CCNP Security CH1
CCNP Security CH1
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 2
Why do we need Security?
• Security is important
• Lack of Security will risks financial, legal, political and public
relations implications.
• Using software to block malicious programs from entering, or
running within, the network.
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 3
Security Terminology
• ASSET
Anything that is valuable to organization. (that is to be protected)
Can include Property, people and information/data that have value to the
company.
• VULNERABILITY
Weakness which allows attacker to reduce the Security assurance.
Vulnerability can be found in
- Protocols
- Operation Systems
- Application
-System Design
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 4
Security Terminology
• THREAT
Event which cause damage to system, exploiting a vulnerability.
Physical ( Fire,Water,Earthquake )
Malicious codes ( Virus, Worm, Trojan )
Phishing & social Engineering
• RISK
The Probability of a threat or event to happen.
Potential to unauthorized access to asset
Potential to compromise of asset
• MITIGATION or COUNTERMEASURE
Reducing or eliminating the vulnerability or potential Risk.
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 5
Types of Threats
• Physical Threats
Hardware Threats
Physical damage to Server, Routers, Switches, cabling plant, and
workstations.
Electrical Threats
Voltage spikes
Insufficient supply voltage
Unconditioned power
Temperature extremes (too hot or too cold)
Humidity extremes (too wet or too dry)
Maintenance Threats
Poor handling of key electrical components (electrostatic discharge)
Lack of essential spare parts
Poor cabling and labeling
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 6
Types of Threats
• Internal Threats
Users know already have physical access & knowledge of internal network.
Users physically steals or damage data.
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 7
Types of Threats
• External Threats
Caused by from individuals working outside of a company. (Hackers)
Do not have authorized access to the computer systems or network.
They break into an organization’s network mainly from the Internet.
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 8
External Threat and Internal Threat
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 9
Common Security Threats in Offices
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 10
Data Loss
Vectors of data loss:
• Email/Webmail
• Unencrypted Devices
• Removable Media
• Hard Copy
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 11
Attack Mitigation & Implementation
• Attack Mitigation
Attack mitigation is the process of preventing or responding to Threat.
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 12
Attack & Hacker Tools
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 13
Categories of Attack
Network hacking attacks:
• Eavesdropping
• Spoofing Attacks
• Password-based
• Phishing Attack
• Man-in-the-middle (MiTM)
• Compromised-key
• Reconnaissance Attacks
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 14
Social Engineering Attack
• Manipulation of people into performing actions or divulging
confidential information.
• Tricking people into breaking normal security procedures.
(information gathering, fraud, or system access)
Shoulder watching Attacker watches as
your type credentials (PIN or Password)
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 15
Phishing Attack
• Attacks against the human, making them to leak information
• Email Phishing
• Pharming ( Based on DNS )
• Phone calls ( Vishing )
• SMS messages ( Smishing )
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 16
Social Engineering & Phishing Mitigation
• Provide awareness to users through training, policies & live
simulations.
Be suspicious of unsolicited phone calls, visits, or email messages from
individuals asking about employees or other internal information
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 17
Social Engineering & Phishing Mitigation
Install and maintain anti-virus software, firewall, and email filters to
reduce these types of emails.
Web & Email Security Solutions ( Cisco WSA & ESA )
Endpoint security to restrict to restrict user access.
( Antivirus programs )
Network level security to restrict user access
( Firewalls, IPS )
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 18
Denial of Service ( DoS ) Attack
• Prevents users from accessing targeted computer systems, devices or other
network resources.
• Flood servers, systems or networks with traffic in order to overload the victim
resources and make it difficult or impossible for legitimate users to use them.
• Generally sourced from a single system.
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 19
DOS Attack - Ping of Death
• A ping packet can have up to 65536 bytes.
• An ICMP echo request with more than 65507 (65535-20-8) bytes
of data could cause a remote system to crash while reassembling
the packet fragments.
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 20
DOS Attack - TCP Syn Flood
• The connection establishment is successfully completed when the
3-way handshake method is performed.
• An attacker could flood the server with TCP SYN segments
without acknowledging back the server's SYN response.
• The server's session table is filled up with ongoing Session
requests, utilizing resources.
• Valid users unable to accept legitimate connection requests until
its TCP inactivity timer is reached where it would start dropping
incomplete sessions.
• Usually originated by a spoofed source IP address making it
harder to track down the attacker.
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 21
DOS Attack - TCP Syn Flood
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 22
Attack Tools
Penetration tools:
• Password crackers • Forensic
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 23
Malware
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 24
Various Types of Malware
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 25
Other Malware
Ransomware Scareware
Spyware Phishing
Adware Rootkits
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 26
Reconnaissance Attacks
• Initial query of a target
• Vulnerability scanners
• Exploitation tools
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 27
Defending the Network
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 28
Confidentiality, Integrity, Availability
Availability:
Assures data is
accessible. Guaranteed
by network hardening
mechanisms and
backup systems.
Components Confidentiality:
Uses encryption
of to encrypt and
Cryptography hide data.
Integrity:
Uses hashing
algorithms to ensure
data is unaltered
during operation.
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 29
Cisco Network Foundation Protection Framework
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 30
NFP Framework
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 31
Securing the Control Plane
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 32
Securing the Management Plane
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 33
Securing the Data Plane
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 34
Thank you.