1 / 60

Introduction to Security: Modern Network Security Threats

Learn about the current state of network security, various network threats, and how to mitigate them. Explore hacker tools, malware types, common network attacks, and methods for defending the network. Discover the domains of network security and the Cisco SecureX architecture.

griggs
Download Presentation

Introduction to Security: Modern Network Security Threats

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Introduction to Security:Modern Network Security Threats CCNA Security v2.0

  2. 1.0 Introduction 1.1 Securing Networks 1.2 Network Threats 1.3 Mitigating Threats 1.4 Summary Chapter Outline

  3. Topic 1.1.1:Current State of Affairs

  4. Drivers for Network Security Common network security terms: • Threat • Vulnerability • Mitigation • Risk Cisco Security Intelligence Operations

  5. Vectors of Network Attacks

  6. Data Loss Vectors of data loss: • Email/Webmail • Unencrypted Devices • Cloud Storage Devices • Removable Media • Hard Copy • Improper Access Control

  7. Topic 1.1.2:Network Topology Overview

  8. Campus Area Networks

  9. Small Office and Home Office Networks

  10. Wide Area Networks

  11. Data Center Networks Outside perimeter security: • On-premise security officers • Fences and gates • Continuous video surveillance • Security breach alarms Inside perimeter security: • Electronic motion detectors • Security traps • Continuous video surveillance • Biometric access and exit sensors

  12. Cloud and Virtual Networks Components of a secure data center: • Secure segmentation • Threat defense • Visibility VM-specific threats: • Hyper-jacking • Instant On activation • Antivirus storm The Evolving Network Border Critical MDM functions for BYOD network: • Data encryption • PIN enforcement • Data wipe • Data loss prevention • Jailbreak/root detection

  13. Section 1.2:Network Threats Upon completion of the section, you should be able to: • Describe the evolution of network security. • Describe the various types of attack tools used by hackers. • Describe malware. • Explain common network attacks.

  14. Topic 1.2.1:Who is Hacking Our Networks?

  15. The Hacker & The Evolution of Hackers Modern hacking titles: • Script Kiddies • Vulnerability Brokers • Hacktivists • Cyber Criminals • State-Sponsored Hackers

  16. White Hat Hackers

  17. Grey Hat Hackers

  18. Black Hat Hackers

  19. Topic 1.2.2:Hacker Tools

  20. Introduction of Attack Tools

  21. Evolution of Security Tools Penetration testing tools: • Password crackers • Wireless hacking • Network scanning and hacking • Packet crafting • Packet sniffers • Rootkit detectors • Fuzzers to search vulnerabilities • Forensic • Debuggers • Hacking operating systems • Encryption • Vulnerability exploitation • Vulnerability Scanners

  22. Categories of Attack Tools Network hacking attacks: • Eavesdropping • Data modification • IP address spoofing • Password-based • Denial-of-service • Man-in-the-middle • Compromised-key • Sniffer

  23. Topic 1.2.3:Malware

  24. Various Types of Malware

  25. Viruses

  26. Trojan Horse Classification Classifications: • Security software disabler • Remote-access • Data-sending • Destructive • Proxy • FTP • DoS

  27. Worms Initial Code Red Worm Infection Code Red Worm Infection 19 Hours Later

  28. Worm Components Components: • Enabling vulnerability • Propagation mechanism • Payload

  29. Other Malware Scareware Phishing Rootkits Ransomware Spyware Adware

  30. Topic 1.2.4:Common Network Attacks

  31. Types of Network Attacks

  32. Reconnaissance Attacks • Initial query of a target • Ping sweep of the target network • Port scan of active IP addresses • Vulnerability scanners • Exploitation tools

  33. Access Attacks A few reasons why hackers use access attacks: • To retrieve data • To gain access • To escalate access privileges A few types of access attacks include: • Password • Trust exploitation • Port redirection • Man-in-the-middle • Buffer overflow • IP, MAC, DHCP spoofing

  34. Social Engineering Attacks • Pretexting • Phishing • Spearphishing • Spam • Tailgating • Something for Something • Baiting

  35. Denial of Service Attacks

  36. DDoS Attacks • Hacker builds a network of infected machines A network of infected hosts is called a botnet. The compromised computers are called zombies. Zombies are controlled by handler systems. • Zombie computers continue to scan and infect more targets • Hacker instructs handler system to make the botnet of zombies carry out the DDoS attack

  37. 1.3 Mitigating Threats

  38. Topic 1.3.1:Defending the Network

  39. Network Security Professionals

  40. Network Security Organizations

  41. Confidentiality, Integrity, Availability

  42. Topic 1.3.2:Domains of Network Security

  43. Network Security Domains • Risk assessment • Security policy • Organization of information security • Asset management • Human resources security • Physical and environmental security • Communications and operations management • Information systems acquisition, development, and maintenance • Access control • Information security incident management • Business continuity management • Compliance

  44. Network Security Policy

  45. Network Security Policy Objectives

  46. Topic 1.3.3:Introducing the Cisco SecureX Architecture

  47. The Security Artichoke

  48. Evolution of Network Security Tools

  49. SecureX Product Families

  50. SecureX Security Technology Cisco SecureX Architecture: • Scanning engines • Delivery mechanisms • Security intelligence operations (SIO) • Policy management consoles • Next-generation endpoint

More Related