© 1999, Cisco Systems, Inc. 2-1 Network Security Threats Chapter 2.

Презентация:



Advertisements
Похожие презентации
© 2000, Cisco Systems, Inc. CSPFF Chapter 1 Network Security and the Cisco Secure PIX Firewall.
Advertisements

© 2001, Cisco Systems, Inc. CSIDS Chapter 2 Introduction to Network Security.
© 2006 Cisco Systems, Inc. All rights reserved. SND v Securing the Perimeter Applying a Security Policy for Cisco Routers.
© 2003, Cisco Systems, Inc. All rights reserved. CSPFA Chapter 3 Cisco PIX Firewall Technology and Features.
Designing Network Management Services © 2004 Cisco Systems, Inc. All rights reserved. Designing the Network Management Architecture ARCH v
© 2004, Cisco Systems, Inc. All rights reserved. CSPFA Lesson 3 Cisco PIX Firewall Technology and Features.
© 2006 Cisco Systems, Inc. All rights reserved. HIPS v Configuring Rules Configuring Windows-Only Rules.
Copyright 2003 CCNA 4 Chapter 23 Virtual Private Networks By Your Name.
© 2006 Cisco Systems, Inc. All rights reserved. HIPS v Configuring Groups and Policies Configuring Policies.
© 2005 Cisco Systems, Inc. All rights reserved.INTRO v Managing Your Network Environment Managing Cisco Devices.
Cisco Internetwork Troubleshooting Creating End-System Network Configuration Documentation © 2005 Cisco Systems, Inc. All rights reserved. CIT v
© 2006 Cisco Systems, Inc. All rights reserved. SND v Configuring a Cisco IOS Firewall Configuring a Cisco IOS Firewall with the Cisco SDM Wizard.
© 2003, Cisco Systems, Inc. All rights reserved. CSVPN Lesson 11 Configure the Cisco Virtual Private Network 3002 Hardware Client for Unit and.
© 2006 Cisco Systems, Inc. All rights reserved. HIPS v Configuring Rules Configuring Rules Common to Windows and UNIX.
© 2006 Cisco Systems, Inc. All rights reserved. HIPS v Configuring Groups and Policies Building an Agent Kit.
© 2001, Cisco Systems, Inc. CSIDS Chapter 4 Cisco Secure Policy Manager Installation.
Chapter 18: Identifying Trends and Setting Thresholds 18-1 Copyright © 1998, Cisco Systems, Inc.
© 2004 Cisco Systems, Inc. All rights reserved. IPTT v AVVID Troubleshooting Tools Applying Cisco CallManager and Operating System Troubleshooting.
Troubleshooting CallManager, Network Signaling and Dial Plan © 2004 Cisco Systems, Inc. All rights reserved. IPTT v Troubleshooting CallManager CTI,
Designing Virtual Private Networks © 2004 Cisco Systems, Inc. All rights reserved. Designing Remote- Access VPNs ARCH v
Транксрипт:

© 1999, Cisco Systems, Inc. 2-1 Network Security Threats Chapter 2

© 1999, Cisco Systems, Inc. MCNSv Objectives Upon completion of this chapter you will be able to perform the following tasks: Identify the need for network security Identify the causes of network security problems Identify the most pervasive and significant security threats for campus, dialup, and Internet environments based on a case study network scenario

© 1999, Cisco Systems, Inc. MCNSv © 1999, Cisco Systems, Inc IT Issues Driving Network Security

© 1999, Cisco Systems, Inc. MCNSv IT Security Issues: The Challenge Security is not just a technology problem Vast quantities of security technologies exist The challenge: implement a single, network-wide security policy

© 1999, Cisco Systems, Inc. MCNSv © 1999, Cisco Systems, Inc Why Do We Have Security Issues?

© 1999, Cisco Systems, Inc. MCNSv Three Primary Reasons for Security Issues Technology weaknesses Configuration weaknesses Policy weaknesses And people eager to take advantage of the weaknesses

© 1999, Cisco Systems, Inc. MCNSv TCP/IP protocol weaknesses –Sendmail, SNMP, SMTP, DoS (Syn Flood) Operating system weaknesses –UNIX, Windows NT, Windows 95, OS/2 Network equipment weaknesses –Password protection –Lack of authentication –Routing protocols –Misconfigured firewall holes Technology Weaknesses TCP/IP OS Network Equipment

© 1999, Cisco Systems, Inc. MCNSv Configuration Weaknesses Unsecured user accounts System accounts with easily guessed passwords Misconfigured Internet services Unsecured default settings within products Misconfigured network equipment Console

© 1999, Cisco Systems, Inc. MCNSv Policy Weaknesses Lack of written security policy Politics Business lacks continuity, cannot implement policy evenly Logical access controls not applied Security administration is lax, including monitoring and auditing Software and hardware installation and changes do not follow policy Disaster recovery plan is nonexistent

© 1999, Cisco Systems, Inc. MCNSv © 1999, Cisco Systems, Inc Security Threat Types

© 1999, Cisco Systems, Inc. MCNSv General Threat Types Eavesdropping Denial of service Unauthorized access Data manipulation Masquerade Session Replay Session hijacking Rerouting Repudiation Viruses, Trojan Horses, and Worms

© 1999, Cisco Systems, Inc. MCNSv Prevents authorized people from using a service TCP SYN attack Ping of Death WinNuke Land.c attack CPU Denial of Service

© 1999, Cisco Systems, Inc. MCNSv Unauthorized Access: WareZ Accessing and placing unauthorized files or resources on another system –GIFs –Hacker tools –Unlicensed versions of software Free software here!

© 1999, Cisco Systems, Inc. MCNSv Data Manipulation: Graffiti Painting over Web pages Replacing FTP files Replacing MOTD files

© 1999, Cisco Systems, Inc. MCNSv Session Susceptibilities Session hijacking Rerouting Repudiation Johns Financial Institution Intruder I am John Send Cash $$$ John X X

© 1999, Cisco Systems, Inc. MCNSv © 1999, Cisco Systems, Inc The Security Opportunity

© 1999, Cisco Systems, Inc. MCNSv The Security Opportunity Good security should… Enable new applications and services Make the Internet a low-cost, ubiquitous access medium Be capable of being implemented and managed by the network manager

© 1999, Cisco Systems, Inc. MCNSv © 1999, Cisco Systems, Inc Chapter Summary and Review Questions

© 1999, Cisco Systems, Inc. MCNSv Summary The growth of networked computing is driving the need for network security Network security presents problems; it is complicated and difficult to implement uniformly Internet connections present security risks There are three primary reasons for security issues: technology, configuration, and policy weaknesses A large number of tools are available to the network intruder General threat types include eavesdropping, denial of service, unauthorized access, data manipulation, masquerade, session replay, session hijacking, rerouting and repudiation Campus, dialup, Extranet, and Internet environments are susceptible

© 1999, Cisco Systems, Inc. MCNSv Review Questions 1. What are the three primary reasons for network security issues? A.Technology weaknesses B.Configuration weaknesses C.Policy weaknesses 2. Which of the general network threats pose a risk to Internet connections? A.All of the general categories B.More threats are being created over time

© 1999, Cisco Systems, Inc. MCNSv Review Questions (cont.) 3. What resources are available to learn network attack types and methods to thwart them? A.Publications such as Maximum Security, Internet Security for Business B.Web sites such as CERT, COAST, Cisco CCO C.Newsgroups such as alt.2600 D.Each of the resources points to still more resources

© 1999, Cisco Systems, Inc. MCNSv