Title: Lecture 1 Objectives
1Lecture 1
2Lecture 1 Objectives
- Identify the primary threats of Network Security
- Define the types of Network Attacks
- Identify the Cisco Security Wheel
- Define Cisco AVVID
- Describe Cisco SAFE
3Network Security Overview
4Lecture 1 - Network Security Overview
- Network Security Primary Threats
- Unstructured Threats
- Structured Threats
- External Threats
- Internal Threats
5Lecture 1 - Network Security Overview
- Unstructured Threats
- Inexperienced individuals using readily available
tools from the internet - Some motivated by malicious intent
- Some motivated by gaining intellectual challenge
i.e.. Script Kiddies - Not very knowledgeable, but highly motivated
6Lecture 1 - Network Security Overview
- Structured Threats
- Individuals are more highly motivated
- Technically competent
- Have understanding of network design and
vulnerabilities - Have ability to write hacking scripts to
penetrate systems
7Lecture 1 - Network Security Overview
- External Threats
- Individuals or organizations outside company
without authorized access - Work way into company network through internet or
dial-up access
8Lecture 1 - Network Security Overview
- Internal Threats
- An individual with authorized access to company
network - Typically disgruntled employee, current employee
or contractor
9Lecture 1 - Network Security Overview
- Types of Network Attacks
- Reconnaissance
- Access Attacks
- DoS (Denial of Service) Attacks
10Lecture 1 - Network Security Overview
- Reconnaissance Attacks
- Unauthorized mapping of network systems, design,
services and vulnerabilities( information
gathering) - Use ping-sweeps to discover what systems are
alive, port scans on alive systems to find
vulnerable holes, fingering systems to discover
OS type, network sniffers to discover services
and types of traffic - Think of a thief scoping out a neighborhood, and
even trying to open doors for later use of this
knowledge
11Lecture 1 - Network Security Overview
- Access Attacks
- Unauthorized Data Retrieval - reading, writing,
copying, or moving files that are not intended to
be accessible to the intruder - System Access - intruders ability to gain access
to a machine that one doesnt have authorized
access to - Privilege Escalation legit users, have a lower
level of access privileges, intent is to get
information or execute procedures that are
unauthorized at the users current level of
access - In some cases users only want to gain access, not
necessarily steal information
12Lecture 1 - Network Security Overview
- DoS Attack
- Disabling services or networks with intent to
deny service to legitimate users - Typically crashing systems or slowing them down,
could be wiping out information needed for
business use - Most feared of all attacks i.e. SYN-Flood
attacks, Smurf Attacks, TearDrop Attacks, Ping Of
Death
13Lecture 1 - Cisco Security Wheel
14Lecture 1 - Cisco Security Wheel (cont)
- Create a security policy to act as hub of
security wheel - Policy should include
- The organizations security objective
- Resources to be protected
- The network infrastructure with current maps and
inventories
15Lecture 1 - Cisco Security Wheel (cont)
- 4 Steps to continuous Security
- Step 1 - Secure the system
- Step 2 - Monitor the network
- Step 3 - Test security safeguards put in place
- Step 4 - Improve overall security
16Lecture 1 - Cisco Security Wheel (cont)
- Step 1 Secure the System
- Implement security devices such as firewalls,
authentication systems, encryption, etc - Prevent unauthorized access to organizations
network - Cisco PIX Security Appliance
17Lecture 1 - Cisco Security Wheel (cont)
- Step 2 Monitor the network
- Monitoring violations and attacks against
organizations security policy - Can occur from inside network or outside
organization - Use real-time monitoring devices i.e. Cisco IDS
- Helps in discovering attacks and violations
- Checks and balance for step 1
18Lecture 1 - Cisco Security Wheel (cont)
- Step 3 Test Security safeguards
- Cisco Secure Scanner to identify the networks
security posture with respect to the security
procedures that form the hub of the Security Wheel
19Lecture 1 - Cisco Security Wheel (cont)
- Step 4 - Improve corporate security
- Analyzing the data collected during the
monitoring and testing phases and developing and
implementing improvement mechanisms that feed
into your security policy and the securing phase
in Step 1
20Lecture 1 - Cisco AVVID (Architecture for Voice,
Video and Integrated Data)
- IntegrationBy leveraging the Cisco AVVID
architecture and applying the network
intelligence that is inherent in IP, companies
can develop comprehensive tools to improve
productivity - IntelligenceTraffic prioritization and
intelligent networking services maximize network
efficiency for optimized application performance - InnovationCustomers can adapt quickly in a
changing business environment - InteroperabilityStandards-based application
programming interfaces (APIs) enable open
integration with third-party developers,
providing customers with choice and flexibility
21Lecture 1 - Cisco AVVID
22Lecture 1 - Cisco SAFE
- Flexible, dynamic blueprint for security and VPN
networks, based on Cisco AVVID - Enables businesses to securely and successfully
take advantage of e-business and compete in the
Internet era - Why use it?
- Provides the foundation for migrating to secure,
affordable, converged networks - Lets companies cost-effectively deploy a modular,
scalable security framework in stages - Delivers integrated network protection via
high-level security products and services - First blueprint to say what solutions should be
used at which parts of the network - Open to third party vendors to create security
solutions
23Lecture 1 - Cisco SAFE
- SAFE Layers
- Infrastructure layer
- routers, switches, firewalls, IDSs, and other
devices - Appliances layer
- Incorporates key security functionality in
mobile handheld devices and remote PC clients - Service control layer
- Critical security protocols and APIs
- Applications layer
- Host and application-based security elements
24Lecture 1 - Summary
- Identify the primary threats of Network Security
- Define the types of Network Attacks
- Identify the Cisco Security Wheel
- Define Cisco AVVID
- Describe Cisco SAFE
25Lecture 1 - Labs
- Lab 1a Basic Host to Site VPN using PPTP
- Lab1b Basic Host to Site VPN using L2TP