Network
Network
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 2
Upon completion of this section, you should be able to:
• Describe the current network security landscape.
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 3
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 4
Networks are routinely under attack .
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 5
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 6
Common network security terms:
• Threat : potential for vulnerabilities to turn into network attack
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 7
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 8
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 9
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 10
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 11
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 12
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 13
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 14
An attack vector is a path or other
means by which an attacker can gain
access to a server
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 15
Data is likely to be an organization’s most valuable asset. Data
like research and development data, sales data, financial data,
legal data...etc
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 16
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 17
All networks are targets.
Connections to untrusted
networks must be checked
in-depth by multiple layers of
defense before reaching
enterprise resources.
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 18
It is important that all types of networks, regardless of size, are protected.
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 19
Organizations must
ensure secure
transport for the data
in motion as it travels
between sites.
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 20
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 21
Data center networks are typically housed in an off-site facility to store sensitive or proprietary
data. These sites are interconnected to corporate sites using VPN technology with ASA devices
and integrated data center switches.
Today’s data centers store vast quantities of sensitive, business-critical information; therefore,
physical security is critical to its operation.
Data center physical security can be divided into two areas:
• Security traps
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 22
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 23
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 24
Virtualization is the foundation of Cloud computing. Without it, Cloud computing, as it is most-widely
implemented, would not be possible.
Cloud computing separates the application from the hardware. Virtualization separates the OS from the
hardware.
Cloud computing allows organizations to use services such as data storage or Cloud-based applications,
to extend their capacity or capabilities without adding infrastructure.
The actual Cloud network consists of physical and virtual servers which are commonly housed in data
centers.
In the past, employees and data resources remained within a predefined perimeter that was
protected by firewall BUT today we have a BYOD so Cisco developed the Borderless Network.
Critical MDM ( mobile device management) functions for BYOD network:
• Data encryption
Components of a secure data center:
• Secure segmentation
• PIN enforcement (PIN lock)
• Threat defense
• Data wipe (data clearing remotely by MDM)
• Visibility VM-specific threats:
• Data loss prevention
• Hyperjacking
• Jailbreak/root detection
• Instant On activation
MDM features secure, monitor, and manage mobile devices, including
corporate-owned devices and employee-owned devices. • Antivirus storm
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 25
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 26
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 27
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 28
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 29
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 30
Upon completion of the section, you should be able to:
• Describe the evolution of network security.
• Describe malware.
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 31
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 32
The term “hacker” has a variety of
meanings:
- A clever programmer .
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 33
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 34
White Hat :
• A white-hat hacker who finds a security vulnerability would disclose it to the developer, allowing them to patch
their product and improve its security before it’s compromised. Various organizations pay “bounties” or award
prizes for revealing.
• They’re the “ethical hackers,” experts in compromising computer security systems who use their abilities for
good, ethical, and legal purposes rather than bad, unethical, and criminal purposes.
Black Hat:
• A black-hat hacker who finds a new zero day “ security vulnerability” would sell it to criminal organizations on
the black market or use it to compromise computer systems.
• They violate computer security for personal gain (such as stealing credit card numbers or harvesting personal
data for sale to identity thieves) or for pure maliciousness (such as creating a botnet and using that botnet to
perform DDOS attacks against websites they don’t like.)
Grey Hat:
• Grey hat hackers are a blend of both black hat and white hat activities. Often, grey hat hackers will look
for vulnerabilities in a system without the owner’s permission or knowledge. If issues are found, they will
report them to the owner, sometimes requesting a small fee to fix the issue. If the owner does not respond or
comply, then sometimes the hackers will post the newly found exploit online for the world to see.
• These types of hackers are not inherently malicious with their intentions; they’re just looking to get something
out of their discoveries for themselves.
• This type of hacking is still considered illegal because the hacker did not receive permission from the owner
prior to attempting to attack the system.
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 35
• Hacking started in the 1960s with phone freaking, or phreaking, which refers to using various
audio frequencies to manipulate phone systems.
• In the mid-1980s, computer dial-up modems were used to connect computers to networks.
Hackers wrote “war dialing” programs which dialed each telephone number in a given area in
search of computers then password-cracking programs were used to gain access.
• Vulnerability Brokers
• Hacktivists: a person who breaks into a computer system in order to pursue a political or
social aim.One of hacktivist groups is Wikileaks . It is a hack for attention.
• Cyber Criminals : They are black hat hackers with the motive to make money using any
means necessary. They operate in an underground economy where they buy, sell, and trade
attack toolkits, zero day exploit code, botnet services, banking Trojans, keyloggers, and much
more.
• State-Sponsored Hackers : They are the newest type of hacker. These are government-
funded and guided attackers, ordered to launch operations that vary from cyber espionage to
intellectual property theft. Many countries sponsor these hackers but very few will publically
admit they exist.
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 36
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 37
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 38
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 39
Ethical hacking involves many different types of tools to test and keep the network and its data
secure.
To validate the security of a network and its systems, many network penetration testing tools have
been developed. However, many of these tools can also be used by black hat hackers for
exploitation.
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 40
Network hacking attacks:
• Eavesdropping : This is when a hacker captures and “listens” to network traffic. This attack is
also referred to as sniffing or snooping.
• Data modification
• IP address spoofing
• Password-based
• Denial-of-service
• Man-in-the-middle
• Compromised-key (If a hacker obtains a secret key, that key is referred to as a compromised
key. A compromised key can be used to gain access to a secured communication without the
sender or receiver being aware of the attack.)
• Sniffer : A sniffer is an application or device that can read, monitor, and capture network data
exchanges and read network packets.
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 41
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 42
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 43
A virus is malicious code that is attached to executable files which are often legitimate
programs.
It require end user activation and can lay dormant for an extended period and then
activate at a specific time or date.
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 44
Trojan horse is malware that carries out malicious operations under the guise of a
desired function. A Trojan horse comes with malicious code hidden inside of it.
Unlike a computer virus, a Trojan horse is not able to replicate itself, nor can it
propagate without an end user's assistance.
• Remote-access
Proxy : use the victim's computer as the source device
• Data-sending: providing with with sensitive to launch attacks and perform other illegal activities.
data FTP : enables unauthorized file transfer services
on end devices.
• Destructive: This corrupts or deletes files. DoS : slows or halts network activity.
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 45
Worms replicate themselves by independently exploiting vulnerabilities in networks.
Worms usually slow down networks.
Whereas a virus requires a host program to run, worms can run by themselves.
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 46
Most worm attacks consist of three 1.
components: Propagate
for 19 days
• Enabling vulnerability
• Payload
3.
Stop and go
Any malicious code that results in some action is a dormant for
payload. Most often this is used to create a backdoor to a few days
the infected host or create a DoS attack.
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 47
Ransomware It is a
type of malicious software
designed to block access to a
computer system until a sum of
money is paid.
Spyware It is used to
gather information about a user
and send the information to
another entity, without the user’s
consent. Scareware It is a malicious computer programs designed to
trick a user into buying and downloading unnecessary and potentially
Adware This malware dangerous software, such as fake antivirus protection.
typically displays annoying pop-ups
to generate revenue for its author. Phishing is the attempt to obtain sensitive information such
as usernames, passwords, and credit card details (and sometimes,
indirectly, money), often for malicious reasons, by masquerading as a
trustworthy entity in an electronic communication.
Data
Syn Flood Modification
Smurf
Attack
Reconnaissance
Access
DoS
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 50
Reconnaissance is known as information gathering.
Hackers use reconnaissance (or recon) attacks to do unauthorized discovery and
mapping of systems, services, or vulnerabilities.
• Vulnerability scanners
• Exploitation tools
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 51
Access attacks exploit known vulnerabilities in authentication services, FTP
services, and web services to gain entry to web accounts, confidential
databases, and other sensitive information.
A few reasons why hackers use access attacks:
• To retrieve data
• To gain access
• Trust exploitation
• Port redirection
• Man-in-the-middle
• Buffer overflow
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 52
Two major sources of DOS attacks:
Types of DOS:
ping of death
smurf attack
TCP SYN flood
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 53
A Denial of Service (DoS) attack is different from a DDoS attack. The DoS attack
typically uses one computer and one Internet connection to flood a targeted system or
resource. The DDoS attack uses multiple computers and Internet connections to flood
the targeted resource.
a DDoS attack could proceed as follows:
1. Hacker builds a network of infected machines
• A network of infected hosts is called a botnet.
• The compromised computers are called zombies.
• Zombies are controlled by handler systems.
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 54
Upon completion of this section, you should be able to::
• Describe methods and resources to protect the networks.
• Explain how to secure the three functional areas of Cisco routers and switches.
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 55
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 56
Network Security Professionals are responsible for maintaining data assurance for an
organization and ensuring the integrity and confidentiality of information
Regardless of job titles, network security professionals must always stay one step ahead
of the hackers:
•They must constantly upgrade their skill set to keep abreast of the latest threats.
•They must attend training and workshops.
•They must subscribe to real-time feeds regarding threats.
•They must peruse security websites on a daily basis.
•They must maintain familiarity with network security organizations.
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 57
Network security professionals must collaborate with professional colleagues frequently.
This includes attending workshops and conferences that are often affiliated with,
sponsored by, or organized by, local, national, or international technology organizations.
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 58
In addition to preventing and denying malicious traffic, network security professionals
must also ensure that data is protected.
Cryptography, the study and practice of hiding information, is used extensively in
modern network security.
Cryptography ensures three components of information security:
Confidentiality:
Uses encryption
to encrypt and
hide data.
Components
of
Cryptography
Availability:
Integrity:
Assures data is
accessible. Uses hashing
algorithms to
Guaranteed by
ensure data is
network hardening
unaltered during
mechanisms and
operation.
backup systems.
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 59
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 60
Network professional must understand network security and also be familiar with the
organizations dedicated to network security, as well as the 12 network security
domains.
• Domains provide a framework for discussing network security.
• There are 12 network security domains specified by ISO/IEC27002:
• Risk assessment
• Security policy
• Asset management
• Access control
• Compliance
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 61
Security Policy screenshot
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 62
• Security policy is a set of objectives
for the company, rules of behavior for
the users and administrators and
requirements for system and
management that collectively ensure
the security
• The network security policy outlines rules
for network access, determines how
policies are enforced, and describes the
basic architecture of the organization’s
network security environment.
• The network security policy outlines what
assets should be protected and gives
guidance on how they should be
protected. This will then be used to
determine the security devices and
mitigation strategies and procedures that
should be implemented on the network.
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 63
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 64
In the analogy, a hacker would have to peel away at a network’s defense mechanisms
in a similar manner to peeling an onion. “Security Onion.”
The Borderless network has changed this analogy to the “Security Artichoke.” In this
analogy, hackers no longer have to peel away each layer. They only need to remove
certain ‘artichoke leafs’.
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 65
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 66
It is a new context-aware security
architecture that enforces security
The Cisco SecureX Architecture™ is a next- policies across the entire
generation security framework that brings distributed network, not just at a
together flexible solutions, products, and services single point in the data stream.
to address and enforce consistent business policy It's an access control strategy.
throughout the distributed network.
It is a context-aware, network-centric
approach to security that enables: Server Edge
• Greater alignment of security policies with and Branch
business needs
• Integrated global intelligence
• Simplified security delivery Secure Data
Secure Email
• Consistent security Center and
Virtualization
and Web
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 67
Cisco SecureX Architecture includes the following five major components :
• Scanning engines( can be firewall/IPS , proxy)
• Next-generation endpoint
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 68
Cisco Security Intelligence Operations (SIO) is an advanced security infrastructure that provides threat
identification, analysis, and mitigation to continuously provide the highest level of security for Cisco customers.
The SIO is a Cloud-based service that connects global threat information, reputation-based services, and
sophisticated analysis, to Cisco network security devices.
It is the world’s largest Cloud-based security ecosystem, using almost a million live data feeds from
deployed Cisco ESA, WSA, ASA, and IPS solutions.
The researchers, analysts, and developers at SIO then weigh and process the data, automatically categorizing
threats and creating rules using more than 200 parameters. Rules are dynamically delivered to deployed Cisco
SecureX IPS, ESA, WSA, and ASA security devices every three to five minutes.
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 69
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 70
Best practices:
• Develop a written security policy.
• Educate employees about the risks of social engineering, and develop strategies to
validate identities over the phone, via email, or in person.
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 71
Thank you.
• Remember, there are
helpful tutorials and user
guides available via your
NetSpace home page. 1
(https://www.netacad.com) 2
• These resources cover a
variety of topics including
navigation, assessments,
and assignments.
• A screenshot has been
provided here highlighting
the tutorials related to
activating exams, managing
assessments, and creating
quizzes.
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 73