Network Security. 1 Pass the course => Pass Written exam week 11 Pass Labs



Similar documents
CISCO IOS NETWORK SECURITY (IINS)

Securing Cisco Network Devices (SND)

Högskolan i Halmstad Sektionen för Informationsvetenskap, Data- Och Elektroteknik (IDÉ) Ola Lundh. Name (in block letters) :

2. From a control perspective, the PRIMARY objective of classifying information assets is to:

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

Network Security: Introduction

IDS 4.0 Roadshow. Module 1- IDS Technology Overview. 2003, Cisco Systems, Inc. All rights reserved. IDS Roadshow

Certified Ethical Hacker (CEH)

This chapter covers the following topics: Why Network Security Is Necessary Secure Network Design Defined Categorizing Network Security Threats How

Network Incident Report

ACADEMIA LOCAL CISCO UCV-MARACAY CONTENIDO DE CURSO CURRICULUM CCNA. SEGURIDAD CCNA SECURITY. VERSION 1.0

Asheville-Buncombe Technical Community College Department of Networking Technology. Course Outline

E-BUSINESS THREATS AND SOLUTIONS

Network Security: A Practical Approach. Jan L. Harrington

Certified Ethical Hacker Exam Version Comparison. Version Comparison

a) Encryption is enabled on the access point. b) The conference room network is on a separate virtual local area network (VLAN)

Security Frameworks. An Enterprise Approach to Security. Robert Belka Frazier, CISSP

A43. Modern Hacking Techniques and IP Security. By Shawn Mullen. Las Vegas, NV IBM TRAINING. IBM Corporation 2006

Global Partner Management Notice

Computer Forensics Training - Digital Forensics and Electronic Discovery (Mile2)

Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits)

74% 96 Action Items. Compliance

Best Practices For Department Server and Enterprise System Checklist

A Systems Engineering Approach to Developing Cyber Security Professionals

THE BUSINESS CASE FOR NETWORK SECURITY: ADVOCACY, GOVERNANCE, AND ROI

Passing PCI Compliance How to Address the Application Security Mandates

CCNA Security v1.0 Scope and Sequence

How To Secure Network Threads, Network Security, And The Universal Security Model

ICANWK406A Install, configure and test network security

SY system so that an unauthorized individual can take over an authorized session, or to disrupt service to authorized users.

CompTIA Security+ (Exam SY0-410)

Jort Kollerie SonicWALL

Windows Remote Access

How To Classify A Dnet Attack

Malicious Programs. CEN 448 Security and Internet Protocols Chapter 19 Malicious Software

10- Assume you open your credit card bill and see several large unauthorized charges unfortunately you may have been the victim of (identity theft)

INTRUSION DETECTION SYSTEMS and Network Security

Secure Software Programming and Vulnerability Analysis

Description: Objective: Attending students will learn:

8 Steps for Network Security Protection

8 Steps For Network Security Protection

CEH Version8 Course Outline

Architecture Overview

Cisco Advanced Services for Network Security

NEW YORK INSTITUTE OF TECHNOLOGY School of Engineering and Technology Department of Computer Science Old Westbury Campus

Presented By: Holes in the Fence. Agenda. IPCCTV Attack. DDos Attack. Why Network Security is Important

Chapter 8 Security Pt 2

SCP - Strategic Infrastructure Security

Bendigo and Adelaide Bank Ltd Security Incident Response Procedure

G/On. Basic Best Practice Reference Guide Version 6. For Public Use. Make Connectivity Easy

Common Cyber Threats. Common cyber threats include:

CSCI 4250/6250 Fall 2015 Computer and Networks Security

General Network Security

Villains and Voice Over IP

CompTIA Security+ Certification Study Guide. (Exam SYO-301) Glen E. Clarke. Gravu Hill

LoadMaster Application Delivery Controller Security Overview

A Decision Maker s Guide to Securing an IT Infrastructure

Section 12 MUST BE COMPLETED BY: 4/22

Seminar Computer Security

1.3 Prohibit Direct Public Access - Prohibit direct public access between the Internet and any system component in the cardholder data environment.

Innovative Defense Strategies for Securing SCADA & Control Systems

IP Phone Security: Packet Filtering Protection Against Attacks. Introduction. Abstract. IP Phone Vulnerabliities

SECURING YOUR SMALL BUSINESS. Principles of information security and risk management

Security Considerations White Paper for Cisco Smart Storage 1

How NETGEAR ProSecure UTM Helps Small Businesses Meet PCI Requirements

CSE331: Introduction to Networks and Security. Lecture 32 Fall 2004

Effective Defense in Depth Strategies

Cisco CCNP Implementing Secure Converged Wide Area Networks (ISCW)

Emerging Network Security Threats and what they mean for internal auditors. December 11, 2013 John Gagne, CISSP, CISA

Firewalls, Tunnels, and Network Intrusion Detection. Firewalls

CS 356 Lecture 17 and 18 Intrusion Detection. Spring 2013

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

CRYPTUS DIPLOMA IN IT SECURITY

National Cyber League Certified Ethical Hacker (CEH) TM Syllabus

CS5008: Internet Computing

Network Security Administrator

Hackers are here. Where are you?

Firewalls, Tunnels, and Network Intrusion Detection

Advanced Higher Computing. Computer Networks. Homework Sheets

Detailed Description about course module wise:

Eleventh Hour Security+

Network Security: 30 Questions Every Manager Should Ask. Author: Dr. Eric Cole Chief Security Strategist Secure Anchor Consulting

Security and Access Control Lists (ACLs)

PART D NETWORK SERVICES

CYBERTRON NETWORK SOLUTIONS

Firewalls. Ola Flygt Växjö University, Sweden Firewall Design Principles

CCNA Security v1.0 Scope and Sequence

SECURITY FLAWS IN INTERNET VOTING SYSTEM

Consensus Policy Resource Community. Lab Security Policy

COURSE NAME: INFORMATION SECURITY INTERNSHIP PROGRAM

Frequent Denial of Service Attacks

AASTMT Acceptable Use Policy

Contents Introduction xxvi Chapter 1: Understanding the Threats: Viruses, Trojans, Mail Bombers, Worms, and Illicit Servers

Cisco Certified Security Professional (CCSP)

Diploma in Information Security Control, Audit and Management (CISSP Certification)

How To Protect Your Network From Attack From A Hacker On A University Server

CCNA Security 2.0 Scope and Sequence

Firewall Introduction Several Types of Firewall. Cisco PIX Firewall

Transcription:

Network Security Ola Lundh ola.lundh@hh.se Schedule/ time-table: landris.hh.se/ (NetwoSec) Course home-page: hh.se/english/ide/education/student/coursewebp ages/networksecurity cisco.netacad.net Packet Tracer *.pka find them under Tools Study guides Find them under File Sharing

Network Security Eight lab-groups Some of them Swedish Fill in your name and e-mail IN BLOCK LETTERS Also fill in your Cisco login-name (if you have one)

Network Security 1 Pass the course => Pass Written exam week 11 Pass Labs

Network Security Protocols Technologies Devices Tools Techniques Secure data Mitigate threats

Network Security

Network Security

Network Security IDS provides real-time detection of certain types of attacks while they are in progress. IPS devices enable the detection of malicious activity and have the ability to automatically block the attack in real-time. For organizations that do not require a dedicated firewall, modern routers, like the Cisco Integrated Services Router (ISR), can be used as sophisticated stateful firewalls.

Network Security

Network Security Each type corresponding proocol - hide Cryptography Wireless VoIP Computerfiles

Network Security Information security Confidentiality Encryption Integrity Hashing mechanisms Availability Network hardening Backup

Domains of Network Security 1. Risk assessment 2. Security policy 3. Organization of Information Security 4. Asset management 5. Human resources Security 6. Physical and Environmental Security 7. Communications and Operations Management 8. Access control 9. Information Systems Acquisition, Development and Maintenance 10. Information Security Incident Management 11. Business Continuity Management 12. Compliance

Domains of Network Security 1. Risk assessment

Domains of Network Security 2. Security policy

Domains of Network Security 3. Organization of Information Security

Domains of Network Security 4. Asset management

Domains of Network Security 5. Human resources Security

Domains of Network Security 6. Physical and Environmental Security

Domains of Network Security 7. Communications and Operations Management

Domains of Network Security 8. Access control

Domains of Network Security 9. Information Systems Acquisition, Development and Maintenance

Domains of Network Security 10. Information Security Incident Management

Domains of Network Security 11. Business Continuity Management

Domains of Network Security 12. Compliance

Cisco Self Defending Network

Cisco Self Defending Network

Threats Viruses Attached to legitimate programs (hosts) Worms Run by themselves Trojan horses Masquerade as something legitimate Anti virus products Host based Networks still vulnerable

Reconnaissance Attacks

Access Attacks Password attack Brute force Trojan Horse Packet sniffers Trust exploitation Port redirection Man in the middle Buffer overflow Ping of death Smurf attack TCP Syn flood

Reconnaissance Attack Mitigation Implement authentication to ensure proper access. Use encryption to render packet sniffer attacks useless. Use anti-sniffer tools to detect packet sniffer attacks. Implement a switched infrastructure. Use a firewall and IPS.

Access Attack Mitigation Strong password security Principle of minimum trust Cryptography Applying operating system and application patches

Mitigating DoS Attacks IPS and firewalls (Cisco ASAs and ISRs) Anti-spoofing technologies Quality of Service traffic policing

Summary 1. Keep patches up to date by installing them weekly or daily, if possible, to prevent buffer overflow and privilege escalation attacks. 2. Shut down unnecessary services and ports. 3. Use strong passwords and change them often. 4. Control physical access to systems. 5. Avoid unnecessary web page inputs. Some websites allow users to enter usernames and passwords. A hacker can enter more than just a username. For example, entering "jdoe; rm -rf /" might allow an attacker to remove the root file system from a UNIX server. Programmers should limit input characters and not accept invalid characters such as ; < > as input. 6. Perform backups and test the backed up files on a regular basis. 7. Educate employees about the risks of social engineering, and develop strategies to validate identities over the phone, via email, or in person. 8. Encrypt and password-protect sensitive data. 9. Implement security hardware and software such as firewalls, IPSs, virtual private network (VPN) devices, anti-virus software, and content filtering. 10. Develop a written security policy for the company.