1 © 2005 Cisco Systems, Inc. All rights reserved. 111 © 2004, Cisco Systems, Inc. All rights reserved.

Slides:



Advertisements
Similar presentations
Cisco Device Hardening Disabling Unused Cisco Router Network Services and Interfaces.
Advertisements

FIREWALLS Chapter 11.
Firewalls Dr.P.V.Lakshmi Information Technology GIT,GITAM University
1 Defining System Security Policies. 2 Module - Defining System Security Policies ♦ Overview An important aspect of Network management is to protect your.
Intrusion Detection and Hackers Exploits IP Spoofing Attack Yousef Yahya & Ahmed Alkhamaisa Prepared for Arab Academy for Banking and Financial Sciences.
Network Security Network Attacks and Mitigation 張晃崚 CCIE #13673, CCSI #31340 區域銷售事業處 副處長 麟瑞科技.
Information Networking Security and Assurance Lab National Chung Cheng University Network Security (I) 授課老師 : 鄭伯炤 Office: Dept. of Communication Rm #112.
INDEX  Ethical Hacking Terminology.  What is Ethical hacking?  Who are Ethical hacker?  How many types of hackers?  White Hats (Ethical hackers)
1 Telstra in Confidence Managing Security for our Mobile Technology.
Networks and Protocols CE Week 10b. Overview of Network Security.
Security+ Guide to Network Security Fundamentals
Security Presented by : Qing Ma. Introduction Security overview security threats password security, encryption and network security as specific.
System and Network Security Practices COEN 351 E-Commerce Security.
Packet Sniffing - By Aarti Dhone.
1 Packet Sniffers Prepared By: Amer Alhorini Supervised By: Dr. Lo'ai Tawalbeh NYIT New York Institute of Technology.
Implementing Secure Converged Wide Area Networks (ISCW)
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Information.
Business Data Communications, Fourth Edition Chapter 10: Network Security.
Firewalls Presented by: Sarah Castro Karen Correa Kelley Gates.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Security Overview. 2 Objectives Understand network security Understand security threat trends and their ramifications Understand the goals of network.
NETWORK SECURITY.
Enterprise Network Security Accessing the WAN Lecture week 4.
Modern Network Security Threats
Network Security1 – Chapter 3 – Device Security (B) Security of major devices: How to protect the device against attacks aimed at compromising the device.
Common forms and remedies Neeta Bhadane Raunaq Nilekani Sahasranshu.
1 Chapter 6 Network Security Threats. 2 Objectives In this chapter, you will: Learn how to defend against packet sniffers Understand the TCP, UDP, and.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.1 ISP Responsibility Working at a Small-to-Medium Business or ISP – Chapter 8.
APA of Isfahan University of Technology In the name of God.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Chapter 15: Security (Part 1). The Security Problem Security must consider external environment of the system, and protect the system resources Intruders.
AIS, Passwords Should not be shared Should be changed by user Should be changed frequently and upon compromise (suspected unauthorized disclosure)
Firewalls Paper By: Vandana Bhardwaj. What this paper covers? Why you need a firewall? What is firewall? How does a network firewall interact with OSI.
Switch Concepts and Configuration and Configuration Part II Advanced Computer Networks.
Csci5233 Computer Security1 Bishop: Chapter 27 System Security.
1 Defining Network Security Security is prevention of unwanted information transfer What are the components? –...Physical Security –…Operational Security.
Objectives Configure routing in Windows Server 2008 Configure Routing and Remote Access Services in Windows Server 2008 Network Address Translation 1.
This courseware is copyrighted © 2015 gtslearning. No part of this courseware or any training material supplied by gtslearning International Limited to.
FIREWALLS Vivek Srinivasan. Contents Introduction Need for firewalls Different types of firewalls Conclusion.
Intrusion Detection Prepared by: Mohammed Hussein Supervised by: Dr. Lo’ai Tawalbeh NYIT- winter 2007.
Securing Wired Local Area Networks(LANs)
1 CHAPTER 3 CLASSES OF ATTACK. 2 Denial of Service (DoS) Takes place when availability to resource is intentionally blocked or degraded Takes place when.
Attack Vectors and Mitigations. Attack Vectors ? Network Security2T. A. Yang
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
1 Topic 2: Lesson 3 Intro to Firewalls Summary. 2 Basic questions What is a firewall? What is a firewall? What can a firewall do? What can a firewall.
Network Security. 2 SECURITY REQUIREMENTS Privacy (Confidentiality) Data only be accessible by authorized parties Authenticity A host or service be able.
APPLICATION PENETRATION TESTING Author: Herbert H. Thompson Presentation by: Nancy Cohen.
CHAPTER 9 Sniffing.
Network Security Chapter 11 powered by DJ 1. Chapter Objectives  Describe today's increasing network security threats and explain the need to implement.
Chapter 10 Security. A typical secured network Recognizing Security Threats 1- Application-layer attacks Ex: companyname.com/scripts/..%5c../winnt/system32/cmd.exe?/c+dir+c:\
Secure Wired Local Area Network( LAN ) By Sentuya Francis Derrick ID Module code:CT3P50N BSc Computer Networking London Metropolitan University.
Database Security David Nguyen. Dangers of Internet  Web based applications open up new threats to a corporation security  Protection of information.
“Lines of Defense” against Malware.. Prevention: Keep Malware off your computer. Limit Damage: Stop Malware that gets onto your computer from doing any.
1 © 2004, Cisco Systems, Inc. All rights reserved. Wireless LAN (network) security.
SYSTEM ADMINISTRATION Chapter 10 Public vs. Private Networks.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
Working at a Small-to-Medium Business or ISP – Chapter 8
Instructor Materials Chapter 7 Network Security
Firewall.
Secure Software Confidentiality Integrity Data Security Authentication
Firewalls.
Security in Networking
Network Security: IP Spoofing and Firewall
Virtual Private Networks
VPN: Virtual Private Network
Security.
Intrusion Detection system
Introduction to Network Security
Presentation transcript:

1 © 2005 Cisco Systems, Inc. All rights reserved. 111 © 2004, Cisco Systems, Inc. All rights reserved.

2 © 2005 Cisco Systems, Inc. All rights reserved. Network Security 1 Module 1 – Overview of Network Security

3 © 2005 Cisco Systems, Inc. All rights reserved. Learning Objectives 1.1 Introduction to Network Security 1.2 Introduction to Vulnerabilities, Threats, and Attacks 1.3 Attack Examples 1.4 Vulnerability Analysis

4 © 2005 Cisco Systems, Inc. All rights reserved. Module 1 – Overview of Network Security 1.1 Introduction to Network Security

5 © 2005 Cisco Systems, Inc. All rights reserved. The Closed Network

6 © 2005 Cisco Systems, Inc. All rights reserved. The Network Today

7 © 2005 Cisco Systems, Inc. All rights reserved. Network Security Models

8 © 2005 Cisco Systems, Inc. All rights reserved. Trends that Affect Security Increase of network attacks Increased sophistication of attacks Increased dependence on the network Lack of trained personnel Lack of awareness Lack of security policies Wireless access Legislation Litigation

9 © 2005 Cisco Systems, Inc. All rights reserved. Legal and Governmental Policy Issues Organizations that operate vulnerable networks will face increasing and substantial liability. US Federal legislation mandating security includes the following: GLB financial services legislation Government Information Security Reform Act HIPAA CIPA

10 © 2005 Cisco Systems, Inc. All rights reserved. Module 1 – Overview of Network Security 1.2 Introduction to Vulnerabilities, Threats, and Attacks

11 © 2005 Cisco Systems, Inc. All rights reserved. Network Vulnerabilities Technology Configuration Policy

12 © 2005 Cisco Systems, Inc. All rights reserved. Threat Capabilities—More Dangerous and Easier to Use

13 © 2005 Cisco Systems, Inc. All rights reserved. Module 1 – Overview of Network Security 1.3 Attack Examples

14 © 2005 Cisco Systems, Inc. All rights reserved. Network Threats There are four general categories of security threats to the network: Unstructured threats Structured threats External threats Internal threats Internet External exploitation External exploitation Internal exploitation Internal exploitation Dial-in exploitation Dial-in exploitation Compromised host

15 © 2005 Cisco Systems, Inc. All rights reserved. Four Classes of Network Attacks Reconnaissance attacks Access attacks Denial of service attacks Worms, viruses, and Trojan horses

16 © 2005 Cisco Systems, Inc. All rights reserved. Specific Attack Types All of the following can be used to compromise your system: Packet sniffers IP weaknesses Password attacks DoS or DDoS Man-in-the-middle attacks Application layer attacks Trust exploitation Port redirection Virus Trojan horse Operator error Worms

17 © 2005 Cisco Systems, Inc. All rights reserved. Reconnaissance Attacks Network reconnaissance refers to the overall act of learning information about a target network by using publicly available information and applications.

18 © 2005 Cisco Systems, Inc. All rights reserved. Reconnaissance Attack Example Sample domain name query Sample IP address query

19 © 2005 Cisco Systems, Inc. All rights reserved. Reconnaissance Attack Mitigation Network reconnaissance cannot be prevented entirely. IDSs at the network and host levels can usually notify an administrator when a reconnaissance gathering attack (for example, ping sweeps and port scans) is under way.

20 © 2005 Cisco Systems, Inc. All rights reserved. Packet Sniffers A packet sniffer is a software application that uses a network adapter card in promiscuous mode to capture all network packets. The following are the packet sniffer features: Packet sniffers exploit information passed in clear text. Protocols that pass information in the clear include the following: Telnet FTP SNMP POP Packet sniffers must be on the same collision domain. Host AHost B Router ARouter B

21 © 2005 Cisco Systems, Inc. All rights reserved. Packet Sniffer Mitigation The following techniques and tools can be used to mitigate sniffers: Authentication—Using strong authentication, such as one-time passwords, is a first option for defense against packet sniffers. Switched infrastructure—Deploy a switched infrastructure to counter the use of packet sniffers in your environment. Antisniffer tools—Use these tools to employ software and hardware designed to detect the use of sniffers on a network. Cryptography—The most effective method for countering packet sniffers does not prevent or detect packet sniffers, but rather renders them irrelevant. Host AHost B Router ARouter B

22 © 2005 Cisco Systems, Inc. All rights reserved. IP Spoofing IP spoofing occurs when a hacker inside or outside a network impersonates the conversations of a trusted computer. Two general techniques are used during IP spoofing: A hacker uses an IP address that is within the range of trusted IP addresses. A hacker uses an authorized external IP address that is trusted. Uses for IP spoofing include the following: IP spoofing is usually limited to the injection of malicious data or commands into an existing stream of data. A hacker changes the routing tables to point to the spoofed IP address, then the hacker can receive all the network packets that are addressed to the spoofed address and reply just as any trusted user can.

23 © 2005 Cisco Systems, Inc. All rights reserved. IP Spoofing Mitigation The threat of IP spoofing can be reduced, but not eliminated, through the following measures: Access control—The most common method for preventing IP spoofing is to properly configure access control. RFC 2827 filtering—You can prevent users of your network from spoofing other networks (and be a good Internet citizen at the same time) by preventing any outbound traffic on your network that does not have a source address in your organization's own IP range. Additional authentication that does not use IP-based authentication— Examples of this include the following: Cryptographic (recommended) Strong, two-factor, one-time passwords

24 © 2005 Cisco Systems, Inc. All rights reserved. DoS Attacks

25 © 2005 Cisco Systems, Inc. All rights reserved. DDoS Attack Example

26 © 2005 Cisco Systems, Inc. All rights reserved. DoS Attack Mitigation The threat of DoS attacks can be reduced through the following three methods: Antispoof features—Proper configuration of antispoof features on your routers and firewalls Anti-DoS features—Proper configuration of anti-DoS features on routers and firewalls Traffic rate limiting—Implement traffic rate limiting with the networks ISP

27 © 2005 Cisco Systems, Inc. All rights reserved. Password Attacks Hackers can implement password attacks using several different methods: Brute-force attacks Dictionary Attacks Trojan horse programs IP spoofing Packet sniffers

28 © 2005 Cisco Systems, Inc. All rights reserved. Password Attack Example L0phtCrack can take the hashes of passwords and generate the clear text passwords from them. Passwords are computed using two different methods: Dictionary cracking Brute force computation

29 © 2005 Cisco Systems, Inc. All rights reserved. Password Attacks Mitigation The following are mitigation techniques: Do not allow users to use the same password on multiple systems. Disable accounts after a certain number of unsuccessful login attempts. Do not use plain text passwords. OTP or a cryptographic password is recommended. Use “strong” passwords. Strong passwords are at least eight characters long and contain uppercase letters, lowercase letters, numbers, and special characters.

30 © 2005 Cisco Systems, Inc. All rights reserved. Man-in-the-Middle Attacks A man-in-the-middle attack requires that the hacker have access to network packets that come across a network. A man-in-the-middle attack is implemented using the following: Network packet sniffers Routing and transport protocols Possible man-in-the-middle attack uses include the following: Theft of information Hijacking of an ongoing session Traffic analysis DoS Corruption of transmitted data Introduction of new information into network sessions Host AHost B Router ARouter B Data in clear text

31 © 2005 Cisco Systems, Inc. All rights reserved. Man-in-the-Middle Mitigation Man-in-the-middle attacks can be effectively mitigated only through the use of cryptography (encryption). Host AHost B Router AISPRouter B A man-in-the-middle attack can only see cipher text IPSec tunnel

32 © 2005 Cisco Systems, Inc. All rights reserved. Application Layer Attacks Application layer attacks have the following characteristics: Exploit well known weaknesses, such as protocols, that are intrinsic to an application or system (for example, sendmail, HTTP, and FTP) Often use ports that are allowed through a firewall (for example, TCP port 80 used in an attack against a web server behind a firewall) Can never be completely eliminated, because new vulnerabilities are always being discovered

33 © 2005 Cisco Systems, Inc. All rights reserved. Application Layer Attacks Mitigation Some measures you can take to reduce your risks are as follows: Read operating system and network log files, or have them analyzed by log analysis applications. Subscribe to mailing lists that publicize vulnerabilities. Keep your operating system and applications current with the latest patches. IDSs can scan for known attacks, monitor and log attacks, and in some cases, prevent attacks.

34 © 2005 Cisco Systems, Inc. All rights reserved. Trust Exploitation

35 © 2005 Cisco Systems, Inc. All rights reserved. Trust Exploitation Mitigation Systems on the outside of a firewall should never be absolutely trusted by systems on the inside of a firewall. Such trust should be limited to specific protocols and should be validated by something other than an IP address where possible. SystemA User = psmith; Pat Smith SystemB compromised by a hacker User = psmith; Pat Smith Hacker User = psmith; Pat Smithson Hacker blocked

36 © 2005 Cisco Systems, Inc. All rights reserved. Port Redirection

37 © 2005 Cisco Systems, Inc. All rights reserved. Unauthorized Access Unauthorized access includes any unauthorized attempt to access a private resource: Not a specific type of attack Refers to most attacks executed in networks today Initiated on both the outside and inside of a network The following are mitigation techniques for unauthorized access attacks: Eliminate the ability of a hacker to gain access to a system Prevent simple unauthorized access attacks, which is the primary function of a firewall

38 © 2005 Cisco Systems, Inc. All rights reserved. Virus and Trojan Horses Viruses refer to malicious software that are attached to another program to execute a particular unwanted function on a user’s workstation. End-user workstations are the primary targets. A Trojan horse is different only in that the entire application was written to look like something else, when in fact it is an attack tool. A Trojan horse is mitigated by antivirus software at the user level and possibly the network level.

39 © 2005 Cisco Systems, Inc. All rights reserved. Vulnerabilities Exist at all OSI Layers

40 © 2005 Cisco Systems, Inc. All rights reserved. Module 1 – Overview of Network Security 1.4 Vulnerability Analysis

41 © 2005 Cisco Systems, Inc. All rights reserved. Auto Secure To secure the management and forwarding planes of the router, use the auto secure command in privileged EXEC mode. auto secure [management | forwarding] [no-interact] Syntax Description management (Optional) Only the management plane will be secured. forwarding (Optional) Only the forwarding plane will be secured. no-interact (Optional) The user will not be prompted for any interactive configurations. If this keyword is not enabled, the command will show the user the noninteractive configuration and the interactive configurations thereafter.

42 © 2005, Cisco Systems, Inc. All rights reserved.