Similar documents
1.- L a m e j o r o p c ió n e s c l o na r e l d i s co ( s e e x p li c a r á d es p u é s ).

H ig h L e v e l O v e r v iew. S te p h a n M a rt in. S e n io r S y s te m A rc h i te ct


EM EA. D is trib u te d D e n ia l O f S e rv ic e




Campus Sustainability Assessment and Related Literature


How To Know If You Are A Good Or Bad Person


SCO TT G LEA SO N D EM O Z G EB R E-

M P L S /V P N S e c u rity , C is c o S y s te m s, In c. A ll rig h ts re s e rv e d.

W h a t is m e tro e th e rn e t

B a rn e y W a r f. U r b a n S tu d ie s, V o l. 3 2, N o. 2, ±3 7 8

i n g S e c u r it y 3 1B# ; u r w e b a p p li c a tio n s f r o m ha c ke r s w ith t his å ] í d : L : g u id e Scanned by CamScanner





Victims Compensation Claim Status of All Pending Claims and Claims Decided Within the Last Three Years


PSTN. Gateway. Switch. Supervisor PC. Ethernet LAN. IPCC Express SERVER. CallManager. IP Phone. IP Phone. Cust- DB

B rn m e d s rlig e b e h o v... 3 k o n o m i S s k e n d e tils k u d o g k o n o m is k frip la d s... 7 F o r ld re b e ta lin g...


CIS CO S Y S T E M S. G u ille rm o A g u irre, Cis c o Ch ile , C is c o S y s te m s, In c. A ll rig h ts re s e rv e d.

Practice Writing the Letter A


I n la n d N a v ig a t io n a co n t r ib u t io n t o eco n o m y su st a i n a b i l i t y


Erfa rin g fra b y g g in g a v

w ith In fla m m a to r y B o w e l D ise a se. G a s tro in te s tin a l C lin ic, , K a s h iw a z a, A g e o C ity, S a ita m a



/*


1. Oblast rozvoj spolků a SU UK 1.1. Zvyšování kvalifikace Školení Zapojení do projektů Poradenství 1.2. Financování

Put the human back in Human Resources.



Middagserie Eschatologie Oosterparkkerk, Amsterdam, December 2007


proxy cert request dn, cert, Pkey, VOMS cred. (short lifetime) certificate: dn, ca, Pkey mod_ssl pre-process: parameters->

A n d r e w S P o m e r a n tz, M D

ACE-1/onearm #show service-policy client-vips

B R T S y s te m in S e o u l a n d In te g r a te d e -T ic k e tin g S y s te m



J a re k G a w o r, J o e B e s te r, M a th e m a tic s & C o m p u te r. C o m p u ta tio n In s titu te,



B I N G O B I N G O. Hf Cd Na Nb Lr. I Fl Fr Mo Si. Ho Bi Ce Eu Ac. Md Co P Pa Tc. Uut Rh K N. Sb At Md H. Bh Cm H Bi Es. Mo Uus Lu P F.

AN EVALUATION OF SHORT TERM TREATMENT PROGRAM FOR PERSONS DRIVING UNDER THE INFLUENCE OF ALCOHOL P. A. V a le s, Ph.D.

T c k D E GR EN S. R a p p o r t M o d u le Aa n g e m a a k t o p 19 /09 /2007 o m 09 :29 u u r BJB M /V. ja a r.

Opis przedmiotu zamówienia - zakres czynności Usługi sprzątania obiektów Gdyńskiego Centrum Sportu

Using Predictive Modeling to Reduce Claims Losses in Auto Physical Damage

R e t r o f i t o f t C i r u n i s g e C o n t r o l


T ra d in g A c tiv ity o f F o re ig n In s titu tio n a l In v e s to rs a n d V o la tility


Understanding, Modelling and Improving the Software Process. Ian Sommerville 1995 Software Engineering, 5th edition. Chapter 31 Slide 1



Vom prozessorientierten Wissensmanagement zum intelligenten Engineering-Portal

C e r t ifie d Se c u r e W e b

az évi L X V. tv á ra figyelem m el 20. sz á m ú UTASÍTÁSA B u d a p e s t, é v i jú liu s hó 2 8 -á n.

Workload Management Services. Data Management Services. Networking. Information Service. Fabric Management



CLASS TEST GRADE 11. PHYSICAL SCIENCES: CHEMISTRY Test 6: Chemical change

Chem 115 POGIL Worksheet - Week 4 Moles & Stoichiometry Answers

C + + a G iriş 2. K o n tro l y a p ıla rı if/e ls e b re a k co n tin u e g o to sw itc h D ö n g ü le r w h ile d o -w h ile fo r


UNIK4250 Security in Distributed Systems University of Oslo Spring Part 7 Wireless Network Security

d e f i n i c j i p o s t a w y, z w i z a n e j e s t t o m. i n. z t y m, i p o jі c i e t o


Online Department Stores. What are we searching for?

How To Be A Successful Thai



<?xml version="1.0" encoding="utf-8"?> <soapenv:envelope xmlns:soapenv="




Frederikshavn kommunale skolevæsen


SEATTLE CENTRAL COMMUNITY COLLEGE DIVISION OF SCIENCE AND MATHEMATICS. Oxidation-Reduction

\m r l pe r. Con fo rm e a l i a No rm a UN I EN ISO : 2004

GlasCraft Air Motor Repair Kits

Software Quality Requirements and Evaluation, the ISO Series

Workload Management Services. Data Management Services. Networking. Information Service. Fabric Management


Creating a best fit between Business Strategy and Web Services Capabilities using Problem Frames Modeling approach

BMC ITSM Suite - nabité skúsenosťami. Juraj Izák,


Vanguard Direct Deposit S e r v i c e. An easy, electronic way to deposit your pay at Va n g u a r d

Chem 115 POGIL Worksheet - Week 4 Moles & Stoichiometry

Transcription:

IT-S i c h e r h e i t Stephan Meier s m eier@ c is c o. c o m 1

The Evolution d er Z iele Vom H ob b y i s t e n z u m P r of e s s i on a l T hreats b ec o m ing inc reas ing l y d if f ic u l t to d etec t and m itig ate FINANZIELL: Diebstahl & S c had en THREAT SEVERITY Au s p r o b i e r e n : E in fac hes E in d r in g en R u h m u n d Eh r e : V ir en u n d M alw ar e an d V ir en 1990 1995 2 000 2 005 W H A T S N E X T? 2

O G D ie Evolution d er B ed r ohung en BB rr ee ii O uu rr ee aa kk ss W e i t g e h e B e l a s t u n g d e I T e i c h U s e te tb fäc rt r Ärg rl für r G ee zz ii ee ll te An gg rr ii ff ff ee D e fi n i e rt e s Z i e l B u s i n e s s V e rl u s t e V o m U s e r u n b e m e rk t A b e A b e E e F a s t u n s i c h t b a a u t o m a t i s i e e G e n g e s W i s s e n d e P z e s s e U s e M i t w i e n d e U s e n f l u s s a u f P r o d u k v i P o n e l l e r S c h a d e n r r rfo rd rt r rt ri r ro r rk r r Ei ti tät te ti An ti -V i r u s L3 / L4 Fi r e w a l l In tr u s i o n P r e v e n ti o n V e r h a l te n s a n a l y s e Ap p. G a te w a y 3

Einig e F a k ten: R e a l e B e d r oh u n g e n b e e i n f l u s s e n r e a l e N e t z e James A n c h et a, G el eg en h ei t s- H ac k er au s K al i f o r n i en A n c heta ben u tz te v er sc hied en ste M alw ar e u m d ie K o n tr o lle über w eltw eit 400,000 C o m p u ter z u über n ehm en A n c heta ben u tz te d iese M ac hin en u m H u n d e rt t a u s e n d e Do llar z u m ac hen V er m ieten d er M ac hin es an S p am m er I n stallier en v o n S p y w ar e au f d en M ac hin en E r w u rd e g e fa s s t, a l s e r C o m p u t e r i n fi z i e rt e, d i e für d i e W a ffe n fo rs c h u n g d e r U S R e g i e ru n g g e n u t z t w u rd e n. I m M a i 2 006 z u 5 J a h re n G e fän g n i s v e ru rt e i l t 4

S p y w a r e z um V er k a uf Die n eu e F ir m en S p io n a g e R u t h u n d M i c h a e l H a e p h ra t i w i rd v o rg e w o rfe n, i n d i v i d u e l l e S p y w a re für I n d u s t ri e s p i o n a g e z u e rs t e l l e n M i c h a e l H a e p h ra t i h a t 2 000 a n g e fa n g e n T ro j a n e r z u e n t w i c k e l n E h e fra u R u t h H a e p h ra t i v e rm a rk t e t d i e s e 2 004 a n d re i P ri v a t e E rm i t t l u n g s u n t e rn e h m e n D i e S p y w a re n u t z t b e k a n n t e S i c h e rh e i t s l üc k e n i n W i n d o w s S y s t e m e n E s w u rd e n u n t e r N u t z u n g v o n S t a n d a rd v e rfa h re n d i v e rs e D a t e n g e s a m m e l t : K e y s t ro k e L o g g i n g, S c re e n F a p t u re, F i l e T ra n s fe r, u s w. r g i t K r i n l n d r d i n t t I n f o r i o n z u l u n d P r o f i t z u h. D i T h g n i t r d t l i c h, d d i G r d u r c h S p y w z u n i, u n d d F i r r i, d n i c h t n u r P r i v w d b r o f f n d. "O an si er e mi el e si seh ar an er essi er mat en st eh en mac en ese at sac e si al ser seh eu aß e ef ah ar e mmt aß men eal ser en müssen aß at an en er et en si " Source: T e c h W e b h t t p :/ / w w w. t e c h w e b. c o m / a r t i c l e / s h o w A r t i c l e. j h t m l ; j s e s s i o n i d = U 45G M N U B 4Y 4V O Q S N D L P S K H 0 C J U N N 2J V N? a r t i c l e I d = 18150 129 4& p g n o = 2 5

C is c o S elf -D ef end ing N etw or k : Nutzung d e s Ne tzw e r k s um B e d r o h unge n zu E r k e nne n, zu I d e nti f i zi e r e n und E i nzud äm m e n I n t eg r i er t E rm ög l i c h t j e d e s E l e m e n t i m N e t z w e rk P u n k t d e r A b w e h r e i n e s A n g ri ffs o d e r e i n e r P o l i c y U m s e t z u n g z u s e i n Z u sammen w i r k en d Z u s a m m e n w i rk e n z w i s c h e n F u n k t i o n e n u n d G e rät e n z u r A b w e h r e i n e s A n g ri ffs A n p assu n g sf äh i g P ro a k t i v e S e c u ri t y T e c h n o l o g i e n d i e B e d ro h u n g e n a u t o m a t i s c h b e g e g n e n 6

V or teile eines I nteg r ier ten A ns a tz es K o m p U m g n g k u n d I n k o n G g k S c z u m H o T C O lex e ebu Lüc en stisten t er in er Über blic hw ier ig an ag en he V er ein fac hte U m g ebu n g H o he I n teg r atio n = ho he S ic her heit H o her Über blic k E in fac h u m z u setz en u n d z u m an ag en N ied r ig e T C O 7

M Q S elf -D ef end ing N etw or k S S L V P N II NN TT EE GG RR AA TT EE D D SS EE CC UU RR II TT YY Encrypted LAN / WAN C o m m u ni ca ti o ns I P S ec V P N D D o S i ti g a ti o n AV Ag ent C i s co S ecu ri ty Ag ent AA DD AA PP TT II VV E E TT HH RR EE AA T T DD EE FF EE NN SS EE F i rew a l l s a nd I ntru s i o n D etecti o n CC OO LLA BB OO RR AA TT II VV E E SS EE CC UU RR II TT Y Y (( NN AA C C )) I denti ty-b a s ed Netw o rk i ng ( I B NS ) Netw o rk I nf ecti o n C o nta i nm ent u a ra nti ne V LAN ( R em edi a ti o n) C i s co T ru s t Ag ent Netw o rk Adm i s s i o n C o ntro l 8

B es t a n d t eil e d es S el f -Def en d in g N et w o r k s 10

M W Z Lös ung en z ur K ontr olle und z um Eind äm m en von B ed r ohung en S c h u t z d e r I n t e rn e t N u t z u n g L A N Seg m en t i rel es s L A N Enterprise C a m pu s N etw o rk D M Public I n t e r n e t D a t a C en t er Serv ers D a t a A c c e s s K o n t ro l l e Remote S i te o n i t o ri n g u n d K o n t ro l l e S c h u t z v o r A n g ri ffe n u n d E i n d ri n g e n i n s N e t z 11

S c hutz d er I nter net N utz ung I n t e l l i g e n t e C o n t e n t S e c u ri t y C isc o A S A m it C S C S S M : K o n tr o llier t n eu e B ed r o hu n g en d ie sic h über d ie n o r m ale K o m m u n ik atio n ein sc hleic hen Z u g a n g s ri c h t l i n i e n K o n t ro l l i e re n C isc o N A C : V er hin d er t d as E in br in g en v o n B ed r o hu n g en d u r c h d en N etz w er k sz u g an g m it in fiz ier ten S y stem en E n d g e rät e S c h u t z C S A : S c hütz t in ter n e S y stem e v o r d en F o lg en v o n I n fek tio n en u n d d er en A u sbr eitu n g C i s c o A S A, A n t i -X T e c h n o l o g i e n, C S A u n d N A C : K o n t ro l l i e re n v o n B e d ro h u n g e n, U s e rs s c h üt z e n u n d V e rt ra u e n s c h a ffe n 12

G G G G M K ontr olle von M a lw a r e M a na g em ent Netw o rk D a ta C enter R em o te/b ra nch O f f i ce STOP O Endg eräte S ch u tz I n f ek ti on en V er h i n d er n : C i s c o S ec u r i ty A g en t I n f ek i on en b eh eb en : D es k top A n ti v i r en -S W ; i c r os of t u n d a n d er e A n ti -S p y w a r e S W C o r p o r a te Ne tw o r k I nternet C o nnecti o ns I n t e rn e t STOP O O C o rpo ra te LAN STOP O R em o te Acces s S ys tem s o i s s i o C o l S i c h s l, d a Netw rk Adm n ntro er tel en ß E n d g er äte d i e Ri c h tl i n i en er f ül l en Netz w erk -b a s i erende B u s i nes s C o ntent K o ntro l l e P a rtner M u l ti f u n k ti on s Acces s S ec u r i ty D ev i c es Ex tra net C o nnecti o ns F i r ew a l l s I n tr u s i on P r ev en ti on S y s teme P r ox i es 13

Üb er g äng e und I nter net Z ug äng e m C is c o A S A 5 5 0 0 S er ie s c hütz en S c h u t z d e r N e t z w e rk z u g än g e e rfo rd e rt e i n e l e i s t u n g s fäh i g e, i n t e g ri e rt e P l a t t fo rm F irew al l u nd V P N Lös u ng E nterpris e K l as s e d er Stand ard is ieru ng m inim iert I nb etrieb nahm e- u nd B etrieb s k o s ten F l ex ib l e A rc hitek tu re l ief ert d en ric htig en Serv ic e an d er ric htig en Stel l e E rw eiterb ar u nd A npas s b ar A S A 5 5 00 F i r e w a l l E d i t i o n A S A 5 5 00 V P N E d i t i o n I n t e r n e t AS E da g 5e 5 0 0 I PS S e c Edi u r i t y ti o n A S A 5 5 00 I P S E d i t i o n Remote S i te w / L oc a l I n ter n et A c c es s it d er A S A 5 5 00 A n t i -X E d i t i o n C i s c o b i e t e t d i e u m s s e n d s t e I n t e e t G a t e w a y S e c u t y u n g fa rn ri Lös 14

M C is c o A S A 5 5 0 0 S er ie A nti-x Ed ition B i e t e t m a rk t füh re n d e C o n t e n t S e c u ri t y B e d ro h u n g s a rt e n : T e c h n o l o g i e P a rt n e rs c h a ft U n e r l a u b t e r Z u g a n g E i n d r i n g e n A n g r i f f e u n d U n s i c h e r e V e r b. ASA 5500 m i t C SC -SSM Anti-X S e r v ic e E r w e ite r u ng V i r e n S p y w a r e a l w a r e P h i s h i n g S p a m U n e r l a u b t e U R L s I d e n t i t y T h e f t A g g r e s s i v e I n h a l t e G ra n u l a re P o l i c y K o n t ro l l e U m s s e n d e M a l w a S c h u t z fa r re F o rt s c h ri t t l i c h e C o n t e n t F i l t e re ru n g I n t e g ri e rt e M a i l S e c u ri t y E i n fa c h z u N u t z e n I n teg r ier te T r en d M ic r o A n tiv ir u s u n d C o n ten t S ec u r ity T ec hn o lo g ien u n d K n o w H o w B ietet 2 4 -S td S u p p o r t g estütz t d u r c h führ en d e S ec u r ity S p ez ialisten 15

QQ N etw or k A d m is s ion C ontr ol in A k tion C l i e n t b a u t V e rb i n d u n g Desktop a u f A u t h e n t i fi z i e ru n g u n d Üb e rp rüfu n g d e r P o l i c y ( P o l i c y S e rv e r) A g en t Si R em ed i a ti on C o rp o ra t e N e t Z u g g l b t Z u g g v w g t Q u t R i i o n an er au an er ei er ar an än e emed at uu aa rr aa nn ti nn e VV LA NN 17

W a s is t N etw or k A d m is s ion C ontr ol? Nutzt d a s Ne tzw e r k um zu e r zw i n g e n, d a ß r e i n k o m - m e n d e E n d g e r äte R e g e l k o n f o r m s i n d. device s ecu r it y I st M S g epa tc h ed? G i b t es A / V od er A / S? Läu f t es? La u f en S er v i c es? S i n d er f or d er l i c h e Da tei en v or h a n d en? iden t it y Please enter username: NN AA CC W er i st d er U ser? I st er a u th or i si er t? W el c h e R ol l e b ekom m t er? n et w o r k s ecu r it y Si Si I n P i c y b l i K m n i c h f m G i n Q u a r a n I R i a f d l i c h I R i a v f b a r st ei e ol eta er t? om en t-kon or e er äte tän e? st em ed ti on er or er st em ed ti on er üg? 19

S ing le-s ig n-on m it A S A und V P N 3 0 0 0 NEW 20

MM Schutz v o r A n g r i f f e n un d E i n d r i n g e n i n s N e tz EE vv ee nn t t KK oo ll aa tt ii oo nn uu nn d d AA ll aa MM aa nn aa gg ee mm ee nn tt KK oo ll aa tt ii oo nn uu nn d d ii nn dd aa mm pp n n vv oo n n EE vv ee nn tt s s zz uu ii dd ee nn tt ii zz ii ee nn gg vv oo n n BB ee dd hh uu nn gg ee nn mm ii tt CC SS AA RR SS rre rm rre e fe r fi ru ro - II dd ee nn tt ii zz ee nn gg vv oo n n NN ee tt zz ww ee BB ee dd hh uu nn gg ee nn SS ii gg nn aa tt uu uu nn d d AA nn oo mm aa ll ii ee EE ee nn nn uu nn gg uu nn d d AA nn aa ll yy ss ee vv oo n n DD aa tt ee nn ss tt ee nn mm ii tt II PP SS SS cc hh uu tt zz dd ee EE nn dd ss yy ss tt ee mm ee SS cc hh uu tt zz vv oo AA nn gg nn gg ee gg ee nn EE nn dd ss yy ss tt ee mm ee mm ii tt tt ee ll ss CC SS A A KK ll aa ss ss ii zz ii ee nn gg dd ee s s OO S S uu nn d d AA nn ww ee nn dd uu nn gg ee nn fi ru rk ro re rk röm r r ri ffe, fi ru I P S, C S A, & C S -M A R S i d e n ti f i zi e r e n i m D e ta i l d i e B e d r o h un g e n d ur c h s y s te m w e i te Z us a m m e n - a r b e i t 22

V er hind er t A ng r if f e und Eind r ing en M a na g em ent Netw o rk D a ta C enter R em o te/b ra nch O f f i ce S erv er S ch u tz V er h i n d er t A u s f üh r u n g v on A n g r i f f en E r k en n en v on F eh l v er h a l ten C o r p o r a te Ne tw o r k I nternet C o nnecti o ns I n t e rn e t C o rpo ra te LAN R em o te Acces s S ys tem s B edro h u ng s - K o rrel a ti o n A l a r m M a n a g emen t F eh l a l a r m Red u z i er u n g B u s i nes s P a rtner Acces s Ex tra net C o nnecti o ns I ntru s i o n P rev enti o n A n oma l i e D etec ti on M u s ter er k en n u n g Ri s k Ra ti n g 23

Z us a m m e n a r b e i t d e r Sy s te m e Ermög l i c h t e i n f a c h e s u n d w i rk s a me s V o rg e h e n V e rb e s s e rt N e t z w e rk - w e i t e S i c h t b a rk e i t R e d u z i e rt d a s V o l u m d e r I n fo rm a t i o n u n d A l a rm e n V e rb e s s e rt R e l e v a n z d e r I n fo rm a t i o n V e rb e s s e rt Z u v e rl äs s i g k e i t d e r S i g n a t u re n V e rm i n d e rt F a l s e P o s i t i v e s Beschleunigt d ie E r k ennung und A b w ehr v o n Bed r o hungen, v er einf a cht d a s V o r gehen 24

C is c o M A R S ( M i t i g at i o n an d R esp o n se S y st em) N u tz u ng d er v o rhand enen N etz w erk inf ras tru k tu r z u r Sic herheits anal y s e D atenk o rrel l ieru ng im k o m pl etten N etz N I DS, F ir ew all, R o u ter, S w itc hes, C S A S y slo g, S N M ev en t lo g s P, R DE P, S DE E, N etf lo w, E n d p o in t Sc hnel l e Lo k al is ieru ng v o n A ng rif f en u nd E inl eitu ng v o n G eg enm aßnahm en K ey F eatu res M e l d e t Se c u r i ty incidents b a s i e r e n d a u f D ev ice m essa g es, ev ents, u n d sessio ns I w e r d e n g r a p h i s c h i n d e r p o l o g i e d a r g e s l l ncidents to te t G e g e n m a ßn a h m e n a u f L 2 p o r ts u n d L 3 G e r äte n Sk a l i e r b a r k e i t a u c h i n k o m p l e x e r e n U m g e b u n g e n 25

C S -M A R S D a tenk or r elier ung Genaue D ar s t el l ung d es A ng r i f f s w eg es H A P S c a n s T a r g X, f l b y H A B u f f O v f l A c k T a r g X W h X i s v u l n a b l A c k, f l b y T a r g X u p a s s w d a c k T a r g Y os t or t et ol ow ed os t er er ow tta to et er e er e to tta ol ow ed et ex ec tes or tta on et 26

C S-M A R S E i n l e i tun g v o n G e g e n m a ßn a hm e n Nutzung d e r A b w e h r m d e s Ne tzw e r k s ögl i c h e i te n i nne r h a l b G r a p h i s c h e D a r s l l u n g d e s L a y e r 2 a c k p a te 3 tta th. G e g e n m a ßn a h m e n w e r d e n a u f d e m N e tz w e r k g e r ät d u r c h g e f üh r t. S w i t c h C i s c o M AR S k o n f i g u r i e r t G e g e n m a ßn a h m e n R o u t er F i r ew al l ] 27

M D a y Z er o und I ntr us ion P r otec tion d ur c hg äng ig im F ir m ennetz D i e v o l l st än d i g st e I n t r u si o n P r ev en t i o n Lösu n g am M ar k t C S A U ms etz u n g v on S i c h er h ei ts r i c h tl i n i en P er i meter C i s c o A S A E i n h ei tl i c h es M a n a g emen t, K or r el a ti on u n d A n a l y s e C S A C i s c o I S R S er v i c e P r ov i d er C i s c o P I X C S - M a n a g er, C S - M A RS C S A S c h u tz d er Z u g än g e C i s c o G u a r d C i s c o I P S 4 2 0 0 C i s c o C a ta l y s t S er v i c e M od u l es C S A D a y Z er o E n d g er äte S c h u tz D D os u n d A n ti - S p oof i n g a s s n a h men I d en ti f i z i er t u n d K on tr ol l i er t O u tb r ea k s S er v er S c h u tz 28

W Ty p is c her D a y -Z er o A ng r if f N I PS Public servers E m a il F ilt er C a t a ly st 6 0 0 0 w / securit y service m o d ules I n t ern a l S ervers I n t er n et C i s c o I S R A S A C a ta l y s t L 3 E th er n et S w C isco A C S i tc h V P N 3 0 0 0 N I P S L A N A P s C i s c o I S R w / V P N C U s er H os ts Der A n g ri f f h a t ei n en ex t ern en U rs p ru n g u n d v erb rei t et s i c h d a n n I n t ern 29

W D a y -Z er o S D N S c hutz m a s s na hm en I n t er n et N I PS C i s c o I S R E m a il 2. T r a f f i c A n om a l y Public servers F ilt er Detec ti on (N etf l ow ) A S A C a t a ly st 6 0 0 0 w / securit y service m o d ules I n t ern a l S ervers C a ta l y s t L 3 E th er n et S w C isco A C S i tc h V P N 3 0 0 0 1. C i sc o S ec u r i ty A g en t N I P S L A N A P s 3. A n ti -S poof i n g d u r c h d i e I n f r a str u ktu r C i s c o I S R w / V P N C U s er H os ts Z entr a les E v ent M a na gem ent ( C S -M A R S ) b ietet w ichtige I nf o r m a tio nen üb er d ie gena uen A ngr if f sp unk te und er m öglicht so w ir k sa m e G egenm a ssna hm en, a usgelöst d ur ch d en O p er a to r 30

C is c o S ec ur ity A g ent S c h u tz v o n S tu n d e NU LL a n Der C S A a rb ei t et V erh a l t en s -b a s i ert!, N I C H T m i t S i g n a t u ren. E i n e P o s i t i v l i s t e l eg t g en a u f es t, w a s w el c h e A p p l i k a t i o n a u s f üh ren d a rf. Da s u m f a s s t Z u g ri f f e a u f : Da t ei s y s t em e, R eg i s t ry E i n t räg e, S y s t em a u f ru f e u n d S y s t em p ro z es s e, I n s t a l l a t i o n v o n S o f t w a re, K o m m u n i k a t i o n üb er b es t i m m t e P o rt s... C S A b i et et S c h u t z v o n S t u n d e N u l l a n, d a es N I C H T n a c h d en b ek a n n t en A n g ri f f en s u c h t ( S i g n a t u r b a s i eren d ) s o n d ern d i e v o rh a n d en en A n w en d u n g en d u rc h R eg el n s c h üt z t! K ri t i s c h e r B e re i c h! 2 S tu n d en T i mel i n e E rs t e s A u ft re t e n D u rc h C S A g e s c h üt z t! E rs t e r P a t c h 31

37