Week 1 - Module 1
Week 1 - Module 1
Week 1 - Module 1
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 4
1.1 Securing Networks
© 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 12
Networks Are Targets
https://threatmap.checkpoint.com/
© 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 13
Networks Are Targets
© 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Cybersecurity vs. Information Security vs. Network Security
Information security, according to security training specialist the SANS Institute, refers to
“the processes and methodologies which are designed and implemented to protect print,
electronic, or any other form of confidential, private and sensitive information or data from
unauthorized access, use, misuse, disclosure, destruction, modification, or disruption.”
Cybersecurity is “the practice of protecting systems, networks and programs from digital
attacks,” according to Cisco. “These attacks are usually aimed at accessing, changing, or
destroying sensitive information; extorting money from users; or interrupting normal
business processes.” PCmag simplifies the definition to: “the protection of data and
systems in networks that are connected to the internet.”
Network security, the SANS Institute explains, is “the process of taking physical and
software preventative measures to protect the underlying networking infrastructure from
unauthorized access, misuse, malfunction, modification, destruction, or improper
disclosure, thereby creating a secure platform for computers, users and programs to
perform their permitted critical functions within a secure environment.”
© 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Reasons for Network Security
Network security breaches can disrupt e-commerce, cause the loss of business data,
threaten people’s privacy, and compromise the integrity of information.
Drivers:
• Threat
Potential danger to an asset such as data or the network.
▪ Vulnerability and Attack Surface
Weakness in a system or its design that could be exploited by a threat.
Attack surface describes different points where an attacker could get into a
system and could get to the data
▪ Exploit
Mechanism used to leverage a vulnerability to compromise an asset.
▪ Risk
Likelihood that a threat will exploit a vulnerability of an asset and result in an
undesirable consequence. © 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 16
Vectors of Network Attacks
An attack vector is a path by which a threat actor can gain access to a server, host, or network.
Attack vectors originate from inside or outside the corporate network. Threat actors may target a
network through the internet, to disrupt network operations and create a denial of service (DoS)
attack.)
© 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 17
Network Topology Overview
Campus Area Networks
© 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 20
Network Topology Overview
Campus Area Networks
Term Definition
VPN The Cisco ISR is secured. It protects data in motion that is flowing from the CAN to the outside world by establishing
Virtual Private Networks (VPNs). VPNs ensure data confidentiality and integrity from authenticated sources.
ASA Firewall A Cisco Adaptive Security Appliance (ASA) firewall performs stateful packet filtering to filter return traffic from the
outside network into the campus network.
IPS A Cisco Intrusion Prevention System (IPS) device continuously monitors incoming and outgoing network traffic for
malicious activity. It logs information about the activity and attempts to block and report it.
Layer 3 Switches These distribution layer switches are secured and provide secure redundant trunk connections to the Layer 2 switches.
Several different security features can be implemented, such as ACLs, DHCP snooping, Dynamic ARP Inspection (DAI), and
IP source guard.
Layer 2 Switches These access layer switches are secured and connect user-facing ports to the network. Several different security features
can be implemented, such as port security, DHCP snooping, and 802.1X user authentication.
ESA/WSA A Cisco Email Security Appliance (ESA) and Web Security Appliance (WSA) provide advanced threat defense, application
visibility and control, reporting, and secure mobility to secure and control email and web traffic.
AAA Server An authentication, authorization, and accounting (AAA) server authenticates users, authorizes what they are allowed to
do, and tracks what they are doing.
Hosts End points are secured using various features including antivirus and antimalware software, Host Intrusion Protection
System features, and 802.1X authentication features.
© 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 21
Network Topology Overview
Small Office and Home Office Networks
• The Layer 2 Switch is an access layer
switch that is hardened with various
security measures. It connects user-
facing ports that use port security to
the SOHO network.
• Wireless hosts connect to the
wireless network using WPA2 data
encryption technology.
• Hosts typically have antivirus and
antimalware software installed.
• Combined, these security measures
provide comprehensive defense at
different layers of the network.
© 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 22
Network Topology Overview
Wide Area Networks
Organizations must ensure secure
transport for the data in motion as it
travels between sites over the
public network. Network security
professionals must use secure
devices on the edge of the network.
© 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 27
Who is Attacking Our Network?
Evolution of Threat Actors
Since hacking started in the 1960s with phone freaking, or phreaking, it has evolved to
include many types of threat actors.
Threat Actor Explanation
Script Kiddies Script kiddies emerged in the 1990s. They are teenagers or inexperienced threat actors running
existing scripts, tools, and exploits, to cause harm, but typically not for profit.
Vulnerability Brokers Vulnerability brokers are grey hat hackers who attempt to discover exploits and report them to
vendors, sometimes for prizes or rewards.
Hacktivists Hacktivists are grey hat hackers who rally and protest against different political and social ideas.
Cybercriminals Cybercriminal is a term for black hat hackers who are either self-employed or working for large
cybercrime organizations.
State- Sponsored State-Sponsored hackers are threat actors who steal government secrets, gather intelligence, and
sabotage networks of foreign governments, terrorist groups, and corporations.
© 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 28
Who is Attacking Our Network?
Cybercriminals
• Money-motivated threat actors.
• Buy, sell, and trade exploits, and
private information and intellectual
property.
• Steal from consumers, small
businesses, as well as large
enterprises and industries.
• While some cybercriminals work
independently, they are more often
financed and sponsored by criminal
organizations.
• It is estimated that globally,
cybercriminals steal billions of dollars
from consumers and businesses
every year.
Threat Actor Tools
• Ransomware is malware that denies access to the infected computer system or its
data. The cybercriminals then demand payment to release the computer system.
• Ransomware has evolved to become the most profitable malware type in history.
• There are dozens of ransomware variants.
• Ransomware frequently uses an encryption algorithm to encrypt system files and data.
• Payments are typically paid in Bitcoin because users of bitcoin can remain
anonymous.
• Email and malicious advertising, also known as malvertising, are vectors for
ransomware campaigns.
• Social engineering is also used.
© 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 37
Malware
Other Malware
These are some examples of the varieties of modern malware:
Type of Malware Description
Spyware Used to gather information about a user and send the information to another entity without the user’s
consent. Spyware can be a system monitor, Trojan horse, Adware, tracking cookies, and key loggers.
Adware Displays annoying pop-ups to generate revenue for its author. The malware may analyze user interests
by tracking the websites visited. It can then send pop-up advertising pertinent to those sites.
Scareware Includes scam software which uses social engineering to shock or induce anxiety by creating the
perception of a threat. It is generally directed at an unsuspecting user and attempts to persuade the
user to infect a computer by taking action to address the bogus threat.
Phishing Attempts to convince people to divulge sensitive information. Examples include receiving an email
from their bank asking users to divulge their account and PIN numbers.
Rootkits Installed on a compromised system. After it is installed, it continues to hide its intrusion and provide
privileged access to the threat actor.
© 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 38
Common Threats and Attacks
Types of Network Attacks
© 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 40
Common Network Attacks - Reconnaissance, Access, and Social Engineering
Access Attacks
Access attacks exploit known vulnerabilities in authentication services, FTP services, and
web services. The purpose of this type of attack is to gain entry to web accounts,
confidential databases, and other sensitive information.
Technique Description
Password Attacks In a password attack, the threat actor attempts to discover critical system passwords using various
methods.
Spoofing Attacks In spoofing attacks, the threat actor’s device attempts to pose as another device by falsifying data.
Common spoofing attacks include IP spoofing, MAC spoofing, and DHCP spoofing.
Trust Exploitation In a trust exploitation attack, a threat actor uses unauthorized privileges to gain access to a system,
possibly compromising the target.
Port redirection In a port redirection attack, a threat actor uses a compromised system as a base for attacks against
other targets.
Man-in-the-Middle In a man-in-the-middle attack, the threat actor is positioned in between two legitimate entities in order to
read or modify the data that passes between the two parties.
Buffer Overflow Attack In a buffer overflow attack, the threat actor exploits the buffer memory and overwhelms it with
unexpected values. This usually renders the system inoperable, resulting in a DoS attack.
© 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 41
Common Network Attacks - Reconnaissance, Access, and Social Engineering
Social Engineering Attacks
Social engineering is an access attack that attempts to manipulate individuals into performing actions or
divulging confidential information. Information about social engineering techniques is shown in the table.
Social Engineering Description
Attack
Pretexting A threat actor pretends to need personal or financial data to confirm the identity of the recipient.
Phishing A threat actor sends fraudulent email which is disguised as being from a legitimate, trusted source to trick the
recipient into installing malware on their device, or to share personal or financial information.
Spear phishing A threat actor creates a targeted phishing attack tailored for a specific individual or organization.
Spam Also known as junk mail, this is unsolicited email which often contains harmful links, malware, or deceptive
content.
Something for Sometimes called “Quid pro quo”, this is when a threat actor requests personal information from a party in
Something exchange for something such as a gift.
Baiting A threat actor leaves a malware-infected flash drive in a public location. A victim finds the drive and
unsuspectingly inserts it into their laptop, unintentionally installing malware.
Impersonation In this type of attack, a threat actor pretends to be someone else to gain the trust of a victim.
© 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 42
Common Network Attacks - Reconnaissance, Access, and Social Engineering
Social Engineering Attacks (Cont.)
Social Description
Engineering
Attack
Tailgating This is where a threat actor quickly follows an
authorized person into a secure location to gain
access to a secure area.
Shoulder This is where a threat actor inconspicuously looks
surfing over someone’s shoulder to steal their passwords
or other information.
Dumpster This is where a threat actor rummages through
diving trash bins to discover confidential documents.
© 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 43
Network Attacks - Denial of Service, Buffer Overflows, and Evasion
DoS and DDoS Attacks
A Denial of Service (DoS)
attack creates some sort of
interruption of network
services to users, devices, or
applications. There are two
major types of DoS attacks:
•Overwhelming Quantity
of Traffic
•Maliciously Formatted
Packets
Component Description
zombies This refers to a group of compromised hosts (i.e., agents). These hosts run malicious code referred to as robots
(i.e., bots). The zombie malware continually attempts to self-propagate like a worm.
bots Bots are malware that is designed to infect a host and communicate with a handler system. Bots can also log
keystrokes, gather passwords, capture and analyze packets, and more.
botnet This refers to a group of zombies that have been infected using self-propagating malware (i.e., bots) and are
controlled by handlers.
handlers This refers to a master command-and-control (CnC or C2) server controlling groups of zombies. The originator of a
botnet can use Internet Relay Chat (IRC) or a web server on the C2 server to remotely control the zombies.
botmaster This is the threat actor who is in control of the botnet and handlers.
© 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 45
1.1 Mitigating Threats
© 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 48
Defending the Network
Network Security Professionals
Network security professionals are responsible for maintaining data assurance for an organization and
ensuring the integrity and confidentiality of information.
Security specialist job roles within an enterprise include Chief Information Officer (CIO), Chief
Information Security Officer (CISO), Security Operations (SecOps) Manager, Chief Security Officer
(CSO), Security Manager, and Network Security Engineer. Regardless of job titles, network security
professionals must always stay one step ahead of the hackers:
• They must constantly upgrade their skill set to keep abreast of the latest threats.
• They must attend training and workshops.
• They must subscribe to real-time feeds regarding threats.
• They must peruse security websites daily.
• They must maintain familiarity with network security organizations. These organizations often
have the latest information on threats and vulnerabilities.
© 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 49
Defending the Network
Network Intelligence Communities
Organization Description
SANS SysAdmin, Audit, Network, Security (SANS) Institute resources are
largely free upon request and include:
• The Internet Storm Center - the popular internet early warning
system
• NewsBites, the weekly digest of news articles about computer
security.
• @RISK, the weekly digest of newly discovered attack vectors,
vulnerabilities with active exploits, and explanations of how recent
attacks worked
• Flash security alerts
• Reading Room - more than 1,200 award-winning, original research
papers.
• SANS also develops security courses.
© 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 51
Defending the Network
Network Intelligence Communities (Cont.)
Organization Description
FIRST Forum of Incident Response and Security Teams (FIRST) is a security
organization that brings together a variety of computer security
incident response teams from government, commercial, and
educational organizations to foster cooperation and coordination in
information sharing, incident prevention and rapid reaction.
SecurityNewsWire A security news portal that aggregates the latest breaking news
pertaining to alerts, exploits, and vulnerabilities.
(ISC)2 International Information Systems Security Certification Consortium
(ISC2) provides vendor neutral education products and career services
to more than 75,000+ industry professionals in more than 135
countries.
CIS The Center for Internet Security (CIS) is a focal point for cyber threat
prevention, protection, response, and recovery for state, local, tribal,
and territorial (SLTT) governments through the Multi-State Information
Sharing and Analysis Center (MS-ISAC). The MS-ISAC offers 24x7 cyber
threat warnings and advisories, vulnerability identification, and
mitigation and incident response.
© 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 52
Defending the Network
Communications Security: CIA
Information security deals with protecting information
and information systems from unauthorized access,
use, disclosure, disruption, modification, or
destruction. The CIA Triad serves as a conceptual
foundation for the field.
© 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 53
Network Security Domains
There are 14 network security domains specified by the ISO/IEC.
Network Security Domain Description
Information Security Policies This annex is designed to ensure that security policies are created, reviewed, and
maintained.
Organization of Information Security This is the governance model set out by an organization for information security. It
assigns responsibilities for information security tasks within in organization.
Human Resources Security This addresses security responsibilities relating to employees joining, moving within,
and leaving an organization.
Asset Management This concerns the way that organizations create an inventory of and classification
scheme for information assets.
Access Control This describes the restriction of access rights to networks, systems, applications,
functions, and data.
Cryptography This concerns data encryption and the management of sensitive information to protect
confidentiality, integrity, and availability of data.
Physical and Environmental Security This describes the protection of the physical computer facilities and equipment within
an organization.
Operations Security This describes the management of technical security controls in systems and networks
including malware defenses, data backup, logging and monitoring, vulnerability
management, and audit considerations. This domain is also concerned with the integrity
© 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 54
of software that is used in business operations.
Network Security Policies
Network Security Domains (Cont.)
Network Security Domain Description
Communications Security This concerns the security of data as it is communicated on networks,
both within an organization or between and organization and third
parties such as customers or suppliers.
System Acquisition, Development, and Maintenance This ensures that information security remains a central concern in an
organization’s processes across the entire lifecycle, in both private and
public networks.
Supplier Relationships This concerns the specification of contractual agreements that protect
an organization’s information and technology assets that are accessible
by third parties that provide supplies and services to the organization.
Information Security Incident Management This describes how to anticipate and respond to information security
breaches.
Business Continuity Management This describes the protection, maintenance, and recovery of business-
critical processes and systems.
Compliance This describes the process of ensuring conformance with information
security policies, standards, and regulations.
© 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 55
Network Security Policies
Security Policy
Security policies are used to inform users, staff, and managers of an organization’s requirements for
protecting technology and information assets. A security policy also specifies the mechanisms that are
needed to meet security requirements and provides a baseline from which to acquire, configure, and audit
computer systems and networks for compliance. Policies that may be included in a security policy are:
Policy Description
Identification and authentication policy Specifies authorized persons that can have access to network
resources and identity verification procedures.
Password policies Ensures passwords meet minimum requirements and are changed
regularly.
Acceptable Use Policy (AUP) Identifies network applications and uses that are acceptable to the
organization. It may also identify ramifications if this policy is violated.
Remote access policy Identifies how remote users can access a network and what is
accessible via remote connectivity.
Network maintenance policy Specifies network device operating systems and end user application
update procedures.
Incident handling procedures Describes how security incidents are handled.
© 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 57
Network Security Policies
BYOD Policies
Many organizations must now also support Bring Your Own Device (BYOD). This enables employees to use
their own mobile devices to access company systems, software, networks, or information. This can bring an
increased information security risk because BYOD can lead to data breaches and greater liability for the
organization. BYOD security best practices to help mitigate BYOD vulnerabilities are:
© 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 58
Security Tools, Platforms, and Services
The Security Onion and The Security Artichoke
© 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 61
Security Tools, Platforms, and Services
Data Security Platforms
Data Security Platforms (DSP) are an integrated security solution that combines traditionally
independent tools into a suite of tools that are made to work together. Security tools that protect and
monitor networks are often made by different vendors. It can be difficult to integrate these tools in
such a way that a single view of network security can be achieved.
© 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 65
Security Tools, Platforms, and Services
© 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 66
Security Tools, Platforms, and Services
Security Services
Threat intelligence and security services allow the
exchange of threat information such as vulnerabilities,
indicators of compromise (IOC), and mitigation techniques.
As threats emerge, threat intelligence services create and
distribute firewall rules and IOCs to the devices that have
subscribed to the service.
Antivirus software helps prevent hosts from getting infected and spreading malicious code.
Several companies that create antivirus software, such as Symantec, McAfee, and Trend
Micro. Antivirus products have update automation options so that new virus definitions and new
software updates can be downloaded automatically or on demand. This practice is the most
critical requirement for keeping a network free of viruses and should be formalized in a network
security policy.
These products are installed on computers and servers to detect and eliminate viruses.
However, they do not prevent viruses from entering the network. Another way to mitigate
malware threats is to prevent malware files from entering the network at all. Security devices at
the network perimeter can identify known malware files based on their indictors of compromise.
The files can be removed from the incoming data stream before they can cause an incident.
© 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 69
Mitigating Common Network Attacks
Mitigating Worms
Worms are more network-based than viruses. Worm mitigation requires diligence and
coordination on the part of network security professionals. The response to a worm attack can
be broken down into four phases: containment, inoculation, quarantine, and treatment.
Phase Response
1. Containment The containment phase involves limiting the spread of a worm infection to areas of the network that are already
affected. This requires compartmentalization and segmentation of the network to slow down or stop the worm
and to prevent currently infected hosts from targeting and infecting other systems. Containment requires using
both outgoing and incoming ACLs on routers and firewalls at control points within the network.
2. Inoculation The inoculation phase runs parallel to or subsequent to the containment phase. During the inoculation phase, all
uninfected systems are patched with the appropriate vendor patch. The inoculation process further deprives the
worm of available targets.
3. Quarantine The quarantine phase involves tracking down and identifying infected machines within the contained areas and
disconnecting, blocking, or removing them. This isolates these systems appropriately for the treatment phase.
4. Treatment The treatment phase involves actively disinfecting infected systems. This can involve terminating the worm
process, removing modified files or system settings that the worm introduced, and patching the vulnerability the
worm used to exploit the system. Alternatively, in more severe cases, the system may need to be reinstalled to
ensure that the worm and its by-products are removed.
© 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 70
Mitigating Common Network Attacks
Mitigating Reconnaissance Attacks
Reconnaissance attacks are typically the precursor to other attacks that are designed to gain
unauthorized access to a network or disrupt network functionality. You can detect when a
reconnaissance attack is underway by receiving notifications from preconfigured alarms. These
alarms are triggered when certain parameters are exceeded, such as the number of ICMP requests
per second. Reconnaissance attacks can be mitigated in several ways, including the following:
It is impossible to mitigate port scanning. Using an IPS and firewall can limit the information that can
be discovered with a port scanner. Ping sweeps can be stopped if ICMP echo and echo-reply are
turned off on edge routers; however, when these services are turned off, network diagnostic data is
lost.
© 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 71
Mitigating Common Network Attacks
Mitigating Access Attacks
Several techniques are available for mitigating access attacks, including strong password
security, principle of minimum trust, cryptography, and applying operating system and
application patches. A surprising number of access attacks are carried out through simple
password guessing or brute-force dictionary attacks against passwords. To defend against this,
create and enforce a strong authentication policy which includes:
• Use strong passwords - Strong passwords are at least eight characters and contain
uppercase letters, lowercase letters, numbers, and special characters.
• Disable accounts after a specified number of unsuccessful logins has occurred - This
practice helps to prevent continuous password attempts.
Use encryption for remote access to a network and routing protocol traffic to reduce the
possibility of man-in-the-middle attacks. Educate employees about the risks of social
engineering, and develop strategies to validate identities over the phone, via email, or in
person. Multifactor authentication (MFA) has become increasingly common.
© 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 72
Mitigating Common Network Attacks
Mitigating DoS Attacks
One of the first signs of a DoS attack is a large number of user complaints about
unavailable resources or unusually slow network performance. A network utilization graph
showing unusual activity could indicate a DoS attack. To minimize the number of attacks,
a network utilization software package should be running at all times.
Historically, many DoS attacks were sourced from spoofed addresses. Cisco routers and
switches support many antispoofing technologies, such as port security, Dynamic Host
Configuration Protocol (DHCP) snooping, IP Source Guard, Dynamic Address Resolution
Protocol (ARP) Inspection, and access control lists (ACLs).
© 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 73
Cisco Network Foundation Protection Framework
Securing the Control Plane
Control plane traffic consists of device-generated packets required for the operation of
the network itself. Control plane security can be implemented using the following
features:
• Routing protocol authentication - Routing protocol authentication, or neighbor
authentication, prevents a router from accepting fraudulent routing updates.
• Control Plane Policing (CoPP) - CoPP is a Cisco IOS feature that lets users control
the flow of traffic that is handled by the route processor of a network device.
• AutoSecure - This can lock down the management plane functions and the
forwarding plane services and functions of a router.
CoPP is designed to prevent unnecessary traffic from overwhelming the route processor.
The CoPP feature treats the control plane as a separate entity with its own ingress (input)
and egress (output) ports. A set of rules can be established and associated with the
ingress and egress ports of the control plane.
© 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 75
Cisco Network Foundation Protection Framework
Securing the Management Plane
Management plane traffic is generated either by network devices or network
management stations using processes and protocols such as Telnet, SSH, and TFTP,
etc. The management plane is a very attractive target to hackers.
Cisco Catalyst switches can use integrated features to help secure the Layer 2 infrastructure.
The following Layer 2 security tools are integrated into the Cisco Catalyst switches:
• Port security
• DHCP snooping
• Dynamic ARP Inspection (DAI)
• IP Source Guard
© 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 77