Documente Academic
Documente Profesional
Documente Cultură
1.0 Introduction
1.1 Securing Networks
Chapter Outline
Cisco Public
Section 1.1:
Securing Networks
Upon completion of this section, you should be able to:
Describe the current network security landscape.
Explain how all types of networks need to be protected.
Cisco Public
Topic 1.1.1:
Current State of Affairs
Cisco Public
Cisco Public
Cisco Public
Cisco Public
Data Loss
Vectors of data loss:
Email/Webmail
Unencrypted Devices
Cloud Storage Devices
Removable Media
Hard Copy
Improper Access Control
Cisco Public
Topic 1.1.2:
Network Topology Overview
Cisco Public
Cisco Public
10
Cisco Public
11
Cisco Public
12
Cisco Public
13
Hyperjacking
Secure segmentation
Instant On activation
Threat defense
Antivirus storm
Visibility
Cisco Public
14
Section 1.2:
Network Threats
Upon completion of the section, you should be able to:
Describe the evolution of network security.
Describe the various types of attack tools used by hackers.
Describe malware.
Explain common network attacks.
Cisco Public
15
Topic 1.2.1:
Who is Hacking Our Networks?
Cisco Public
16
Hackers
Cisco Public
17
Topic 1.2.2:
Hacker Tools
Cisco Public
18
Cisco Public
19
Forensic
Wireless hacking
Debuggers
Packet crafting
Encryption
Packet sniffers
Vulnerability exploitation
Rootkit detectors
Vulnerability Scanners
Cisco Public
20
Cisco Public
21
Topic 1.2.3:
Malware
Cisco Public
22
Cisco Public
23
Viruses
Cisco Public
24
Cisco Public
25
Worms
Initial Code Red Worm Infection
Cisco Public
26
Worm Components
Components:
1.
Propagate
for 19 days
Enabling vulnerability
Propagation mechanism
Payload
4.
Repeat the
cycle
Code Red
Worm
Propagation
2.
Launch DoS
attack for
next 7 days
3.
Stop and go
dormant for
a few days
Cisco Public
27
Other Malware
Ransomware
Scareware
Spyware
Phishing
Adware
Rootkits
Cisco Public
28
Topic 1.2.4:
Common Network Attacks
Cisco Public
29
Data
Modification
Syn Flood
Smurf
Attack
Reconnaissance
Access
DoS
Cisco Public
30
Reconnaissance Attacks
Initial query of a target
Ping sweep of the target network
Port scan of active IP addresses
Vulnerability scanners
Exploitation tools
Cisco Public
31
Access Attacks
A few reasons why hackers use access attacks:
To retrieve data
To gain access
To escalate access privileges
Cisco Public
32
Cisco Public
33
Cisco Public
34
DDoS Attacks
1.
2.
3.
Cisco Public
35
Cisco Public
36
Topic 1.3.1:
Defending the Network
Cisco Public
37
Cisco Public
38
Cisco Public
39
Availability:
Assures data is
accessible.
Guaranteed by
network hardening
mechanisms and
backup systems.
Components
of
Cryptography
Integrity:
Uses hashing
algorithms to
ensure data is
unaltered during
operation.
Cisco Public
40
Topic 1.3.2:
Domains of Network Security
Cisco Public
41
Cisco Public
42
Cisco Public
43
Cisco Public
44
Topic 1.3.3:
Introducing the Cisco SecureX Architecture
Cisco Public
45
Cisco Public
46
Cisco Public
47
Secure Data
Center and
Virtualization
Secure
Access
Secure
Email and
Web
Secure
X
Secure
Mobility
Cisco Public
48
Cisco Public
49
Cisco Public
50
Cisco Public
51
Cisco Public
52
Topic 1.3.4:
Mitigating Common Network Threats
Cisco Public
53
Cisco Public
54
Mitigating Malware
Cisco Public
55
Mitigating Worms
Containment
Inoculation
Quarantine
Treatment
Cisco Public
56
Cisco Public
57
Cisco Public
58
Cisco Public
59
Topic 1.3.5:
Cisco Network Foundation Protection Framework
Cisco Public
60
NFP Framework
Cisco Public
61
Cisco Public
62
Cisco Public
63
Cisco Public
64
Section 1.4:
Summary
Chapter Objectives:
Explain network security.
Describe various types of threats and attacks.
Explain tools and procedures to mitigate the effects of malware and common
network attacks.
Cisco Public
65
Thank you.
Instructor Resources
Remember, there are
1
2
Cisco Public
67