Chapter 1:
Modern Network Security Threats
CCNA Security v2.0
1.0 Introduction
Chapter Outline
1.1 Securing Networks
1.2 Network Threats
1.3 Mitigating Threats
1.4 Summary
© 2013 Cisco and/or its affiliates. All rights reserved.
Cisco Public
2
Section 1.1:
Securing Networks
Upon completion of this section, you should be able to:
• Describe the current network security landscape.
• Explain how all types of networks need to be protected.
© 2013 Cisco and/or its affiliates. All rights reserved.
Cisco Public
3
Topic 1.1.1:
Current State of Affairs
© 2013 Cisco and/or its affiliates. All rights reserved.
Cisco Public
4
Networks Are Targets
© 2013 Cisco and/or its affiliates. All rights reserved.
Cisco Public
5
What is Network Security?
National Security Telecommunications and
Information Systems Security Committee (NSTISSC)
Network security is the protection of information and systems and
hardware that use, store, and transmit that information.
Network security encompasses those steps that are taken to ensure
the confidentiality, integrity, and availability of data or resources.
© 2013 Cisco and/or its affiliates. All rights reserved.
Cisco Public
6
Drivers for Network Security
Common network security terms:
• Threat
• Vulnerability
• Mitigation
Cisco Security Intelligence Operations
ã Risk
â 2013 Cisco and/or its affiliates. All rights reserved.
Cisco Public
7
Vectors of Network Attacks
© 2013 Cisco and/or its affiliates. All rights reserved.
Cisco Public
8
Data Loss
Vectors of data loss:
• Email/Webmail
• Unencrypted Devices
• Cloud Storage Devices
ã Removable Media
ã Hard Copy
ã Improper Access Control
â 2013 Cisco and/or its affiliates. All rights reserved.
Cisco Public
9
Topic 1.1.2:
Network Topology Overview
© 2013 Cisco and/or its affiliates. All rights reserved.
Cisco Public
10
Campus Area Networks
© 2013 Cisco and/or its affiliates. All rights reserved.
Cisco Public
11
Small Office and Home Office Networks
© 2013 Cisco and/or its affiliates. All rights reserved.
Cisco Public
12
Wide Area Networks
© 2013 Cisco and/or its affiliates. All rights reserved.
Cisco Public
13
Data Center Networks
Outside perimeter security:
• On-premise security officers
• Fences and gates
• Continuous video surveillance
• Security breach alarms
Inside perimeter security:
• Electronic motion detectors
• Security traps
• Continuous video surveillance
• Biometric access and exit sensors
© 2013 Cisco and/or its affiliates. All rights reserved.
Cisco Public
14
Cloud and Virtual Networks
VM-specific threats:
Components of a secure data center:
• Hyperjacking
• Secure segmentation
• Instant On activation
• Threat defense
• Antivirus storm
• Visibility
The Evolving Network Border
Critical MDM functions for BYOD network:
• Data encryption
ã PIN enforcement
ã Data wipe
ã Data loss prevention
ã Jailbreak/root detection
â 2013 Cisco and/or its affiliates. All rights reserved.
Cisco Public
15
Section 1.2:
Network Threats
Upon completion of the section, you should be able to:
• Describe the evolution of network security.
• Describe the various types of attack tools used by hackers.
• Describe malware.
• Explain common network attacks.
© 2013 Cisco and/or its affiliates. All rights reserved.
Cisco Public
16
Topic 1.2.1:
Who is Hacking Our Networks?
© 2013 Cisco and/or its affiliates. All rights reserved.
Cisco Public
17
The Hacker & The Evolution of Hackers
Modern hacking titles:
• Script Kiddies
ã Vulnerability Brokers
ã Hacktivists
ã Cyber Criminals
ã State-Sponsored
Hackers
â 2013 Cisco and/or its affiliates. All rights reserved.
Cisco Public
18
Topic 1.2.2:
Hacker Tools
© 2013 Cisco and/or its affiliates. All rights reserved.
Cisco Public
19
Introduction of Attack Tools
© 2013 Cisco and/or its affiliates. All rights reserved.
Cisco Public
20