SlideShare a Scribd company logo
© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Presentation_ID 1
Chapter 1: Network
Security
Introduction to Networking
Presentation_ID 2
© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Chapter 1
1.1 Create and Grow
1.2 Keeping the Network Safe
1.3 Basic Network Performance
1.4 Managing IOS Configuration Files
1.5 Integrated Routing Services
1.6 Summary
Presentation_ID 3
© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Chapter 1: Objectives
 Explain the need for basic security measures on
network devices.
 Identify security vulnerabilities and general mitigation
techniques
Presentation_ID 4
© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Network Device Security Measures
Threats to Network Security
 Categories of Threats to Network Security
Presentation_ID 5
© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Network Device Security Measures
Physical Security
Four classes of physical threats are:
 Hardware threats - physical damage to servers, routers,
switches, cabling plant, and workstations.
 Environmental threats - temperature extremes (too hot
or too cold) or humidity extremes (too wet or too dry)
 Electrical threats - voltage spikes, insufficient supply
voltage (brownouts), unconditioned power (noise), and
total power loss
 Maintenance threats - poor handling of key electrical
components (electrostatic discharge), lack of critical
spare parts, poor cabling, and poor labeling
Presentation_ID 6
© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Network Device Security Measures
Types of Security Vulnerabilities
 Technological weaknesses
 Configuration weaknesses
 Security policy weaknesses
Presentation_ID 7
© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Vulnerabilities and Network Attacks
Viruses, Worms and Trojan Horses
 A virus - malicious software that is attached to another
program to execute a particular unwanted function on a
workstation.
 A Trojan horse - the entire application was written to
look like something else, when in fact it is an attack
tool.
 Worms - self-contained programs that attack a system
and try to exploit a specific vulnerability in the target.
The worm copies its program from the attacking host to
the newly exploited system to begin the cycle again.
Presentation_ID 8
© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Vulnerabilities and Network Attacks
Reconnaissance Attacks
Presentation_ID 9
© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Vulnerabilities and Network Attacks
Access Attacks
Presentation_ID 10
© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Vulnerabilities and Network Attacks
Denial of Service Attacks (DoS)
Presentation_ID 11
© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Mitigating Network Attacks
Backup, Upgrade, Update, and Patch
 Keep current with the latest versions of antivirus
software.
 Install updated security patches
Presentation_ID 12
© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Mitigating Network Attacks
Authentication, Authorization, and Accounting
Authentication, Authorization, and Accounting (AAA, or
“triple A”)
 Authentication - Users and administrators must prove
their identity. Authentication can be established using
username and password combinations, challenge and
response questions, token cards, and other methods.
 Authorization - which resources the user can access
and which operations the user is allowed to perform.
 Accounting - records what the user accessed, the
amount of time the resource is accessed, and any
changes made.
Presentation_ID 13
© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Mitigating Network Attacks
Firewalls
A firewall resides between two or more networks. It
controls traffic and helps prevent unauthorized access.
Methods used are:
 Packet Filtering
 Application Filtering
 URL Filtering
 Stateful Packet Inspection
(SPI) - Incoming packets
must be legitimate
responses to requests from
internal hosts.
Presentation_ID 14
© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Mitigating Network Attacks
Endpoint Security
 Common endpoints are laptops, desktops, servers,
smart phones, and tablets.
 Employees must follow the companies documented
security policies to secure their devices.
 Policies often include the use of anti-virus software and
host intrusion prevention.
Presentation_ID 15
© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Securing Devices
Introduction to Securing Devices
 Part of network security is securing devices, including
end devices and intermediate devices.
 Default usernames and passwords should be changed
immediately.
 Access to system resources should be restricted to only
the individuals that are authorized to use those
resources.
 Any unnecessary services and applications should be
turned off and uninstalled, when possible.
 Update with security patches as they become available.
Presentation_ID 16
© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Securing Devices
Passwords
Presentation_ID 17
© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Securing Devices
Basic Security Practices
 Encrypt passwords
 Require minimum length passwords
 Block brute force attacks
 Use Banner Message
 Set EXEC timeout
Presentation_ID 18
© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Securing Devices
Enable SSH
Presentation_ID 19
© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Ping
Interpreting ICMP Messages
 ! - indicates receipt of an ICMP echo reply message
 . - indicates a time expired while waiting for an ICMP
echo reply message
 U - an ICMP unreachable message was received
Presentation_ID 20
© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Ping
Leveraging Extended Ping
 The Cisco IOS offers an "extended" mode of the ping
command
R2# ping
Protocol [ip]:
Target IP address: 192.168.10.1
Repeat count [5]:
Datagram size [100]:
Timeout in seconds [2]:
Extended commands [n]: y
Source address or interface: 10.1.1.1
Type of service [0]:
Presentation_ID 21
© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Ping
Network Baseline
Presentation_ID 22
© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Tracert
Interpreting Tracert Messages
Presentation_ID 23
© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Show Commands
Common Show Commands Revisited
 The status of nearly every process or function of the
router can be displayed using a show command.
 Frequently used show commands:
show running-config
show interfaces
show arp
show ip route
show protocols
show version
Presentation_ID 24
© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Show Commands
Viewing Router Settings with Show Version
Cisco IOS version
System bootstrap
Cisco IOS image
CPU and RAM
Config. register
Number and type of
physical interfaces
Amount of NVRAM
Amount of Flash
Presentation_ID 25
© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Show Commands
Viewing Switch Settings with Show Version
Presentation_ID 26
© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Host and IOS Commands
ipconfig Command Options
 ipconfig - displays ip address, subnet mask, default
gateway.
 ipconfig /all – also displays MAC address.
 Ipconfig /displaydns - displays all cached dns entries in
a Windows system .
Presentation_ID 27
© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Host and IOS Commands
arp Command Options
Presentation_ID 28
© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Host and IOS Commands
show cdp neighbors Command Options
Presentation_ID 29
© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Host and IOS Commands
Using show ip interface brief Command
 Can be used to verify the status of all network
interfaces on a router or a switch.
Presentation_ID 30
© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Router and Switch File Systems
Router File Systems
 show file systems command - lists all of the available
file systems on a Cisco 1941 route
 * Asterisk indicates this is the current default file system
Presentation_ID 31
© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Router and Switch File Systems
Switch File Systems
 show file systems command - lists all of the available
file systems on a Catalyst 2960 switch.
Presentation_ID 32
© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Backup and Restore Configuration Files
Backup and Restore using Text Files
Presentation_ID 33
© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Backup and Restore Configuration Files
Backup and Restore using TFTP
 Configuration files can be stored on a Trivial File
Transfer Protocol (TFTP) server.
 copy running-config tftp – save running configuration to
a tftp server
 copy startup-config tftp - save startup configuration
to a tftp server
Presentation_ID 34
© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Backup and Restore Configuration Files
Using USB Interfaces on a Cisco Router
 USB flash drive must be formatted in a FAT16 format.
 Can hold multiple copies of the Cisco IOS and multiple
router configurations.
 Allows administrator to easily move configurations from
router to router.
Presentation_ID 35
© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Backup and Restore Configuration Files
Backup and Restore Using USB
Presentation_ID 36
© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Integrated Router
Multi-function Device
 Incorporates a switch, router, and wireless access point.
 Provides routing, switching and wireless connectivity.
 Linksys wireless routers, are simple in design and used
in home networks
 Cisco Integrated Services Router (ISR) product family
offers a wide range of products, designed for small office
to larger networks.
Presentation_ID 37
© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Integrated Router
Wireless Capability
 Wireless Mode -Most integrated
wireless routers support 802.11b,
802.11g and 802.11n
 Service Set Identifier (SSID) -
Case-sensitive, alpha-numeric
name for your home wireless
network.
 Wireless Channel – RF
spectrum divided up into
channels.
Presentation_ID 38
© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Integrated Router
Basic Security of Wireless
 Change default values
 Disable SSID broadcasting
 Configure Encryption using WEP or WPA
 Wired Equivalency Protocol (WEP) - uses pre-
configured keys to encrypt and decrypt data.
Every wireless device allowed to access the
network must have the same WEP key entered.
 Wi-Fi Protected Access (WPA) – also uses
encryption keys from 64 bits up to 256 bits. New
keys are generated each time a connection is
established with the AP. Therefore more secure.
Presentation_ID 39
© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Integrated Router
Configuring the Integrated Router
 Access the router by cabling
a computer to one of the
router’s LAN Ethernet ports.
 The connecting device will
automatically obtain IP
addressing information from
Integrated Router
 Change default username
and password and the default
Linksys IP address for
security purposes.
Presentation_ID 40
© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Integrated Router
Enabling Wireless
 Configure the wireless mode
 Configure the SSID
 Configure RF channel
 Configure any desired security encryption
Presentation_ID 41
© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Integrated Router
Configure a Wireless Client
 The wireless client configuration settings must match that
of the wireless router.
SSID
Security Settings
Channel
 Wireless client software can be integrated into the device
operating system or stand alone, downloadable, wireless
utility software.
Presentation_ID 42
© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Chapter 1: Summary
 Networks must be secured from viruses, Trojan horses,
worms and network attacks.
 Document Basic Network Performance.
 Test network connectivity using ping and traceroute.
 Use IOS commands to monitor and view information about
the network and network devices.
 Backup configuration files using TFTP or USB.
 Home networks and small business often use integrated
routers, which provide the functions of a switch, router and
wireless access point.
Presentation_ID 43
© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

More Related Content

Similar to Network Security.pptx

Introduction of Exploring the Network Part 1
Introduction of Exploring the Network Part 1Introduction of Exploring the Network Part 1
Introduction of Exploring the Network Part 1
laylam12
 
Chapter 01 - Exploring the Network
Chapter 01 -  Exploring the NetworkChapter 01 -  Exploring the Network
Chapter 01 - Exploring the Network
Yaser Rahmati
 
CCNAv5 - S1: Chapter 1 Exploring The Network
CCNAv5 - S1: Chapter 1 Exploring The NetworkCCNAv5 - S1: Chapter 1 Exploring The Network
CCNAv5 - S1: Chapter 1 Exploring The Network
Vuz Dở Hơi
 
Itninstructorpptchapter1final 141024004546-conversion-gate02
Itninstructorpptchapter1final 141024004546-conversion-gate02Itninstructorpptchapter1final 141024004546-conversion-gate02
Itninstructorpptchapter1final 141024004546-conversion-gate02
Mustapha Kohili
 
Chapter 1 : Exploring the Network
Chapter 1 : Exploring the NetworkChapter 1 : Exploring the Network
Chapter 1 : Exploring the Network
teknetir
 
Sca n instructorppt_chapter1_final
Sca n instructorppt_chapter1_finalSca n instructorppt_chapter1_final
Sca n instructorppt_chapter1_finalCamTESOL2015
 
CCNAv5 - S3: Chapter1 Introduction to Scaling Networks
CCNAv5 - S3: Chapter1 Introduction to Scaling NetworksCCNAv5 - S3: Chapter1 Introduction to Scaling Networks
CCNAv5 - S3: Chapter1 Introduction to Scaling Networks
Vuz Dở Hơi
 
Ccna v5-S1-Chapter 1
Ccna v5-S1-Chapter 1Ccna v5-S1-Chapter 1
Ccna v5-S1-Chapter 1
Hamza Malik
 
ITN_instructorPPT_Chapter1.pptx
ITN_instructorPPT_Chapter1.pptxITN_instructorPPT_Chapter1.pptx
ITN_instructorPPT_Chapter1.pptx
sirajmohammed35
 
ITN_instructorPPT_Chapter1.pptx
ITN_instructorPPT_Chapter1.pptxITN_instructorPPT_Chapter1.pptx
ITN_instructorPPT_Chapter1.pptx
AbdisayidkhalifTahir
 
CCNA 1 Routing and Switching v5.0 Chapter 1
CCNA 1 Routing and Switching v5.0 Chapter 1CCNA 1 Routing and Switching v5.0 Chapter 1
CCNA 1 Routing and Switching v5.0 Chapter 1
Nil Menon
 
CCNA RS_ITN - Chapter 1
CCNA RS_ITN - Chapter 1CCNA RS_ITN - Chapter 1
CCNA RS_ITN - Chapter 1
Irsandi Hasan
 
CCNA Discovery 2 - Chapter 8
CCNA Discovery 2 - Chapter 8CCNA Discovery 2 - Chapter 8
CCNA Discovery 2 - Chapter 8Irsandi Hasan
 
Itn instructor ppt_chapter1 - exploring the network
Itn instructor ppt_chapter1 - exploring the networkItn instructor ppt_chapter1 - exploring the network
Itn instructor ppt_chapter1 - exploring the network
joehurst87
 
ITN_instructorPPT_Chapter2.pptx
ITN_instructorPPT_Chapter2.pptxITN_instructorPPT_Chapter2.pptx
ITN_instructorPPT_Chapter2.pptx
AbdisayidkhalifTahir
 
CCNA RS_NB - Chapter 1
CCNA RS_NB - Chapter 1CCNA RS_NB - Chapter 1
CCNA RS_NB - Chapter 1
Irsandi Hasan
 
CCNA RS_ITN - Chapter 2
CCNA RS_ITN - Chapter 2CCNA RS_ITN - Chapter 2
CCNA RS_ITN - Chapter 2
Irsandi Hasan
 
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 1
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 1CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 1
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 1
Waqas Ahmed Nawaz
 
Itn instructor ppt_chapter1 exploring the network smartskills
Itn instructor ppt_chapter1 exploring the network smartskillsItn instructor ppt_chapter1 exploring the network smartskills
Itn instructor ppt_chapter1 exploring the network smartskills
Tiago Monteiro
 
CCNA RS_NB - Chapter 2
CCNA RS_NB - Chapter 2CCNA RS_NB - Chapter 2
CCNA RS_NB - Chapter 2
Irsandi Hasan
 

Similar to Network Security.pptx (20)

Introduction of Exploring the Network Part 1
Introduction of Exploring the Network Part 1Introduction of Exploring the Network Part 1
Introduction of Exploring the Network Part 1
 
Chapter 01 - Exploring the Network
Chapter 01 -  Exploring the NetworkChapter 01 -  Exploring the Network
Chapter 01 - Exploring the Network
 
CCNAv5 - S1: Chapter 1 Exploring The Network
CCNAv5 - S1: Chapter 1 Exploring The NetworkCCNAv5 - S1: Chapter 1 Exploring The Network
CCNAv5 - S1: Chapter 1 Exploring The Network
 
Itninstructorpptchapter1final 141024004546-conversion-gate02
Itninstructorpptchapter1final 141024004546-conversion-gate02Itninstructorpptchapter1final 141024004546-conversion-gate02
Itninstructorpptchapter1final 141024004546-conversion-gate02
 
Chapter 1 : Exploring the Network
Chapter 1 : Exploring the NetworkChapter 1 : Exploring the Network
Chapter 1 : Exploring the Network
 
Sca n instructorppt_chapter1_final
Sca n instructorppt_chapter1_finalSca n instructorppt_chapter1_final
Sca n instructorppt_chapter1_final
 
CCNAv5 - S3: Chapter1 Introduction to Scaling Networks
CCNAv5 - S3: Chapter1 Introduction to Scaling NetworksCCNAv5 - S3: Chapter1 Introduction to Scaling Networks
CCNAv5 - S3: Chapter1 Introduction to Scaling Networks
 
Ccna v5-S1-Chapter 1
Ccna v5-S1-Chapter 1Ccna v5-S1-Chapter 1
Ccna v5-S1-Chapter 1
 
ITN_instructorPPT_Chapter1.pptx
ITN_instructorPPT_Chapter1.pptxITN_instructorPPT_Chapter1.pptx
ITN_instructorPPT_Chapter1.pptx
 
ITN_instructorPPT_Chapter1.pptx
ITN_instructorPPT_Chapter1.pptxITN_instructorPPT_Chapter1.pptx
ITN_instructorPPT_Chapter1.pptx
 
CCNA 1 Routing and Switching v5.0 Chapter 1
CCNA 1 Routing and Switching v5.0 Chapter 1CCNA 1 Routing and Switching v5.0 Chapter 1
CCNA 1 Routing and Switching v5.0 Chapter 1
 
CCNA RS_ITN - Chapter 1
CCNA RS_ITN - Chapter 1CCNA RS_ITN - Chapter 1
CCNA RS_ITN - Chapter 1
 
CCNA Discovery 2 - Chapter 8
CCNA Discovery 2 - Chapter 8CCNA Discovery 2 - Chapter 8
CCNA Discovery 2 - Chapter 8
 
Itn instructor ppt_chapter1 - exploring the network
Itn instructor ppt_chapter1 - exploring the networkItn instructor ppt_chapter1 - exploring the network
Itn instructor ppt_chapter1 - exploring the network
 
ITN_instructorPPT_Chapter2.pptx
ITN_instructorPPT_Chapter2.pptxITN_instructorPPT_Chapter2.pptx
ITN_instructorPPT_Chapter2.pptx
 
CCNA RS_NB - Chapter 1
CCNA RS_NB - Chapter 1CCNA RS_NB - Chapter 1
CCNA RS_NB - Chapter 1
 
CCNA RS_ITN - Chapter 2
CCNA RS_ITN - Chapter 2CCNA RS_ITN - Chapter 2
CCNA RS_ITN - Chapter 2
 
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 1
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 1CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 1
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 1
 
Itn instructor ppt_chapter1 exploring the network smartskills
Itn instructor ppt_chapter1 exploring the network smartskillsItn instructor ppt_chapter1 exploring the network smartskills
Itn instructor ppt_chapter1 exploring the network smartskills
 
CCNA RS_NB - Chapter 2
CCNA RS_NB - Chapter 2CCNA RS_NB - Chapter 2
CCNA RS_NB - Chapter 2
 

Recently uploaded

Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
SOFTTECHHUB
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
Alex Pruden
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 

Recently uploaded (20)

Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 

Network Security.pptx

  • 1. © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Presentation_ID 1 Chapter 1: Network Security Introduction to Networking
  • 2. Presentation_ID 2 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Chapter 1 1.1 Create and Grow 1.2 Keeping the Network Safe 1.3 Basic Network Performance 1.4 Managing IOS Configuration Files 1.5 Integrated Routing Services 1.6 Summary
  • 3. Presentation_ID 3 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Chapter 1: Objectives  Explain the need for basic security measures on network devices.  Identify security vulnerabilities and general mitigation techniques
  • 4. Presentation_ID 4 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Network Device Security Measures Threats to Network Security  Categories of Threats to Network Security
  • 5. Presentation_ID 5 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Network Device Security Measures Physical Security Four classes of physical threats are:  Hardware threats - physical damage to servers, routers, switches, cabling plant, and workstations.  Environmental threats - temperature extremes (too hot or too cold) or humidity extremes (too wet or too dry)  Electrical threats - voltage spikes, insufficient supply voltage (brownouts), unconditioned power (noise), and total power loss  Maintenance threats - poor handling of key electrical components (electrostatic discharge), lack of critical spare parts, poor cabling, and poor labeling
  • 6. Presentation_ID 6 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Network Device Security Measures Types of Security Vulnerabilities  Technological weaknesses  Configuration weaknesses  Security policy weaknesses
  • 7. Presentation_ID 7 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Vulnerabilities and Network Attacks Viruses, Worms and Trojan Horses  A virus - malicious software that is attached to another program to execute a particular unwanted function on a workstation.  A Trojan horse - the entire application was written to look like something else, when in fact it is an attack tool.  Worms - self-contained programs that attack a system and try to exploit a specific vulnerability in the target. The worm copies its program from the attacking host to the newly exploited system to begin the cycle again.
  • 8. Presentation_ID 8 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Vulnerabilities and Network Attacks Reconnaissance Attacks
  • 9. Presentation_ID 9 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Vulnerabilities and Network Attacks Access Attacks
  • 10. Presentation_ID 10 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Vulnerabilities and Network Attacks Denial of Service Attacks (DoS)
  • 11. Presentation_ID 11 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Mitigating Network Attacks Backup, Upgrade, Update, and Patch  Keep current with the latest versions of antivirus software.  Install updated security patches
  • 12. Presentation_ID 12 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Mitigating Network Attacks Authentication, Authorization, and Accounting Authentication, Authorization, and Accounting (AAA, or “triple A”)  Authentication - Users and administrators must prove their identity. Authentication can be established using username and password combinations, challenge and response questions, token cards, and other methods.  Authorization - which resources the user can access and which operations the user is allowed to perform.  Accounting - records what the user accessed, the amount of time the resource is accessed, and any changes made.
  • 13. Presentation_ID 13 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Mitigating Network Attacks Firewalls A firewall resides between two or more networks. It controls traffic and helps prevent unauthorized access. Methods used are:  Packet Filtering  Application Filtering  URL Filtering  Stateful Packet Inspection (SPI) - Incoming packets must be legitimate responses to requests from internal hosts.
  • 14. Presentation_ID 14 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Mitigating Network Attacks Endpoint Security  Common endpoints are laptops, desktops, servers, smart phones, and tablets.  Employees must follow the companies documented security policies to secure their devices.  Policies often include the use of anti-virus software and host intrusion prevention.
  • 15. Presentation_ID 15 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Securing Devices Introduction to Securing Devices  Part of network security is securing devices, including end devices and intermediate devices.  Default usernames and passwords should be changed immediately.  Access to system resources should be restricted to only the individuals that are authorized to use those resources.  Any unnecessary services and applications should be turned off and uninstalled, when possible.  Update with security patches as they become available.
  • 16. Presentation_ID 16 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Securing Devices Passwords
  • 17. Presentation_ID 17 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Securing Devices Basic Security Practices  Encrypt passwords  Require minimum length passwords  Block brute force attacks  Use Banner Message  Set EXEC timeout
  • 18. Presentation_ID 18 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Securing Devices Enable SSH
  • 19. Presentation_ID 19 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Ping Interpreting ICMP Messages  ! - indicates receipt of an ICMP echo reply message  . - indicates a time expired while waiting for an ICMP echo reply message  U - an ICMP unreachable message was received
  • 20. Presentation_ID 20 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Ping Leveraging Extended Ping  The Cisco IOS offers an "extended" mode of the ping command R2# ping Protocol [ip]: Target IP address: 192.168.10.1 Repeat count [5]: Datagram size [100]: Timeout in seconds [2]: Extended commands [n]: y Source address or interface: 10.1.1.1 Type of service [0]:
  • 21. Presentation_ID 21 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Ping Network Baseline
  • 22. Presentation_ID 22 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Tracert Interpreting Tracert Messages
  • 23. Presentation_ID 23 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Show Commands Common Show Commands Revisited  The status of nearly every process or function of the router can be displayed using a show command.  Frequently used show commands: show running-config show interfaces show arp show ip route show protocols show version
  • 24. Presentation_ID 24 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Show Commands Viewing Router Settings with Show Version Cisco IOS version System bootstrap Cisco IOS image CPU and RAM Config. register Number and type of physical interfaces Amount of NVRAM Amount of Flash
  • 25. Presentation_ID 25 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Show Commands Viewing Switch Settings with Show Version
  • 26. Presentation_ID 26 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Host and IOS Commands ipconfig Command Options  ipconfig - displays ip address, subnet mask, default gateway.  ipconfig /all – also displays MAC address.  Ipconfig /displaydns - displays all cached dns entries in a Windows system .
  • 27. Presentation_ID 27 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Host and IOS Commands arp Command Options
  • 28. Presentation_ID 28 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Host and IOS Commands show cdp neighbors Command Options
  • 29. Presentation_ID 29 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Host and IOS Commands Using show ip interface brief Command  Can be used to verify the status of all network interfaces on a router or a switch.
  • 30. Presentation_ID 30 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Router and Switch File Systems Router File Systems  show file systems command - lists all of the available file systems on a Cisco 1941 route  * Asterisk indicates this is the current default file system
  • 31. Presentation_ID 31 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Router and Switch File Systems Switch File Systems  show file systems command - lists all of the available file systems on a Catalyst 2960 switch.
  • 32. Presentation_ID 32 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Backup and Restore Configuration Files Backup and Restore using Text Files
  • 33. Presentation_ID 33 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Backup and Restore Configuration Files Backup and Restore using TFTP  Configuration files can be stored on a Trivial File Transfer Protocol (TFTP) server.  copy running-config tftp – save running configuration to a tftp server  copy startup-config tftp - save startup configuration to a tftp server
  • 34. Presentation_ID 34 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Backup and Restore Configuration Files Using USB Interfaces on a Cisco Router  USB flash drive must be formatted in a FAT16 format.  Can hold multiple copies of the Cisco IOS and multiple router configurations.  Allows administrator to easily move configurations from router to router.
  • 35. Presentation_ID 35 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Backup and Restore Configuration Files Backup and Restore Using USB
  • 36. Presentation_ID 36 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Integrated Router Multi-function Device  Incorporates a switch, router, and wireless access point.  Provides routing, switching and wireless connectivity.  Linksys wireless routers, are simple in design and used in home networks  Cisco Integrated Services Router (ISR) product family offers a wide range of products, designed for small office to larger networks.
  • 37. Presentation_ID 37 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Integrated Router Wireless Capability  Wireless Mode -Most integrated wireless routers support 802.11b, 802.11g and 802.11n  Service Set Identifier (SSID) - Case-sensitive, alpha-numeric name for your home wireless network.  Wireless Channel – RF spectrum divided up into channels.
  • 38. Presentation_ID 38 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Integrated Router Basic Security of Wireless  Change default values  Disable SSID broadcasting  Configure Encryption using WEP or WPA  Wired Equivalency Protocol (WEP) - uses pre- configured keys to encrypt and decrypt data. Every wireless device allowed to access the network must have the same WEP key entered.  Wi-Fi Protected Access (WPA) – also uses encryption keys from 64 bits up to 256 bits. New keys are generated each time a connection is established with the AP. Therefore more secure.
  • 39. Presentation_ID 39 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Integrated Router Configuring the Integrated Router  Access the router by cabling a computer to one of the router’s LAN Ethernet ports.  The connecting device will automatically obtain IP addressing information from Integrated Router  Change default username and password and the default Linksys IP address for security purposes.
  • 40. Presentation_ID 40 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Integrated Router Enabling Wireless  Configure the wireless mode  Configure the SSID  Configure RF channel  Configure any desired security encryption
  • 41. Presentation_ID 41 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Integrated Router Configure a Wireless Client  The wireless client configuration settings must match that of the wireless router. SSID Security Settings Channel  Wireless client software can be integrated into the device operating system or stand alone, downloadable, wireless utility software.
  • 42. Presentation_ID 42 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Chapter 1: Summary  Networks must be secured from viruses, Trojan horses, worms and network attacks.  Document Basic Network Performance.  Test network connectivity using ping and traceroute.  Use IOS commands to monitor and view information about the network and network devices.  Backup configuration files using TFTP or USB.  Home networks and small business often use integrated routers, which provide the functions of a switch, router and wireless access point.
  • 43. Presentation_ID 43 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential