SlideShare a Scribd company logo
1 of 23
Network Defense and
Countermeasures
by Chuck Easttom
Chapter 14: Physical Security and Disaster Recovery
© 2014 by Pearson Education, Inc. Chapter 14 Physical
Security and Disaster
Recovery 2
Objectives
Security
Definition: Physical Security
procedures to safeguard and protect against:
ft
© 2014 by Pearson Education, Inc. Chapter 14 Physical
Security and Disaster
Recovery 3
Required Physical Controls
– Building Floors / Offices
rs or Server Room Security
© 2014 by Pearson Education, Inc. Chapter 14 Physical
Security and Disaster
Recovery 4
Examples of Threats
losion
© 2014 by Pearson Education, Inc. Chapter 14 Physical
Security and Disaster
Recovery 5
Fire Prevention
Furnishings, etc.
Around Electrical Equipment
Employees
Issue!
Personnel Know How to Exit A Building
© 2014 by Pearson Education, Inc. Chapter 14 Physical
Security and Disaster
Recovery 6
Fire Detection
-Up Fire Alarm
Plays a Prerecorded Message When a Fire is
Detected
Type of Fire Detectors
Subverted
Effectiveness in Detecting a Fire
© 2014 by Pearson Education, Inc. Chapter 14 Physical
Security and Disaster
Recovery 7
Fire Suppression
Dry Power Extinguishers DISPLACE Oxygen
to Suppress a Fire
Oxygen Displacement)
Required to Sustain a Fire
© 2014 by Pearson Education, Inc. Chapter 14 Physical
Security and Disaster
Recovery 8
Fire Suppression - Halon
Montreal Protocol on Substances that Deplete
the Ozone Layer
Must Use Alternate Options
s:
© 2014 by Pearson Education, Inc. Chapter 14 Physical
Security and Disaster
Recovery 9
Safety Fire Extinguishers
– Ordinary combustibles such as
wood or paper.
– Flammable liquids such as grease,
oil, or gasoline.
– Electrical Equipment
– Flammable Metals
© 2014 by Pearson Education, Inc. Chapter 14 Physical
Security and Disaster
Recovery 10
Fire Suppression - Water
ar and Reliable
© 2014 by Pearson Education, Inc. Chapter 14 Physical
Security and Disaster
Recovery 11
Fire Suppression – Water
om
Melts in Nozzle the Water is Dispersed
© 2014 by Pearson Education, Inc. Chapter 14 Physical
Security and Disaster
Recovery 12
What Is a Disaster
y natural or man-made event that disrupts
the operations of a business
in such a significant way that a considerable
and coordinated effort is required to achieve
a recovery.
© 2014 by Pearson Education, Inc. Chapter 14 Physical
Security and Disaster
Recovery 13
How BCP and DRP
Support Security
DRP (Disaster Recovery Planning)
-I-A
lity
© 2014 by Pearson Education, Inc. Chapter 14 Physical
Security and Disaster
Recovery 14
BCP and DRP Differences
and Similarities
critical business processes in an organization
-IT aspects of business
restoration of damaged facilities and systems
© 2014 by Pearson Education, Inc. Chapter 14 Physical
Security and Disaster
Recovery 15
The Role of Prevention
ng
operation of critical business processes
© 2014 by Pearson Education, Inc. Chapter 14 Physical
Security and Disaster
Recovery 16
Running a BCP / DRP Project
-project activities
plans
© 2014 by Pearson Education, Inc. Chapter 14 Physical
Security and Disaster
Recovery 17
Performing a Business
Impact Analysis
cost, maintenance cost.
orm risk analyses and threat assessment
(MTD)
© 2014 by Pearson Education, Inc. Chapter 14 Physical
Security and Disaster
Recovery 18
RAID
distributes data across multiple disks
in a way that gives improved speed at
any given instant. NO fault tolerance
1:1 ratio realtime backup. Also called
mirroring
isks with dedicated parity) combines
three or more disks in a way that protects
data against loss of any one disk. Fault tolerance is achieved by
adding an extra disk to the array and
dedicating it to storing parity information. The storage capacity
of the array is reduced by one disk
or more disks in a way that protects data
against the loss of any one disk. It is similar to RAID 3 but the
parity is not stored on one dedicated
drive, instead parity information is interspersed across the drive
array. The storage capacity of the
array is a function of the number of drives minus the space
needed to store parity
more disks in a way that protects data against
loss of any two disks.
then striped (RAID 0), hence the "1+0"
name. A RAID 1+0 array requires a minimum of four drives:
two mirrored drives to hold half of the
striped data, plus another two mirrored for the other half of the
data.
© 2014 by Pearson Education, Inc. Chapter 14 Physical
Security and Disaster
Recovery 19
Backups
- all changes
– all changes since last full backup
– all changes since last backup of
any type
© 2014 by Pearson Education, Inc. Chapter 14 Physical
Security and Disaster
Recovery 20
Summary
fences, and physical access control.
part of physical security.
before disaster recovery.
© 2014 by Pearson Education, Inc. Chapter 14 Physical
Security and Disaster
Recovery 21
Summary cont.
restoring full normal operations.
maintain some level of operations until full
recovery can be achieved.
tolerance and disaster recovery.
© 2014 by Pearson Education, Inc. Chapter 14 Physical
Security and Disaster
Recovery 22
2
Contents
1. Cover Page
2. Title Page
3. Copyright Page
4. Contents at a Glance
5. Contents
6. About This E-Book
7. Preface
8. About the Author
9. Dedication
10. Acknowledgments
11. About the Technical Reviewers
12. We Want to Hear from You!
13. Reader Services
14. Chapter 1: Introduction to Network Security
1. Introduction
2. The Basics of a Network
1. Basic Network Structure
2. Data Packets
3. IP Addresses
4. Uniform Resource Locators
5. MAC Addresses
6. Protocols
3. Basic Network Utilities
3
1. ipconfig
2. ping
3. tracert
4. netstat
4. The OSI Model
5. What Does This Mean for Security?
6. Assessing Likely Threats to the Network
7. Classifications of Threats
1. Malware
2. Compromising System Security—Intrusions
3. Denial of Service
8. Likely Attacks
9. Threat Assessment
10. Understanding Security Terminology
1. Hacking Terminology
2. Security Terminology
11. Choosing a Network Security Approach
1. Perimeter Security Approach
2. Layered Security Approach
3. Hybrid Security Approach
12. Network Security and the Law
13. Using Security Resources
14. Summary
15. Chapter 2: Types of Attacks
4
1. Introduction
2. Understanding Denial of Service Attacks
1. DoS in Action
2. SYN Flood
3. Smurf Attack
4. Ping of Death
5. UDP Flood
6. ICMP Flood
7. DHCP Starvation
8. HTTP Post DoS
9. PDoS
10. Distributed Reflection Denial of Service
11. DoS Tools
12. Real-World Examples
13. Defending Against DoS Attacks
3. Defending Against Buffer Overflow Attacks
4. Defending Against IP Spoofing
5. Defending Against Session Hijacking
6. Blocking Virus and Trojan Horse Attacks
1. Viruses
2. Types of Viruses
3. Trojan Horses
7. Summary
16. Chapter 3: Fundamentals of Firewalls
1. Introduction
2. What Is a Firewall?
5
1. Types of Firewalls
2. Packet Filtering Firewall
3. Stateful Packet Inspection
4. Application Gateway
5. Circuit Level Gateway
6. Hybrid Firewalls
7. Blacklisting/Whitelisting
3. Implementing Firewalls
1. Host-Based
2. Dual-Homed Hosts
3. Router-Based Firewall
4. Screened Hosts
4. Selecting and Using a Firewall
1. Using a Firewall
5. Using Proxy Servers
1. The WinGate Proxy Server
2. NAT
6. Summary
17. Chapter 4: Firewall Practical Applications
1. Introduction
2. Using Single Machine Firewalls
3. Windows 10 Firewall
4. User Account Control
6
5. Linux Firewalls
1. Iptables
2. Symantec Norton Firewall
3. McAfee Personal Firewall
6. Using Small Office/Home Office Firewalls
1. SonicWALL
2. D-Link DFL-2560 Office Firewall
7. Using Medium-Sized Network Firewalls
1. Check Point Firewall
2. Cisco Next-Generation Firewalls
8. Using Enterprise Firewalls
9. Summary
18. Chapter 5: Intrusion-Detection Systems
1. Introduction
2. Understanding IDS Concepts
1. Preemptive Blocking
2. Anomaly Detection
3. IDS Components and Processes
4. Understanding and Implementing IDSs
1. Snort
2. Cisco Intrusion-Detection and Prevention
7
5. Understanding and Implementing Honeypots
1. Specter
2. Symantec Decoy Server
3. Intrusion Deflection
4. Intrusion Deterrence
6. Summary
19. Chapter 6: Encryption Fundamentals
1. Introduction
2. The History of Encryption
1. The Caesar Cipher
2. ROT 13
3. Atbash Cipher
4. Multi-Alphabet Substitution
5. Rail Fence
6. Vigenère
7. Enigma
8. Binary Operations
3. Learning About Modern Encryption Methods
1. Symmetric Encryption
2. Key Stretching
3. PRNG
4. Public Key Encryption
5. Digital Signatures
4. Identifying Good Encryption
5. Understanding Digital Signatures and Certificates
8
1. Digital Certificates
2. PGP Certificates
3. MD5
4. SHA
5. RIPEMD
6. HAVAL
6. Understanding and Using Decryption
7. Cracking Passwords
1. John the Ripper
2. Using Rainbow Tables
3. Using Other Password Crackers
4. General Cryptanalysis
8. Steganography
9. Steganalysis
10. Quantum Computing and Quantum Cryptography
11. Summary
20. Chapter 7: Virtual Private Networks
1. Introduction
2. Basic VPN Technology
3. Using VPN Protocols for VPN Encryption
1. PPTP
2. PPTP Authentication
3. L2TP
4. L2TP Authentication
5. L2TP Compared to PPTP
4. IPSec
9
5. SSL/TLS
6. Implementing VPN
Solution
s
1. Cisco

More Related Content

Similar to Network Defense and Countermeasures by Chuck Easttom.docx

apl5iy2ftxiwofbhsmxj-signature-584e2459f99b5370bda435f09b42cc84cc8c063b8cd454...
apl5iy2ftxiwofbhsmxj-signature-584e2459f99b5370bda435f09b42cc84cc8c063b8cd454...apl5iy2ftxiwofbhsmxj-signature-584e2459f99b5370bda435f09b42cc84cc8c063b8cd454...
apl5iy2ftxiwofbhsmxj-signature-584e2459f99b5370bda435f09b42cc84cc8c063b8cd454...
Chrysostomos Christofi
 
1. With different types of cloud service delivery, what are the di.docx
1. With different types of cloud service delivery, what are the di.docx1. With different types of cloud service delivery, what are the di.docx
1. With different types of cloud service delivery, what are the di.docx
jeremylockett77
 
Discuss the four steps involved in the maintenance of the indicent res.docx
Discuss the four steps involved in the maintenance of the indicent res.docxDiscuss the four steps involved in the maintenance of the indicent res.docx
Discuss the four steps involved in the maintenance of the indicent res.docx
wviola
 

Similar to Network Defense and Countermeasures by Chuck Easttom.docx (20)

#ITSitioEnRSA - Presentacion de Jeef Reed de Cisco
#ITSitioEnRSA - Presentacion de Jeef Reed de Cisco #ITSitioEnRSA - Presentacion de Jeef Reed de Cisco
#ITSitioEnRSA - Presentacion de Jeef Reed de Cisco
 
Information Assurance And Security - Chapter 1 - Lesson 4
Information Assurance And Security - Chapter 1 - Lesson 4Information Assurance And Security - Chapter 1 - Lesson 4
Information Assurance And Security - Chapter 1 - Lesson 4
 
Intelligent Cybersecurity for the Real World
Intelligent Cybersecurity for the Real WorldIntelligent Cybersecurity for the Real World
Intelligent Cybersecurity for the Real World
 
Security Readiness Profile
Security Readiness ProfileSecurity Readiness Profile
Security Readiness Profile
 
Securing Humanitarian Connectivity
Securing Humanitarian ConnectivitySecuring Humanitarian Connectivity
Securing Humanitarian Connectivity
 
Cisco ASA con fire power services
Cisco ASA con fire power services Cisco ASA con fire power services
Cisco ASA con fire power services
 
apl5iy2ftxiwofbhsmxj-signature-584e2459f99b5370bda435f09b42cc84cc8c063b8cd454...
apl5iy2ftxiwofbhsmxj-signature-584e2459f99b5370bda435f09b42cc84cc8c063b8cd454...apl5iy2ftxiwofbhsmxj-signature-584e2459f99b5370bda435f09b42cc84cc8c063b8cd454...
apl5iy2ftxiwofbhsmxj-signature-584e2459f99b5370bda435f09b42cc84cc8c063b8cd454...
 
Cisco SecureX.pdf
Cisco SecureX.pdfCisco SecureX.pdf
Cisco SecureX.pdf
 
The World Against the Bad, Cisco AMP Solution to the Rescue
The World Against the Bad, Cisco AMP Solution to the RescueThe World Against the Bad, Cisco AMP Solution to the Rescue
The World Against the Bad, Cisco AMP Solution to the Rescue
 
secued cloud ppt
 secued cloud ppt secued cloud ppt
secued cloud ppt
 
compTIA guide to get the CERTIFICATION EMERSON EDUARDO RODRIGUES
compTIA guide to get the CERTIFICATION EMERSON EDUARDO RODRIGUEScompTIA guide to get the CERTIFICATION EMERSON EDUARDO RODRIGUES
compTIA guide to get the CERTIFICATION EMERSON EDUARDO RODRIGUES
 
Presentación - Cisco ASA with FirePOWER Services
Presentación -  Cisco ASA with FirePOWER ServicesPresentación -  Cisco ASA with FirePOWER Services
Presentación - Cisco ASA with FirePOWER Services
 
Trivadis TechEvent 2016 Backup Methods from Practice - optimized and intellig...
Trivadis TechEvent 2016 Backup Methods from Practice - optimized and intellig...Trivadis TechEvent 2016 Backup Methods from Practice - optimized and intellig...
Trivadis TechEvent 2016 Backup Methods from Practice - optimized and intellig...
 
New Horizons SCYBER Presentation
New Horizons SCYBER PresentationNew Horizons SCYBER Presentation
New Horizons SCYBER Presentation
 
UNINFO - BIG DATA & Information Security Standards - Guasconi
UNINFO - BIG DATA & Information Security Standards - GuasconiUNINFO - BIG DATA & Information Security Standards - Guasconi
UNINFO - BIG DATA & Information Security Standards - Guasconi
 
1. With different types of cloud service delivery, what are the di.docx
1. With different types of cloud service delivery, what are the di.docx1. With different types of cloud service delivery, what are the di.docx
1. With different types of cloud service delivery, what are the di.docx
 
Web application security measures
Web application security measuresWeb application security measures
Web application security measures
 
Discuss the four steps involved in the maintenance of the indicent res.docx
Discuss the four steps involved in the maintenance of the indicent res.docxDiscuss the four steps involved in the maintenance of the indicent res.docx
Discuss the four steps involved in the maintenance of the indicent res.docx
 
DLP.pptx
DLP.pptxDLP.pptx
DLP.pptx
 
Glasswall - How to Prevent, Detect and React to Ransomware incidents
Glasswall - How to Prevent, Detect and React to Ransomware incidentsGlasswall - How to Prevent, Detect and React to Ransomware incidents
Glasswall - How to Prevent, Detect and React to Ransomware incidents
 

More from vannagoforth

1. Normative moral philosophy typically focuses on the determining t.docx
1. Normative moral philosophy typically focuses on the determining t.docx1. Normative moral philosophy typically focuses on the determining t.docx
1. Normative moral philosophy typically focuses on the determining t.docx
vannagoforth
 
1. Paper should be 5-pages min. + 1 page works cited2. Should have.docx
1. Paper should be 5-pages min. + 1 page works cited2. Should have.docx1. Paper should be 5-pages min. + 1 page works cited2. Should have.docx
1. Paper should be 5-pages min. + 1 page works cited2. Should have.docx
vannagoforth
 
1. Members of one species cannot successfully interbreed and produc.docx
1. Members of one species cannot successfully interbreed and produc.docx1. Members of one species cannot successfully interbreed and produc.docx
1. Members of one species cannot successfully interbreed and produc.docx
vannagoforth
 
1. Kemal Ataturk carried out policies that distanced the new Turkish.docx
1. Kemal Ataturk carried out policies that distanced the new Turkish.docx1. Kemal Ataturk carried out policies that distanced the new Turkish.docx
1. Kemal Ataturk carried out policies that distanced the new Turkish.docx
vannagoforth
 
1. If we consider a gallon of gas as having 100 units of energy, and.docx
1. If we consider a gallon of gas as having 100 units of energy, and.docx1. If we consider a gallon of gas as having 100 units of energy, and.docx
1. If we consider a gallon of gas as having 100 units of energy, and.docx
vannagoforth
 
1. In 200-250 words, analyze the basic issues of human biology as th.docx
1. In 200-250 words, analyze the basic issues of human biology as th.docx1. In 200-250 words, analyze the basic issues of human biology as th.docx
1. In 200-250 words, analyze the basic issues of human biology as th.docx
vannagoforth
 

More from vannagoforth (20)

1. Primary sources2. Secondary sources3. La Malinche4. Bacon’s.docx
1. Primary sources2. Secondary sources3. La Malinche4. Bacon’s.docx1. Primary sources2. Secondary sources3. La Malinche4. Bacon’s.docx
1. Primary sources2. Secondary sources3. La Malinche4. Bacon’s.docx
 
1. Prepare an outline, an introduction, and a summary.docx
1. Prepare an outline, an introduction, and a summary.docx1. Prepare an outline, an introduction, and a summary.docx
1. Prepare an outline, an introduction, and a summary.docx
 
1. Normative moral philosophy typically focuses on the determining t.docx
1. Normative moral philosophy typically focuses on the determining t.docx1. Normative moral philosophy typically focuses on the determining t.docx
1. Normative moral philosophy typically focuses on the determining t.docx
 
1. Paper should be 5-pages min. + 1 page works cited2. Should have.docx
1. Paper should be 5-pages min. + 1 page works cited2. Should have.docx1. Paper should be 5-pages min. + 1 page works cited2. Should have.docx
1. Paper should be 5-pages min. + 1 page works cited2. Should have.docx
 
1. Name and describe the three steps of the looking-glass self.2.docx
1. Name and describe the three steps of the looking-glass self.2.docx1. Name and describe the three steps of the looking-glass self.2.docx
1. Name and describe the three steps of the looking-glass self.2.docx
 
1. Provide an example of a business or specific person(s) that effec.docx
1. Provide an example of a business or specific person(s) that effec.docx1. Provide an example of a business or specific person(s) that effec.docx
1. Provide an example of a business or specific person(s) that effec.docx
 
1. Mexico and Guatemala. Research the political and economic situati.docx
1. Mexico and Guatemala. Research the political and economic situati.docx1. Mexico and Guatemala. Research the political and economic situati.docx
1. Mexico and Guatemala. Research the political and economic situati.docx
 
1. Many scholars have set some standards to judge a system for taxat.docx
1. Many scholars have set some standards to judge a system for taxat.docx1. Many scholars have set some standards to judge a system for taxat.docx
1. Many scholars have set some standards to judge a system for taxat.docx
 
1. List and (in 1-2 sentences) describe the 4 interlocking factors t.docx
1. List and (in 1-2 sentences) describe the 4 interlocking factors t.docx1. List and (in 1-2 sentences) describe the 4 interlocking factors t.docx
1. List and (in 1-2 sentences) describe the 4 interlocking factors t.docx
 
1. Please explain how the Constitution provides for a system of sepa.docx
1. Please explain how the Constitution provides for a system of sepa.docx1. Please explain how the Constitution provides for a system of sepa.docx
1. Please explain how the Constitution provides for a system of sepa.docx
 
1. Please watch the following The Diving Bell & The Butterfly, Amel.docx
1. Please watch the following The Diving Bell & The Butterfly, Amel.docx1. Please watch the following The Diving Bell & The Butterfly, Amel.docx
1. Please watch the following The Diving Bell & The Butterfly, Amel.docx
 
1. Most sociologists interpret social life from one of the three maj.docx
1. Most sociologists interpret social life from one of the three maj.docx1. Most sociologists interpret social life from one of the three maj.docx
1. Most sociologists interpret social life from one of the three maj.docx
 
1. Members of one species cannot successfully interbreed and produc.docx
1. Members of one species cannot successfully interbreed and produc.docx1. Members of one species cannot successfully interbreed and produc.docx
1. Members of one species cannot successfully interbreed and produc.docx
 
1. Of the three chemical bonds discussed in class, which of them is .docx
1. Of the three chemical bonds discussed in class, which of them is .docx1. Of the three chemical bonds discussed in class, which of them is .docx
1. Of the three chemical bonds discussed in class, which of them is .docx
 
1. Look at your diagrams for hydrogen, lithium, and sodium. What do .docx
1. Look at your diagrams for hydrogen, lithium, and sodium. What do .docx1. Look at your diagrams for hydrogen, lithium, and sodium. What do .docx
1. Look at your diagrams for hydrogen, lithium, and sodium. What do .docx
 
1. Name the following molecules2. Sketch the following molecules.docx
1. Name the following molecules2. Sketch the following molecules.docx1. Name the following molecules2. Sketch the following molecules.docx
1. Name the following molecules2. Sketch the following molecules.docx
 
1. List the horizontal and vertical levels of systems that exist in .docx
1. List the horizontal and vertical levels of systems that exist in .docx1. List the horizontal and vertical levels of systems that exist in .docx
1. List the horizontal and vertical levels of systems that exist in .docx
 
1. Kemal Ataturk carried out policies that distanced the new Turkish.docx
1. Kemal Ataturk carried out policies that distanced the new Turkish.docx1. Kemal Ataturk carried out policies that distanced the new Turkish.docx
1. Kemal Ataturk carried out policies that distanced the new Turkish.docx
 
1. If we consider a gallon of gas as having 100 units of energy, and.docx
1. If we consider a gallon of gas as having 100 units of energy, and.docx1. If we consider a gallon of gas as having 100 units of energy, and.docx
1. If we consider a gallon of gas as having 100 units of energy, and.docx
 
1. In 200-250 words, analyze the basic issues of human biology as th.docx
1. In 200-250 words, analyze the basic issues of human biology as th.docx1. In 200-250 words, analyze the basic issues of human biology as th.docx
1. In 200-250 words, analyze the basic issues of human biology as th.docx
 

Recently uploaded

Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
Chris Hunter
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
QucHHunhnh
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
negromaestrong
 

Recently uploaded (20)

Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docx
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Role Of Transgenic Animal In Target Validation-1.pptx
Role Of Transgenic Animal In Target Validation-1.pptxRole Of Transgenic Animal In Target Validation-1.pptx
Role Of Transgenic Animal In Target Validation-1.pptx
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-IIFood Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
 

Network Defense and Countermeasures by Chuck Easttom.docx

  • 1. Network Defense and Countermeasures by Chuck Easttom Chapter 14: Physical Security and Disaster Recovery © 2014 by Pearson Education, Inc. Chapter 14 Physical Security and Disaster Recovery 2 Objectives Security Definition: Physical Security procedures to safeguard and protect against:
  • 2. ft © 2014 by Pearson Education, Inc. Chapter 14 Physical Security and Disaster Recovery 3 Required Physical Controls – Building Floors / Offices rs or Server Room Security © 2014 by Pearson Education, Inc. Chapter 14 Physical Security and Disaster Recovery 4 Examples of Threats
  • 3. losion © 2014 by Pearson Education, Inc. Chapter 14 Physical Security and Disaster Recovery 5 Fire Prevention Furnishings, etc. Around Electrical Equipment Employees Issue! Personnel Know How to Exit A Building © 2014 by Pearson Education, Inc. Chapter 14 Physical Security and Disaster
  • 4. Recovery 6 Fire Detection -Up Fire Alarm Plays a Prerecorded Message When a Fire is Detected Type of Fire Detectors Subverted Effectiveness in Detecting a Fire © 2014 by Pearson Education, Inc. Chapter 14 Physical Security and Disaster Recovery 7 Fire Suppression
  • 5. Dry Power Extinguishers DISPLACE Oxygen to Suppress a Fire Oxygen Displacement) Required to Sustain a Fire © 2014 by Pearson Education, Inc. Chapter 14 Physical Security and Disaster Recovery 8 Fire Suppression - Halon Montreal Protocol on Substances that Deplete the Ozone Layer Must Use Alternate Options
  • 6. s: © 2014 by Pearson Education, Inc. Chapter 14 Physical Security and Disaster Recovery 9 Safety Fire Extinguishers – Ordinary combustibles such as wood or paper. – Flammable liquids such as grease, oil, or gasoline. – Electrical Equipment – Flammable Metals © 2014 by Pearson Education, Inc. Chapter 14 Physical Security and Disaster Recovery 10 Fire Suppression - Water
  • 7. ar and Reliable © 2014 by Pearson Education, Inc. Chapter 14 Physical Security and Disaster Recovery 11 Fire Suppression – Water
  • 8. om Melts in Nozzle the Water is Dispersed © 2014 by Pearson Education, Inc. Chapter 14 Physical Security and Disaster Recovery 12 What Is a Disaster y natural or man-made event that disrupts the operations of a business in such a significant way that a considerable and coordinated effort is required to achieve a recovery. © 2014 by Pearson Education, Inc. Chapter 14 Physical Security and Disaster Recovery 13 How BCP and DRP Support Security
  • 9. DRP (Disaster Recovery Planning) -I-A lity © 2014 by Pearson Education, Inc. Chapter 14 Physical Security and Disaster Recovery 14 BCP and DRP Differences and Similarities critical business processes in an organization -IT aspects of business
  • 10. restoration of damaged facilities and systems © 2014 by Pearson Education, Inc. Chapter 14 Physical Security and Disaster Recovery 15 The Role of Prevention ng operation of critical business processes © 2014 by Pearson Education, Inc. Chapter 14 Physical Security and Disaster Recovery 16
  • 11. Running a BCP / DRP Project -project activities plans © 2014 by Pearson Education, Inc. Chapter 14 Physical Security and Disaster Recovery 17 Performing a Business Impact Analysis cost, maintenance cost. orm risk analyses and threat assessment
  • 12. (MTD) © 2014 by Pearson Education, Inc. Chapter 14 Physical Security and Disaster Recovery 18 RAID distributes data across multiple disks in a way that gives improved speed at any given instant. NO fault tolerance 1:1 ratio realtime backup. Also called mirroring isks with dedicated parity) combines three or more disks in a way that protects data against loss of any one disk. Fault tolerance is achieved by adding an extra disk to the array and dedicating it to storing parity information. The storage capacity of the array is reduced by one disk or more disks in a way that protects data
  • 13. against the loss of any one disk. It is similar to RAID 3 but the parity is not stored on one dedicated drive, instead parity information is interspersed across the drive array. The storage capacity of the array is a function of the number of drives minus the space needed to store parity more disks in a way that protects data against loss of any two disks. then striped (RAID 0), hence the "1+0" name. A RAID 1+0 array requires a minimum of four drives: two mirrored drives to hold half of the striped data, plus another two mirrored for the other half of the data. © 2014 by Pearson Education, Inc. Chapter 14 Physical Security and Disaster Recovery 19 Backups - all changes – all changes since last full backup
  • 14. – all changes since last backup of any type © 2014 by Pearson Education, Inc. Chapter 14 Physical Security and Disaster Recovery 20 Summary fences, and physical access control. part of physical security. before disaster recovery. © 2014 by Pearson Education, Inc. Chapter 14 Physical Security and Disaster Recovery 21 Summary cont.
  • 15. restoring full normal operations. maintain some level of operations until full recovery can be achieved. tolerance and disaster recovery. © 2014 by Pearson Education, Inc. Chapter 14 Physical Security and Disaster Recovery 22 2 Contents 1. Cover Page 2. Title Page 3. Copyright Page 4. Contents at a Glance 5. Contents 6. About This E-Book 7. Preface 8. About the Author
  • 16. 9. Dedication 10. Acknowledgments 11. About the Technical Reviewers 12. We Want to Hear from You! 13. Reader Services 14. Chapter 1: Introduction to Network Security 1. Introduction 2. The Basics of a Network 1. Basic Network Structure 2. Data Packets 3. IP Addresses 4. Uniform Resource Locators 5. MAC Addresses 6. Protocols 3. Basic Network Utilities 3 1. ipconfig 2. ping 3. tracert 4. netstat 4. The OSI Model 5. What Does This Mean for Security? 6. Assessing Likely Threats to the Network 7. Classifications of Threats 1. Malware 2. Compromising System Security—Intrusions
  • 17. 3. Denial of Service 8. Likely Attacks 9. Threat Assessment 10. Understanding Security Terminology 1. Hacking Terminology 2. Security Terminology 11. Choosing a Network Security Approach 1. Perimeter Security Approach 2. Layered Security Approach 3. Hybrid Security Approach 12. Network Security and the Law 13. Using Security Resources 14. Summary 15. Chapter 2: Types of Attacks 4 1. Introduction 2. Understanding Denial of Service Attacks 1. DoS in Action 2. SYN Flood 3. Smurf Attack 4. Ping of Death 5. UDP Flood 6. ICMP Flood 7. DHCP Starvation
  • 18. 8. HTTP Post DoS 9. PDoS 10. Distributed Reflection Denial of Service 11. DoS Tools 12. Real-World Examples 13. Defending Against DoS Attacks 3. Defending Against Buffer Overflow Attacks 4. Defending Against IP Spoofing 5. Defending Against Session Hijacking 6. Blocking Virus and Trojan Horse Attacks 1. Viruses 2. Types of Viruses 3. Trojan Horses 7. Summary 16. Chapter 3: Fundamentals of Firewalls 1. Introduction 2. What Is a Firewall? 5 1. Types of Firewalls 2. Packet Filtering Firewall 3. Stateful Packet Inspection 4. Application Gateway 5. Circuit Level Gateway 6. Hybrid Firewalls 7. Blacklisting/Whitelisting
  • 19. 3. Implementing Firewalls 1. Host-Based 2. Dual-Homed Hosts 3. Router-Based Firewall 4. Screened Hosts 4. Selecting and Using a Firewall 1. Using a Firewall 5. Using Proxy Servers 1. The WinGate Proxy Server 2. NAT 6. Summary 17. Chapter 4: Firewall Practical Applications 1. Introduction 2. Using Single Machine Firewalls 3. Windows 10 Firewall 4. User Account Control 6 5. Linux Firewalls 1. Iptables 2. Symantec Norton Firewall 3. McAfee Personal Firewall 6. Using Small Office/Home Office Firewalls
  • 20. 1. SonicWALL 2. D-Link DFL-2560 Office Firewall 7. Using Medium-Sized Network Firewalls 1. Check Point Firewall 2. Cisco Next-Generation Firewalls 8. Using Enterprise Firewalls 9. Summary 18. Chapter 5: Intrusion-Detection Systems 1. Introduction 2. Understanding IDS Concepts 1. Preemptive Blocking 2. Anomaly Detection 3. IDS Components and Processes 4. Understanding and Implementing IDSs 1. Snort 2. Cisco Intrusion-Detection and Prevention 7 5. Understanding and Implementing Honeypots 1. Specter 2. Symantec Decoy Server 3. Intrusion Deflection 4. Intrusion Deterrence
  • 21. 6. Summary 19. Chapter 6: Encryption Fundamentals 1. Introduction 2. The History of Encryption 1. The Caesar Cipher 2. ROT 13 3. Atbash Cipher 4. Multi-Alphabet Substitution 5. Rail Fence 6. Vigenère 7. Enigma 8. Binary Operations 3. Learning About Modern Encryption Methods 1. Symmetric Encryption 2. Key Stretching 3. PRNG 4. Public Key Encryption 5. Digital Signatures 4. Identifying Good Encryption 5. Understanding Digital Signatures and Certificates 8 1. Digital Certificates 2. PGP Certificates 3. MD5 4. SHA
  • 22. 5. RIPEMD 6. HAVAL 6. Understanding and Using Decryption 7. Cracking Passwords 1. John the Ripper 2. Using Rainbow Tables 3. Using Other Password Crackers 4. General Cryptanalysis 8. Steganography 9. Steganalysis 10. Quantum Computing and Quantum Cryptography 11. Summary 20. Chapter 7: Virtual Private Networks 1. Introduction 2. Basic VPN Technology 3. Using VPN Protocols for VPN Encryption 1. PPTP 2. PPTP Authentication 3. L2TP 4. L2TP Authentication 5. L2TP Compared to PPTP 4. IPSec 9
  • 23. 5. SSL/TLS 6. Implementing VPN Solution s 1. Cisco