Lecture 1 Objectives - PowerPoint PPT Presentation

1 / 25
About This Presentation
Title:

Lecture 1 Objectives

Description:

Lecture 1 - Cisco AVVID (Architecture for Voice, Video and Integrated Data) ... Host and application-based security elements. Lecture 1 - Summary ... – PowerPoint PPT presentation

Number of Views:41
Avg rating:3.0/5.0
Slides: 26
Provided by: aspy
Category:

less

Transcript and Presenter's Notes

Title: Lecture 1 Objectives


1
Lecture 1
2
Lecture 1 Objectives
  • Identify the primary threats of Network Security
  • Define the types of Network Attacks
  • Identify the Cisco Security Wheel
  • Define Cisco AVVID
  • Describe Cisco SAFE

3
Network Security Overview
  • Lecture 1

4
Lecture 1 - Network Security Overview
  • Network Security Primary Threats
  • Unstructured Threats
  • Structured Threats
  • External Threats
  • Internal Threats

5
Lecture 1 - Network Security Overview
  • Unstructured Threats
  • Inexperienced individuals using readily available
    tools from the internet
  • Some motivated by malicious intent
  • Some motivated by gaining intellectual challenge
    i.e.. Script Kiddies
  • Not very knowledgeable, but highly motivated

6
Lecture 1 - Network Security Overview
  • Structured Threats
  • Individuals are more highly motivated
  • Technically competent
  • Have understanding of network design and
    vulnerabilities
  • Have ability to write hacking scripts to
    penetrate systems

7
Lecture 1 - Network Security Overview
  • External Threats
  • Individuals or organizations outside company
    without authorized access
  • Work way into company network through internet or
    dial-up access

8
Lecture 1 - Network Security Overview
  • Internal Threats
  • An individual with authorized access to company
    network
  • Typically disgruntled employee, current employee
    or contractor

9
Lecture 1 - Network Security Overview
  • Types of Network Attacks
  • Reconnaissance
  • Access Attacks
  • DoS (Denial of Service) Attacks

10
Lecture 1 - Network Security Overview
  • Reconnaissance Attacks
  • Unauthorized mapping of network systems, design,
    services and vulnerabilities( information
    gathering)
  • Use ping-sweeps to discover what systems are
    alive, port scans on alive systems to find
    vulnerable holes, fingering systems to discover
    OS type, network sniffers to discover services
    and types of traffic
  • Think of a thief scoping out a neighborhood, and
    even trying to open doors for later use of this
    knowledge

11
Lecture 1 - Network Security Overview
  • Access Attacks
  • Unauthorized Data Retrieval - reading, writing,
    copying, or moving files that are not intended to
    be accessible to the intruder
  • System Access - intruders ability to gain access
    to a machine that one doesnt have authorized
    access to
  • Privilege Escalation legit users, have a lower
    level of access privileges, intent is to get
    information or execute procedures that are
    unauthorized at the users current level of
    access
  • In some cases users only want to gain access, not
    necessarily steal information

12
Lecture 1 - Network Security Overview
  • DoS Attack
  • Disabling services or networks with intent to
    deny service to legitimate users
  • Typically crashing systems or slowing them down,
    could be wiping out information needed for
    business use
  • Most feared of all attacks i.e. SYN-Flood
    attacks, Smurf Attacks, TearDrop Attacks, Ping Of
    Death

13
Lecture 1 - Cisco Security Wheel
14
Lecture 1 - Cisco Security Wheel (cont)
  • Create a security policy to act as hub of
    security wheel
  • Policy should include
  • The organizations security objective
  • Resources to be protected
  • The network infrastructure with current maps and
    inventories

15
Lecture 1 - Cisco Security Wheel (cont)
  • 4 Steps to continuous Security
  • Step 1 - Secure the system
  • Step 2 - Monitor the network
  • Step 3 - Test security safeguards put in place
  • Step 4 - Improve overall security

16
Lecture 1 - Cisco Security Wheel (cont)
  • Step 1 Secure the System
  • Implement security devices such as firewalls,
    authentication systems, encryption, etc
  • Prevent unauthorized access to organizations
    network
  • Cisco PIX Security Appliance

17
Lecture 1 - Cisco Security Wheel (cont)
  • Step 2 Monitor the network
  • Monitoring violations and attacks against
    organizations security policy
  • Can occur from inside network or outside
    organization
  • Use real-time monitoring devices i.e. Cisco IDS
  • Helps in discovering attacks and violations
  • Checks and balance for step 1

18
Lecture 1 - Cisco Security Wheel (cont)
  • Step 3 Test Security safeguards
  • Cisco Secure Scanner to identify the networks
    security posture with respect to the security
    procedures that form the hub of the Security Wheel

19
Lecture 1 - Cisco Security Wheel (cont)
  • Step 4 - Improve corporate security
  • Analyzing the data collected during the
    monitoring and testing phases and developing and
    implementing improvement mechanisms that feed
    into your security policy and the securing phase
    in Step 1

20
Lecture 1 - Cisco AVVID (Architecture for Voice,
Video and Integrated Data)
  • IntegrationBy leveraging the Cisco AVVID
    architecture and applying the network
    intelligence that is inherent in IP, companies
    can develop comprehensive tools to improve
    productivity
  • IntelligenceTraffic prioritization and
    intelligent networking services maximize network
    efficiency for optimized application performance
  • InnovationCustomers can adapt quickly in a
    changing business environment
  • InteroperabilityStandards-based application
    programming interfaces (APIs) enable open
    integration with third-party developers,
    providing customers with choice and flexibility

21
Lecture 1 - Cisco AVVID
22
Lecture 1 - Cisco SAFE
  • Flexible, dynamic blueprint for security and VPN
    networks, based on Cisco AVVID
  • Enables businesses to securely and successfully
    take advantage of e-business and compete in the
    Internet era
  • Why use it?
  • Provides the foundation for migrating to secure,
    affordable, converged networks
  • Lets companies cost-effectively deploy a modular,
    scalable security framework in stages
  • Delivers integrated network protection via
    high-level security products and services
  • First blueprint to say what solutions should be
    used at which parts of the network
  • Open to third party vendors to create security
    solutions

23
Lecture 1 - Cisco SAFE
  • SAFE Layers
  • Infrastructure layer
  • routers, switches, firewalls, IDSs, and other
    devices
  • Appliances layer
  • Incorporates key security functionality in
    mobile handheld devices and remote PC clients
  • Service control layer
  • Critical security protocols and APIs
  • Applications layer
  • Host and application-based security elements

24
Lecture 1 - Summary
  • Identify the primary threats of Network Security
  • Define the types of Network Attacks
  • Identify the Cisco Security Wheel
  • Define Cisco AVVID
  • Describe Cisco SAFE

25
Lecture 1 - Labs
  • Lab 1a Basic Host to Site VPN using PPTP
  • Lab1b Basic Host to Site VPN using L2TP
Write a Comment
User Comments (0)
About PowerShow.com