Tải bản đầy đủ (.ppt) (113 trang)

Chapter 04 network security

Bạn đang xem bản rút gọn của tài liệu. Xem và tải ngay bản đầy đủ của tài liệu tại đây (2.93 MB, 113 trang )

Chapter 4: Network Security
CCNA Exploration 4.0
2
Objectives

Identify security threats to enterprise networks

Describe methods to mitigate security threats to enterprise networks

Configure basic router security

Disable unused router services and interfaces

Use the Cisco SDM one-step lockdown feature

Manage files and software images with the Cisco IOS Integrated File
System (IFS)
3
Introduction to Network Security
4
Why is Network Security Important?

Computer networks have grown in both size and importance in a very
short time. If the security of the network is compromised, there could be
serious consequences, such as loss of privacy, theft of information, and
even legal liability. To make the situation even more challenging, the
types of potential threats to network security are always evolving.
5
The Increasing Threat to Security
6
The Increasing Threat to Security



Over the years, network attack tools and methods have evolved.

As the types of threats, attacks, and exploits have evolved, various terms
have been coined to describe the individuals involved:

White hat

Hacker

Black hat

Cracker

Phreaker

Spammer

Phisher
7
Think Like a Attacker
Seven-step process to gain information and state an attack:

Step 1. Perform footprint analysis (reconnaissance).

Step 2. Enumerate information.

Step 3. Manipulate users to gain access.

Step 4. Escalate privileges.


Step 5. Gather additional passwords and secrets.

Step 6. Install backdoors.

Step 7. Leverage the compromised system.
8
Types of Computer Crime

Insider abuse of network access

Virus

Mobile device theft

Phishing where an organization is
fraudulently represented as the
sender

Instant messaging misuse

Denial of service

Unauthorized access to
information

Bots within the organization

Theft of customer or employee
data


Abuse of wireless network

System penetration

Financial fraud

Password sniffing

Key logging

Website defacement

Misuse of a public web
application

Theft of proprietary
information

Exploiting the DNS server
of an organization

Telecom fraud

Sabotage
9
Open versus Closed Networks
10
Developing a Security Policy


The first step any organization should take to
protect its data and itself from a liability
challenge is to develop a security policy: a
set of principles that guide decision-making
processes and enable leaders in an
organization to distribute authority confidently.

A security policy meets these goals:

Informs users, staff, and managers of their
obligatory requirements for protecting
technology and information assets

Specifies the mechanisms through which these requirements can be
met

Provides a baseline from which to acquire, configure, and audit
computer systems and networks for compliance with the policy

A security policy can be as simple as a brief Acceptable Use Policy for
network resources, or it can be several hundred pages long and detail
every element of connectivity and associated policies.
11
Developing a Security Policy

ISO/IEC 27002 is intended to be a common basis and practical guideline
for developing organizational security standards and effective security
management practices. The document consists of 12 sections:

Risk assessment


Security policy

Organization of information security

Asset management

Human resources security

Physical and environmental security

Communications and operations management

Access control

Information systems acquisition, development, and maintenance

Information security incident management

Business continuity management

Compliance
12
Common Security Threats

When discussing network security, three common factors are
vulnerability, threat, and attack.
Vulnerability

Vulnerability is the degree of weakness which is inherent in every

network and device.

There are three primary vulnerabilities or weaknesses:

Technological weaknesses

Configuration weaknesses

Security policy weaknesses
13
Vulnerabilities: Technological weaknesses
14
Vulnerabilities: Configuration weaknesses
15
Vulnerabilities: Security policy weaknesses
16
Common Security Threats
Threats to Physical Infrastructure

The four classes of physical threats are:

Hardware threats: Physical damage to servers, routers,
switches, cabling plant, and workstations

Environmental threats: Temperature extremes (too hot
or too cold) or humidity extremes (too wet or too dry)

Electrical threats: Voltage spikes, insufficient supply
voltage (brownouts), unconditioned power (noise), and
total power loss


Maintenance threats: Poor handling of key electrical
components (electrostatic discharge), lack of critical spare
parts, poor cabling, and poor labeling
17
Physical Security Measures
18
Physical Security Measures
19
Common Security Threats: Threats to Networks
20
Common Security Threats: Threats to Networks

Threats to Networks: four primary classes

Unstructured Threats : consist of mostly inexperienced individuals
using easily available hacking tools. An attacker's skills can do serious
damage to a network.

Structured Threats: come from individuals or groups that are more
highly motivated and technically competent. These people know system
vulnerabilities and use sophisticated hacking techniques to penetrate
unsuspecting businesses.

External Threats: arise from individuals or organizations working
outside of a company who do not have authorized access to the
computer systems or network.

Internal Threats: occur when someone has authorized access to the
network with either an account or physical access.

21
Common Security Threats: Social Engineering

The easiest hack involves no computer skill at all.

Social engineering: an intruder can trick a member of an organization
into giving over valuable information, such as the location of files or
passwords.

Phishing is a type of social engineering attack that involves using e-mail
or other types of messages in an attempt to trick others into providing
sensitive information, such as credit card numbers or passwords.

Phishing attacks can be prevented by educating users and implementing
reporting guidelines when they receive suspicious e-mail.
22
Types of Network Attacks

Reconnaissance

Is the unauthorized discovery and mapping of systems,
services, or vulnerabilities.

It is also known as information gathering and, in most
cases, it precedes another type of attack.

Access

Is the ability for an intruder to gain access to a device for
which the intruder does not have an account or a

password.

Denial of service (DoS)

Is when an attacker disables or corrupts networks,
systems, or services with the intent to deny services to
intended users.

Worms, Viruses, and Trojan Horses
23
Reconnaissance Attacks

Reconnaissance attacks can consist of the following:

Internet information queries

Ping sweeps

Port scans

Packet sniffers

The information gathered by eavesdropping can be used to pose other
attacks to the network.

Two common uses of eavesdropping are as follows:

Information gathering: Network intruders can identify
usernames, passwords, or information carried in a packet.


Information theft: The theft can occur as data is
transmitted over the internal or external network. The
network intruder can also steal data from networked
computers by gaining unauthorized access.
24
Reconnaissance Attacks

Three of the most effective methods for counteracting eavesdropping are
as follows:

Using switched networks instead of hubs so that traffic
is not broadcast to all endpoints or network hosts.

Using encryption that meets the data security needs of
the organization without imposing an excessive burden on
system resources or users.

Implementing and enforcing a policy directive that forbids
the use of protocols with known susceptibilities to
eavesdropping.

Encryption provides protection for data susceptible to eavesdropping
attacks, password crackers, or manipulation.
25
Access Attacks

Access attacks exploit known vulnerabilities in authentication services,
FTP services, and web services to gain entry to web accounts,
confidential databases, and other sensitive information.


Password Attacks:

Implemented using a packet sniffer to yield user accounts
and passwords that are transmitted as clear text.

Use programs repeatedly attempt to log in as a user using
words derived from a dictionary.

Another password attack method uses rainbow tables.

A brute-force attack tool is more sophisticated

Tài liệu bạn tìm kiếm đã sẵn sàng tải về

Tải bản đầy đủ ngay
×