security breaches can disrupt e-commerce, cause the loss of business data, threaten people’s privacy, and compromise the integrity of information. The Cisco Talos Intelligence Group website provides comprehensive security and threat intelligence. The Cisco Product Security Incident Response Team (PSIRT), is responsible for investigating and mitigating potential vulnerabilities in Cisco products. 5
  • 6. © 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Current State of Affairs Vectors of Network Attacks An attack vector is a path by which a threat actor can gain access to a server, host, or network. Attack vectors originate from inside or outside the corporate network. Threat actors may target a network through the internet, to disrupt network operations and create a denial of service (DoS) attack.) 6
  • 7. © 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Current State of Affairs Data Loss Term Definition Email/Social Networking The most common vector for data loss includes instant messaging software and social media sites. For instance, intercepted email or IMs could be captured and confidential information revealed. Unencrypted Devices A stolen corporate laptop typically contains confidential organizational data. If the data is not stored using an encryption algorithm, the thief can retrieve valuable confidential data. Cloud Storage Devices Saving data to the cloud has many potential benefits. However, sensitive data can be lost if access to the cloud is compromised due to weak security settings. Removable Media One risk is that an employee could perform an unauthorized transfer of data to a USB drive. Another risk is that a USB drive containing valuable corporate data could be lost. Hard Copy Sensitive data should be disposed of thoroughly. For example, confidential data should be shredded when no longer required. Otherwise, a thief could retrieve discarded reports and gain valuable information. Improper Access Control Passwords are the first line of defense. Stolen passwords or weak passwords which have been compromised can provide an attacker easy access to data. 7
  • 8. © 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Current State of Affairs Video - Anatomy of an Attack 8
  • 9. © 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 1.2 Network Topology Overview 9
  • 10. © 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Network Topology Overview Campus Area Networks Term Definition VPN The Cisco ISR is secured. It protects data in motion that is flowing from the CAN to the outside world by establishing Virtual Private Networks (VPNs). VPNs ensure data confidentiality and integrity from authenticated sources. ASA Firewall A Cisco Adaptive Security Appliance (ASA) firewall performs stateful packet filtering to filter return traffic from the outside network into the campus network. IPS A Cisco Intrusion Prevention System (IPS) device continuously monitors incoming and outgoing network traffic for malicious activity. It logs information about the activity and attempts to block and report it. Layer 3 Switches These distribution layer switches are secured and provide secure redundant trunk connections to the Layer 2 switches. Several different security features can be implemented, such as ACLs, DHCP snooping, Dynamic ARP Inspection (DAI), and IP source guard. Layer 2 Switches These access layer switches are secured and connect user-facing ports to the network. Several different security features can be implemented, such as port security, DHCP snooping, and 802.1X user authentication. AAA Server An authentication, authorization, and accounting (AAA) server authenticates users, authorizes what they are allowed to do, and tracks what they are doing. Hosts End points are secured using various features including antivirus and antimalware software, Host Intrusion Protection System features, and 802.1X authentication features. 10
  • 11. © 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Network Topology Overview Small Office and Home Office Networks The figure displays a sample SOHO secured with a consumer-grade wireless router which provides integrated firewall features and secure wireless connections. The Layer 2 Switch is an access layer switch that is hardened with various security measures. It connects user-facing ports that use port security to the SOHO network. Wireless hosts connect to the wireless network using WPA2 data encryption technology. Hosts typically have antivirus and antimalware software installed. Combined, these security measures provide comprehensive defense at different layers of the network. 11
  • 12. © 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Network Topology Overview Wide Area Networks Wide Area Networks (WANs) span a wide geographical area, often over the public internet. Organizations must ensure secure transport for the data in motion as it travels between sites over the public network. Network security professionals must use secure devices on the edge of the network. In the figure, the main site is protected by an Adaptive Security Appliance (ASA), which provides stateful firewall features and establishes secure Virtual Private Network (VPN) tunnels to various destinations. 12
  • 13. © 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Network Topology Overview Data Center Networks Data center networks are typically housed in an off-site facility to store sensitive or proprietary data. These sites are connected to corporate sites using VPN technology with ASA devices and integrated data center switches. Because they store such vast quantities of sensitive, business-critical information, physical security is critical to their operation. Physical security not only protects access to the facility but also protects people and equipment. For example, fire alarms, sprinklers, seismically- braced server racks, redundant heating, ventilation, and air conditioning (HVAC), and UPS systems are in place to protect people, equipment, and data. Data center physical security can be divided into two areas: • Outside perimeter security - This can include on-premise security officers, fences, gates, continuous video surveillance, and security breach alarms. • Inside perimeter security - This can include continuous video surveillance, electronic motion detectors, security traps, and biometric access and exit sensors. 13