Tải bản đầy đủ (.pptx) (68 trang)

Ccnasv2 instructorppt ch1

Bạn đang xem bản rút gọn của tài liệu. Xem và tải ngay bản đầy đủ của tài liệu tại đây (2.37 MB, 68 trang )

Chapter 1:
Modern Network Security Threats
CCNA Security v2.0


1.0 Introduction

Chapter Outline

1.1 Securing Networks
1.2 Network Threats
1.3 Mitigating Threats
1.4 Summary

© 2013 Cisco and/or its affiliates. All rights reserved.

Cisco Public

2


Section 1.1:
Securing Networks
Upon completion of this section, you should be able to:
• Describe the current network security landscape.
• Explain how all types of networks need to be protected.

© 2013 Cisco and/or its affiliates. All rights reserved.

Cisco Public


3


Topic 1.1.1:
Current State of Affairs

© 2013 Cisco and/or its affiliates. All rights reserved.

Cisco Public

4


Networks Are Targets

© 2013 Cisco and/or its affiliates. All rights reserved.

Cisco Public

5


What is Network Security?
National Security Telecommunications and
Information Systems Security Committee (NSTISSC)
Network security is the protection of information and systems and
hardware that use, store, and transmit that information.
Network security encompasses those steps that are taken to ensure
the confidentiality, integrity, and availability of data or resources.


© 2013 Cisco and/or its affiliates. All rights reserved.

Cisco Public

6


Drivers for Network Security
Common network security terms:
• Threat
• Vulnerability
• Mitigation

Cisco Security Intelligence Operations

ã Risk

â 2013 Cisco and/or its affiliates. All rights reserved.

Cisco Public

7


Vectors of Network Attacks

© 2013 Cisco and/or its affiliates. All rights reserved.

Cisco Public


8


Data Loss
Vectors of data loss:
• Email/Webmail
• Unencrypted Devices
• Cloud Storage Devices
ã Removable Media
ã Hard Copy
ã Improper Access Control

â 2013 Cisco and/or its affiliates. All rights reserved.

Cisco Public

9


Topic 1.1.2:
Network Topology Overview

© 2013 Cisco and/or its affiliates. All rights reserved.

Cisco Public

10


Campus Area Networks


© 2013 Cisco and/or its affiliates. All rights reserved.

Cisco Public

11


Small Office and Home Office Networks

© 2013 Cisco and/or its affiliates. All rights reserved.

Cisco Public

12


Wide Area Networks

© 2013 Cisco and/or its affiliates. All rights reserved.

Cisco Public

13


Data Center Networks
Outside perimeter security:
• On-premise security officers
• Fences and gates

• Continuous video surveillance
• Security breach alarms

Inside perimeter security:
• Electronic motion detectors
• Security traps
• Continuous video surveillance
• Biometric access and exit sensors

© 2013 Cisco and/or its affiliates. All rights reserved.

Cisco Public

14


Cloud and Virtual Networks
VM-specific threats:

Components of a secure data center:

• Hyperjacking

• Secure segmentation

• Instant On activation

• Threat defense

• Antivirus storm


• Visibility

The Evolving Network Border
Critical MDM functions for BYOD network:
• Data encryption
ã PIN enforcement
ã Data wipe
ã Data loss prevention
ã Jailbreak/root detection
â 2013 Cisco and/or its affiliates. All rights reserved.

Cisco Public

15


Section 1.2:
Network Threats
Upon completion of the section, you should be able to:
• Describe the evolution of network security.
• Describe the various types of attack tools used by hackers.
• Describe malware.
• Explain common network attacks.

© 2013 Cisco and/or its affiliates. All rights reserved.

Cisco Public

16



Topic 1.2.1:
Who is Hacking Our Networks?

© 2013 Cisco and/or its affiliates. All rights reserved.

Cisco Public

17


The Hacker & The Evolution of Hackers
Modern hacking titles:
• Script Kiddies
ã Vulnerability Brokers
ã Hacktivists
ã Cyber Criminals
ã State-Sponsored

Hackers

â 2013 Cisco and/or its affiliates. All rights reserved.

Cisco Public

18


Topic 1.2.2:

Hacker Tools

© 2013 Cisco and/or its affiliates. All rights reserved.

Cisco Public

19


Introduction of Attack Tools

© 2013 Cisco and/or its affiliates. All rights reserved.

Cisco Public

20



Tài liệu bạn tìm kiếm đã sẵn sàng tải về

Tải bản đầy đủ ngay
×