CCNA Security: Chapter Nine Managing A Secure Network
CCNA Security: Chapter Nine Managing A Secure Network
CCNA Security: Chapter Nine Managing A Secure Network
Chapter Nine
Managing a Secure Network
• Business needs: What does the organization want to do with the network?
What are the needs of the organization?
• Threat identification: What threats are most likely to occur, given the
organization’s purpose and systems?
• Risk analysis: What is the cost versus benefit analysis of mitigating,
transferring and accepting various security risk?
• Security needs: What are the policies, procedures, standards, and
guidelines needed to address business needs and risks?
• Industry-recommended practices: What are the security practices that
similar organizes currently employ?
• Security operations: What are the current procedures for system
hardening, incident response, monitoring, maintenance, and auditing of the
system for compliance?
Deny
All
Internet Inside
Efficient security
management, control, and Operational Control
response and Policy Management
Advanced technologies
and security services that:
Mitigate the effects of Threat Control and Secure
outbreaks Containment Communications
Protect critical assets
Ensure privacy
Integrate AdvancedSecurity
Security Point IPsec
Services Where and SSL
Needed
IPS
Products VPN
Firewall Access Control Network Antivirus
Integrated Collaborative Adaptive
MARS
ACS
VPN
Remote Worker
Intern Firewall
et
VPN
IPS
WAN
Iron Port
VPN CSA
Remote Branch
LAN
Web Email
Server Server DNS
• Separation of duties:
two-man control and dual
operator
• Rotation of duties
• Trusted recovery:
failure preparation and
system recovery
• Change and configuration
controls
Technical support
Week 1
Week 2
Data Center Support
Week 3
Data Entry
Practices:
• A junior staff member is responsible for loading
blank media.
• Backup software uses an account that is
unknown to individuals to bypass file security.
• A different staff member removes the backup
media and securely stores it on site while being
assisted by another member of the staff.
• A separate copy of the backup is stored off site Backup 3 Backup 2
and is handled by a third staff member who is
accompanied by another staff member.
Backup 1
Objectives of ST&E:
Uncover design, implementation,
and operational flaws that
could lead to the violation of the
security policy.
• Network scanning
• Vulnerability scanning
• Password cracking
• Log review
• Integrity checkers
• Virus detection
• War dialing
• War driving (802.11 or wireless LAN testing)
• Penetration testing
Basic functionality
• Classic TCP and UDP port
scanning
• Classic TCP and UDP port
sweeping
• Stealth TCP and UDP port
scans and sweeps
• Remote operating system
identification, known as
OS fingerprinting.
• Identify types of
disasters or
disruptions possible
• Take into account the
magnitude of the
disruption
• Redundancy
- Replacement components
owned by the organization
or a server provider
- Service level agreement
(SLA)
• Redundant facility
- Hot Site
- Warm Site
- Cold Site
Initiation
Operations and
Maintenance Implementation
Initiation
Configuration management and control: ensures that there is
adequate consideration of the potential security impacts due to
specific changes to an information system or its surrounding
environment.
Disposition Acquisition and
Continuous monitoring: ensures that controls continue to be
Development
effective in their application through periodic testing and evaluation.
Operations and
Maintenance Implementation
Initiation
• Demonstrates an organization’s
commitment to security.
• Sets the rules for expected
behavior.
• Ensures consistency in system
operations, software and
hardware acquisition and use,
and maintenance.
• Defines the legal consequences
of violations.
• Gives security staff the backing
of management.
Governing Policy
Technical End-User
Policies Policies
Important components:
• A statement of the issue that the
policy addresses.
• How the policy applies in the
environment.
• The roles and responsibilities of
those affected by the policy.
• The actions, activities, and
processes that are allowed and
those that are not.
• The consequences of
noncompliance.
• General policies
• E-mail policies
• Remote -access policies
• Telephony policy
• Application policies
• Network policies
• Wireless communication policy
From: IT department
To: all Employees
Subject: Course Offerings
We are currently offering several training opportunities. Please see
the list below and contact your manager if interested.
• Types of Laws
- Criminal
- Civil
- Administrative
• Ethics
- Computer Ethics Institute
- Internet Activities Board (IAB)
- Generally Accepted System Security Principles (GASSP)
- International Information Systems Security Certification
Consortium, Inc (ISC)2 Code of Ethics