Accessing the WAN: Ch4 - Network Security

35
Save a tree. Please, don't print these slides unless it's necessary. Accessing the WAN: Chapter 4 Abdelkhalik ElsaidMosa All pictures are copied from Cisco CCNA Exploration: Semester 4 Accessing the WAN

description

These slides discuss the basics of network security. The first question that should be answered is, why is network security important? Understanding the increasing threats to security from the past to today. How to think like an attacker? Step 1. Perform footprint analysis (reconnaissance). Step 2. Enumerate information. Step 3. Manipulate users to gain access. Step 4. Escalate privileges. Step 5. Gather additional passwords and secrets. Step 6. Install backdoors. Step 7. Leverage the compromised system. The trade off between open versus closed networks. Developing a security policy for the company or organization is a must. Understanding the common security threats and the different types of network attacks. Finally, general mitigation techniques and the security appliances and applications

Transcript of Accessing the WAN: Ch4 - Network Security

Page 1: Accessing the WAN: Ch4 - Network Security

Save a tree. Please, don't print these slides unless it's necessary.

Accessing the WAN: Chapter 4

Abdelkhalik Elsaid Mosa

All pictures are copied from Cisco CCNA Exploration: Semester 4 – Accessing the WAN

Page 2: Accessing the WAN: Ch4 - Network Security

If you found any mistake’s’ on these slides or if you

have any other questions or comments, please feel

free to email me at: [email protected] or

[email protected]

Thanks,

Abdelkhalik Elsaid MosaSuez Canal University – Faculty of Computers & Informatics

Cisco Local Academy – Ismailia - Egypt

Page 3: Accessing the WAN: Ch4 - Network Security

Why is Network Security Important?

Page 4: Accessing the WAN: Ch4 - Network Security

The Increasing Threat to Security

White hat

Hacker

Black hat Cracker

PhreakerSpammer Phisher

Page 5: Accessing the WAN: Ch4 - Network Security

Think like an attacker

• Step 1. Perform footprint analysis (reconnaissance).

• Step 2. Enumerate information.

• Step 3. Manipulate users to gain access.

• Step 4. Escalate privileges.

• Step 5. Gather additional passwords and secrets.

• Step 6. Install backdoors.

• Step 7. Leverage the compromised system.

Page 6: Accessing the WAN: Ch4 - Network Security

Open versus Closed Networks

Page 7: Accessing the WAN: Ch4 - Network Security

Open versus Closed Networks

Page 8: Accessing the WAN: Ch4 - Network Security

Open versus Closed Networks

Page 9: Accessing the WAN: Ch4 - Network Security

Open versus Closed Networks

Page 10: Accessing the WAN: Ch4 - Network Security

Developing a Security Policy

• Security Policy is a formal statement of the rules by which people who are given access to an organization's technology and information assets must abide.

• A security policy meets these goals:

1. Informs users, staff, and managers of their obligatory requirements for protecting technology and information assets.

2. Specifies the mechanisms through which these requirements can be met.

3. Provides a baseline from which to acquire, configure, and audit computer systems and networks for compliance with the policy.

• ISO/IEC 27002: a guideline for developing organizational security standards.

Risk assessment - Security policy - Organization of information security - Asset management - Human resources security - Physical and environmental security -

Communications and operations management - Access control - Information systems acquisition, development, and maintenance - Information security

incident management - Business continuity management, Compliance

Page 11: Accessing the WAN: Ch4 - Network Security

Common Security Threats: Vulnerabilities

• Threats are the people interested and qualified in taking advantage of each security weakness.

• Vulnerability is the degree of weakness which is inherent in every network and device. This includes routers, switches, desktops, servers, and even security devices.

1. Technological weaknesses

Page 12: Accessing the WAN: Ch4 - Network Security

Common Security Threats: Vulnerabilities

2. Configuration weaknesses

3. Security policy weaknesses

Page 13: Accessing the WAN: Ch4 - Network Security

Common Security Threats: Threats to Physical Infrastructure

• The four classes of physical threats are:

1. Hardware threats-Physical damage to servers, routers, switches, cabling plant, and workstations

2. Environmental threats-Temperature extremes (too hot or too cold) or humidity extremes (too wet or too dry)

3. Electrical threats-Voltage spikes, insufficient supply voltage (brownouts), unconditioned power (noise), and total power loss

4. Maintenance threats-Poor handling of key electrical components (electrostatic discharge), lack of critical spare parts, poor cabling, and poor labeling

Page 14: Accessing the WAN: Ch4 - Network Security

Common Security Threats: Threats to Physical Infrastructure

Page 15: Accessing the WAN: Ch4 - Network Security

Common Security Threats: Threats to Physical Infrastructure

Page 16: Accessing the WAN: Ch4 - Network Security

Common Security Threats: Threats to Physical Infrastructure

Page 17: Accessing the WAN: Ch4 - Network Security

Common Security Threats: Threats to Physical Infrastructure

Page 18: Accessing the WAN: Ch4 - Network Security

Common Security Threats: Threats to Networks

Page 19: Accessing the WAN: Ch4 - Network Security

Common Security Threats: Social Engineering

Page 20: Accessing the WAN: Ch4 - Network Security

Types of Network Attacks

Page 21: Accessing the WAN: Ch4 - Network Security

Types of Network Attacks: Reconaissance

Page 22: Accessing the WAN: Ch4 - Network Security

Types of Network Attacks: Access Attacks

Page 23: Accessing the WAN: Ch4 - Network Security

Types of Network Attacks: Access Attacks

Page 24: Accessing the WAN: Ch4 - Network Security

Types of Network Attacks: Access Attacks

Page 25: Accessing the WAN: Ch4 - Network Security

Types of Network Attacks: Access Attacks

Page 26: Accessing the WAN: Ch4 - Network Security

Types of Network Attacks: DoS and DDoS

Page 27: Accessing the WAN: Ch4 - Network Security

Types of Network Attacks: DoS and DDoS

Page 28: Accessing the WAN: Ch4 - Network Security

Types of Network Attacks: DoS and DDoS

Page 29: Accessing the WAN: Ch4 - Network Security

Types of Network Attacks: DoS and DDoS

Page 30: Accessing the WAN: Ch4 - Network Security

Types of Network Attacks: DoS and DDoS

Page 31: Accessing the WAN: Ch4 - Network Security

Types of Network Attacks: Malicious Code Attacks

Page 32: Accessing the WAN: Ch4 - Network Security

General Mitigation Techniques

Page 33: Accessing the WAN: Ch4 - Network Security

General Mitigation Techniques: IDS, IPS

Page 34: Accessing the WAN: Ch4 - Network Security

General Mitigation Techniques: Common Security Appliances & Applications

Network admission controlAdaptive Security Appliances

Page 35: Accessing the WAN: Ch4 - Network Security