intTypePromotion=1
zunia.vn Tuyển sinh 2024 dành cho Gen-Z zunia.vn zunia.vn
ADSENSE

Lecture CCNA Security - Chapter 1: Modern Network Security Threats

Chia sẻ: You Can | Ngày: | Loại File: PDF | Số trang:75

62
lượt xem
4
download
 
  Download Vui lòng tải xuống để xem tài liệu đầy đủ

Upon completion of this lesson, the successful participant will be able to: Describe the rationale for network security; describe the three principles of network security; identify risks, threats, vulnerabilities and countermeasures; discuss the three states of information and identify threats and appropriate countermeasures for each state;...

Chủ đề:
Lưu

Nội dung Text: Lecture CCNA Security - Chapter 1: Modern Network Security Threats

  1. Chapter 1 – Modern Network Security Threats CCNA Security
  2. Objectives • Học viện công nghệ thông tin Bach Khoa - Website: www.bkacad.com
  3. Fundamental Principles of a Secure network Học viện công nghệ thông tin Bach Khoa - Website: www.bkacad.com
  4. Evolution of Network Security • In July 2001, the Code Red worm attacked web servers globally, infecting over 350,000 hosts. • The Code Red worm caused a Denial of Service (DoS) to millions of users. Học viện công nghệ thông tin Bach Khoa - Website: www.bkacad.com
  5. Evolution of Network Security • When the first viruses were unleashed and the first DoS attack occurred, the world began to change for networking professionals. • To meet the needs of users, network professionals learned techniques to secure networks. • Refer to 1.1.1.2 Học viện công nghệ thông tin Bach Khoa - Website: www.bkacad.com
  6. Evolution of Network Security Year Security Technology 1984 First IDS for ARPAnet (SRI International IDES) Late 1988 DEC Packet Filter Firewall 1989 AT&T Bell Labs Statefull Firewall 1991 DEC SEAL Application Layer Firewal 1994 Check Point Firewall 1995 NetRanger IDS August, 1997 RealSecure IDS 1998 Snort IDS Late 1999 First IPS 2006 Cisco Zone-based Policy Firewal 2010 Cisco Security Intelligence Operations Học viện công nghệ thông tin Bach Khoa - Website: www.bkacad.com
  7. Evolution of Network Security • An IDS provides real-time detection of certain types of attacks while they are in progress • This detection allows network professionals to more quickly mitigate the negative impact of these attacks on network devices and users. • In the late 1990s, the intrusion prevention system or sensor (IPS) began to replace the IDS solution. • IPS devices enable the detection of malicious activity and have the ability to automatically block the attack in real-time. • In addition to IDS and IPS solutions, firewalls were developed to prevent undesirable traffic from entering prescribed areas within a network, thereby providing perimeter security. Học viện công nghệ thông tin Bach Khoa - Website: www.bkacad.com
  8. Evolution of Network Security • Internal threats fall into two categories: spoofing and DoS Học viện công nghệ thông tin Bach Khoa - Website: www.bkacad.com
  9. Evolution of Network Security Evolution of LAN Security Học viện công nghệ thông tin Bach Khoa - Website: www.bkacad.com
  10. Evolution of Network Security • Three components of information: confidentiality, integrity, availability. • Encrypting Data: Encryption provides confidentiality by hiding plaintext data. • Data integrity: data is not changed from source to destination • Availability: Data accessibility, is guaranteed by network hardening mechanisms andHọcbackup systems viện công nghệ thông tin Bach Khoa - Website: www.bkacad.com
  11. Evolution of Network Security Evulution of Data Protection Technologies Year Security Technology 1993 Cisco GRE Tunnels 1996 Site-to-Site IPSec VPNs 1999 SSH 2000 MPLS VPNs 2001 Remote-access IPSec VPN 2002 Dynamic Multipoint VPN 2005 SSL VPN 2010 Group Encrypted Transport VPN (GET VPN) Học viện công nghệ thông tin Bach Khoa - Website: www.bkacad.com
  12. Drivers for Network Security • The word hackers has a variety of meanings. • For many, it means Internet programmers who try to gain unauthorized access to devices on the Internet. • It is also used to refer to individuals that run programs to prevent or slow network access to a large number of users, or corrupt or wipe out data on servers. • But for some, the term hacker has a positive interpretation as a network professional that uses sophisticated Internet programming skills to ensure that networks are not vulnerable to attack. Good or bad, hacking is a driving force in network security. Học viện công nghệ thông tin Bach Khoa - Website: www.bkacad.com
  13. Drivers for Network Security Refer to 1.1.2.2 • Hacking started in the 1960s with phone freaking, or phreaking, which refers to using various audio frequencies to manipulate phone systems. • Wardialing programs automatically scanned telephone numbers within a local area, dialing each one in search of computers, bulletin board systems, and fax machines • When a phone number was found, password-cracking programs were used to gain access. • Wardriving, users gain unauthorized access to networks via wireless access points. • A number of other threats have evolved since the 1960s, including network scanning tools such as Nmap and SATAN, as well as remote system administration hacking tools such as Back Orifice. Học viện công nghệ thông tin Bach Khoa - Website: www.bkacad.com
  14. Drivers for Network Security • What is the job of a network security professional ? 1. To stay one step ahead of the hackers by • attending training and workshops, 2.• Have access toinstate-of-the participating art security tools, security organizations, protocols, techniques, and technologies. • subscribing to real-time feeds regarding threats, • 3. and Always remain perusing aware of security malicious websites on aactivities daily and have the skills and tools to minimize or eliminate basis. the threats associated with those activities. Học viện công nghệ thông tin Bach Khoa - Website: www.bkacad.com
  15. Drivers for Network Security This virus resulted in memory overflows in Internet mail servers. Học viện công nghệ thông tin Bach Khoa - Website: www.bkacad.com
  16. Drivers for Network Security Robert Morris created the first Internet worm with 99 lines of code. Học viện công nghệ thông tin Bach Khoa - Website: www.bkacad.com
  17. Drivers for Network Security Học viện công nghệ thông tin Bach Khoa - Website: www.bkacad.com
  18. Drivers for Network Security Học viện công nghệ thông tin Bach Khoa - Website: www.bkacad.com
  19. Drivers for Network Security Học viện công nghệ thông tin Bach Khoa - Website: www.bkacad.com
  20. Network Security Organizations • SysAdmin, Audit, Network, Security (SANS) Institute • Computer Emergency Response Team (CERT) • International Information Systems Security Certification Consortium (pronounce (ISC)2 as "I-S-C-squared") Network security professionals must collaborate with professional colleagues more frequently than most other professions. Học viện công nghệ thông tin Bach Khoa - Website: www.bkacad.com
ADSENSE

CÓ THỂ BẠN MUỐN DOWNLOAD

 

Đồng bộ tài khoản
2=>2