networks and protocols ce00997-3 week 10b. overview of network security

67
Networks and Protocols CE00997-3 Week 10b

Post on 19-Dec-2015

216 views

Category:

Documents


1 download

TRANSCRIPT

Page 1: Networks and Protocols CE00997-3 Week 10b. Overview of Network Security

Networks and Protocols CE00997-3

Week 10b

Page 2: Networks and Protocols CE00997-3 Week 10b. Overview of Network Security

Overview of Network Security

Page 3: Networks and Protocols CE00997-3 Week 10b. Overview of Network Security

Key Terms• Confidentiality• Integrity• Availability• Vulnerability• Threat• Reconnaissance• Access• Denial of Service• Encryption• Security Wheel

Page 4: Networks and Protocols CE00997-3 Week 10b. Overview of Network Security

The Closed Network

Page 5: Networks and Protocols CE00997-3 Week 10b. Overview of Network Security

The Network Today

Page 6: Networks and Protocols CE00997-3 Week 10b. Overview of Network Security

Trends that Affect Security

• Increase of network attacks• Increased sophistication of attacks• Increased dependence on the network• Lack of trained personnel• Lack of awareness• Lack of security policies• Wireless access• Legislation• Litigation

Page 7: Networks and Protocols CE00997-3 Week 10b. Overview of Network Security

Legal and Governmental Policy Issues

– Organizations that operate vulnerable networks will face increasing and substantial liability.

– US Federal legislation mandating security includes the following:

• GLB financial services legislation

• Government Information Security Reform Act

• HIPAA• CIPA

Page 8: Networks and Protocols CE00997-3 Week 10b. Overview of Network Security

The Goals of Network Security

• Availability• Confidentiality• Integrity

Page 9: Networks and Protocols CE00997-3 Week 10b. Overview of Network Security

Key Elements of Network Security

Page 10: Networks and Protocols CE00997-3 Week 10b. Overview of Network Security

Network Vulnerabilities, Threats, and Attacks

• Technology• Configuration• Policy

Page 11: Networks and Protocols CE00997-3 Week 10b. Overview of Network Security

Threat Capabilities—More Dangerous and Easier to Use

Page 12: Networks and Protocols CE00997-3 Week 10b. Overview of Network Security

Network Threats

• There are four general categories of security threats to the network:– Unstructured threats– Structured threats– External threats– Internal threats

InternetExternal

exploitation

Externalexploitation

Internalexploitation

Internalexploitation

Dial-inexploitation

Dial-inexploitation

Compromised host

Page 13: Networks and Protocols CE00997-3 Week 10b. Overview of Network Security

Four Classes of Network Attacks

– Reconnaissance attacks– Access attacks– Denial of service attacks– Worms, viruses, and Trojan horses

Page 14: Networks and Protocols CE00997-3 Week 10b. Overview of Network Security

Specific Attack Types• All of the following can be used

to compromise your system:– Packet sniffers– IP weaknesses– Password attacks– DoS or DDoS– Man-in-the-middle attacks– Application layer attacks– Trust exploitation– Port redirection – Virus– Trojan horse– Operator error– Worms

Page 15: Networks and Protocols CE00997-3 Week 10b. Overview of Network Security

Reconnaissance Attacks

• Network reconnaissance refers to the overall act of learning information about a target network by using publicly available information and applications.

Page 16: Networks and Protocols CE00997-3 Week 10b. Overview of Network Security

Reconnaissance Attack Example

Sample domain name query

• Sample IP address query

Page 17: Networks and Protocols CE00997-3 Week 10b. Overview of Network Security

Reconnaissance Attack Mitigation

– Network reconnaissance cannot be prevented entirely.

– IDSs at the network and host levels can usually notify an administrator when a reconnaissance gathering attack (for example, ping sweeps and port scans) is under way.

Page 18: Networks and Protocols CE00997-3 Week 10b. Overview of Network Security

Packet Sniffers

• A packet sniffer is a software application that uses a network adapter card in promiscuous mode to capture all network packets. The following are the packet sniffer features:– Packet sniffers exploit information passed in clear text.

Protocols that pass information in the clear include the following:

• Telnet• FTP• SNMP• POP

– Packet sniffers must be on the same collision domain.

Host A Host BRouter A Router B

Page 19: Networks and Protocols CE00997-3 Week 10b. Overview of Network Security

Packet Sniffer Mitigation

• The following techniques and tools can be used to mitigate sniffers:– Authentication—Using strong authentication, such as one-time passwords, is a

first option for defense against packet sniffers. – Switched infrastructure—Deploy a switched infrastructure to counter the use of

packet sniffers in your environment. – Antisniffer tools—Use these tools to employ software and hardware designed

to detect the use of sniffers on a network. – Cryptography—The most effective method for countering packet sniffers does

not prevent or detect packet sniffers, but rather renders them irrelevant.

Host A Host BRouter A Router B

Page 20: Networks and Protocols CE00997-3 Week 10b. Overview of Network Security

IP Spoofing– IP spoofing occurs when a hacker inside or outside a network

impersonates the conversations of a trusted computer. – Two general techniques are used during IP spoofing:

• A hacker uses an IP address that is within the range of trusted IP addresses.

• A hacker uses an authorized external IP address that is trusted.– Uses for IP spoofing include the following:

• IP spoofing is usually limited to the injection of malicious data or commands into an existing stream of data.

• A hacker changes the routing tables to point to the spoofed IP address, then the hacker can receive all the network packets that are addressed to the spoofed address and reply just as any trusted user can.

Page 21: Networks and Protocols CE00997-3 Week 10b. Overview of Network Security

IP Spoofing Mitigation• The threat of IP spoofing can be reduced, but not eliminated,

through the following measures:– Access control—The most common method for preventing

IP spoofing is to properly configure access control. – RFC 2827 filtering—You can prevent users of your network

from spoofing other networks (and be a good Internet citizen at the same time) by preventing any outbound traffic on your network that does not have a source address in your organization's own IP range.

– Additional authentication that does not use IP-based authentication—Examples of this include the following:

• Cryptographic (recommended)• Strong, two-factor, one-time passwords

Page 22: Networks and Protocols CE00997-3 Week 10b. Overview of Network Security

DoS Attacks

Page 23: Networks and Protocols CE00997-3 Week 10b. Overview of Network Security

DDoS Attack Example

Page 24: Networks and Protocols CE00997-3 Week 10b. Overview of Network Security

DoS Attack Mitigation

• The threat of DoS attacks can be reduced through the following three methods:– Antispoof features—Proper configuration of

antispoof features on your routers and firewalls– Anti-DoS features—Proper configuration of

anti-DoS features on routers and firewalls – Traffic rate limiting—Implement traffic rate

limiting with the networks ISP

Page 25: Networks and Protocols CE00997-3 Week 10b. Overview of Network Security

Password Attacks

• Hackers can implement password attacks using several different methods:– Brute-force attacks– Dictionary Attacks– Trojan horse programs– IP spoofing– Packet sniffers

Page 26: Networks and Protocols CE00997-3 Week 10b. Overview of Network Security

Password Attack Example

• L0phtCrack can take the hashes of passwords and generate the clear text passwords from them. Passwords are computed using two different methods:

– Dictionary cracking– Brute force

computation

Page 27: Networks and Protocols CE00997-3 Week 10b. Overview of Network Security

Password Attacks Mitigation• The following are mitigation techniques:

– Do not allow users to use the same password on multiple systems.

– Disable accounts after a certain number of unsuccessful login attempts.

– Do not use plain text passwords. OTP or a cryptographic password is recommended.

– Use “strong” passwords. Strong passwords are at least eight characters long and contain uppercase letters, lowercase letters, numbers, and special characters.

Page 28: Networks and Protocols CE00997-3 Week 10b. Overview of Network Security

Man-in-the-Middle Attacks

– A man-in-the-middle attack requires that the hacker have access to network packets that come across a network.

– A man-in-the-middle attack is implemented using the following:• Network packet sniffers• Routing and transport protocols

– Possible man-in-the-middle attack uses include the following:• Theft of information• Hijacking of an ongoing session• Traffic analysis• DoS• Corruption of transmitted data• Introduction of new information into network sessions

Host A Host B

Router A Router B

Data in clear text

Page 29: Networks and Protocols CE00997-3 Week 10b. Overview of Network Security

Man-in-the-Middle Mitigation

• Man-in-the-middle attacks can be effectively mitigated only through the use of cryptography (encryption).

Host A Host B

Router A ISP Router B

A man-in-the-middle attack can only see cipher text

IPSec tunnel

Page 30: Networks and Protocols CE00997-3 Week 10b. Overview of Network Security

Application Layer Attacks• Application layer attacks have the following

characteristics:– Exploit well known weaknesses, such as protocols, that are

intrinsic to an application or system (for example, sendmail, HTTP, and FTP)

– Often use ports that are allowed through a firewall (for example, TCP port 80 used in an attack against a web server behind a firewall)

– Can never be completely eliminated, because new vulnerabilities are always being discovered

Page 31: Networks and Protocols CE00997-3 Week 10b. Overview of Network Security

Application Layer Attacks Mitigation

• Some measures you can take to reduce your risks are as follows: – Read operating system and network log files, or have them

analyzed by log analysis applications. – Subscribe to mailing lists that publicize vulnerabilities.– Keep your operating system and applications current with

the latest patches.– IDSs can scan for known attacks, monitor and log attacks,

and in some cases, prevent attacks.

Page 32: Networks and Protocols CE00997-3 Week 10b. Overview of Network Security

Trust Exploitation

Page 33: Networks and Protocols CE00997-3 Week 10b. Overview of Network Security

Trust Exploitation Mitigation

– Systems on the outside of a firewall should never be absolutely trusted by systems on the inside of a firewall.

– Such trust should be limited to specific protocols and should be validated by something other than an IP address where possible.

SystemAUser = psmith; Pat Smith

SystemB compromised

by a hackerUser = psmith; Pat

Smith

HackerUser = psmith; Pat Smithson

Hackerblocked

Page 34: Networks and Protocols CE00997-3 Week 10b. Overview of Network Security

Port Redirection

Page 35: Networks and Protocols CE00997-3 Week 10b. Overview of Network Security

Unauthorized Access

– Unauthorized access includes any unauthorized attempt to access a private resource:• Not a specific type of attack• Refers to most attacks executed in networks today • Initiated on both the outside and inside of a network

– The following are mitigation techniques for unauthorized access attacks:• Eliminate the ability of a hacker to gain access to a system • Prevent simple unauthorized access attacks, which is the primary function of a

firewall

Page 36: Networks and Protocols CE00997-3 Week 10b. Overview of Network Security

Virus and Trojan Horses– Viruses refer to malicious software that are attached to another

program to execute a particular unwanted function on a user’s workstation. End-user workstations are the primary targets.

– A Trojan horse is different only in that the entire application was written to look like something else, when in fact it is an attack tool. A Trojan horse is mitigated by antivirus software at the user level and possibly the network level.

Page 37: Networks and Protocols CE00997-3 Week 10b. Overview of Network Security

Vulnerabilities Exist at all OSI Layers

Page 38: Networks and Protocols CE00997-3 Week 10b. Overview of Network Security

Security Framework and Policy

Page 39: Networks and Protocols CE00997-3 Week 10b. Overview of Network Security

What Is a Security Policy?

• “A security policy is a formal statement of the rules by which people who are given access to an organization’s technology and information assets must abide.”

• (RFC 2196, Site Security Handbook)

Page 40: Networks and Protocols CE00997-3 Week 10b. Overview of Network Security

Why Create a Security Policy?

– To create a baseline of your current security posture

– To set the framework for security implementation– To define allowed and not allowed behaviors– To help determine necessary tools and procedures– To communicate consensus and define roles– To define how to handle security incidents

Page 41: Networks and Protocols CE00997-3 Week 10b. Overview of Network Security

Security Policy Elements

• On the left are the network design factors upon which security policy is based

• On the right are basic Internet threat vectors toward which security policies are written to mitigate

Topology/Trust ModelTopology/Trust Model

Usage GuidelinesUsage Guidelines

Application DefinitionApplication Definition

Host AddressingHost Addressing

VulnerabilitiesVulnerabilities

Denial of ServiceDenial of Service

ReconnaissanceReconnaissance

MisuseMisuse

Data AssessmentData Assessment

POLICY

Page 42: Networks and Protocols CE00997-3 Week 10b. Overview of Network Security

Network Security as a Continuous Process

• Network security is a continuous process built around a security policy.– Step 1: Secure– Step 2: Monitor– Step 3: Test– Step 4: Improve

Secure

Monitor

Test

Improve Security Policy

Page 43: Networks and Protocols CE00997-3 Week 10b. Overview of Network Security

Secure

Monitor

Test

Improve Security Policy

Secure the Network

• Implement security solutions to stop or prevent unauthorized access or activities, and to protect information:– Authentication– Encryption– Firewalls– Vulnerability patching

Page 44: Networks and Protocols CE00997-3 Week 10b. Overview of Network Security

Secure

Monitor

Test

Improve Security Policy

Monitor Security

– Detects violations to the security policy

– Involves system auditing and real-time intrusion detection

– Validates the security implementation in Step 1

Page 45: Networks and Protocols CE00997-3 Week 10b. Overview of Network Security

Secure

Monitor

Test

Improve Security Policy

Test Security

• Validates effectiveness of the security policy through system auditing and vulnerability scanning

Page 46: Networks and Protocols CE00997-3 Week 10b. Overview of Network Security

Secure

Monitor

Test

Improve Security Policy

Improve Security

– Use information from the monitor and test phases to make improvements to the security implementation.

– Adjust the security policy as security vulnerabilities and risks are identified.

Page 47: Networks and Protocols CE00997-3 Week 10b. Overview of Network Security

Network Security Models

Page 48: Networks and Protocols CE00997-3 Week 10b. Overview of Network Security

Security Products and Solutions

Appliances

Series VPN 3000 Concentrator/Client

PIX Security Appliance

Integrated Switch VPN Module

Appliances

Series VPN 3000 Concentrator/Client

PIX Security Appliance

Integrated Switch VPN Module

Cisco Access Control Server Software

Identity Based Network Services (IBNS) 802.1X ext.

Cisco Access Control Server Software

Identity Based Network Services (IBNS) 802.1X ext.

IdentityServices

ExtendedPerimeterSecurity

IntrusionProtection

Security Management

Appliances PIX Security Appliance

Integrated Firewall Switch Module (FWSM)

Appliances PIX Security Appliance

Integrated Firewall Switch Module (FWSM)

Appliances Cisco 4200 Series

PIX Firewall

Host Based

Integrated Switch IDS Module (IDSM)

Appliances Cisco 4200 Series

PIX Firewall

Host Based

Integrated Switch IDS Module (IDSM)

SOHO 90, 830,1700, 2600, 3600, 3700, 7000 series

SecureConnectivity

Device Managers

PDM

IDM/IEV

CiscoWorksVPN/Securiy Management Solution

CiscoWorks Hosting Solution Engine

Device Managers

PDM

IDM/IEV

CiscoWorksVPN/Securiy Management Solution

CiscoWorks Hosting Solution Engine

Cisco IOS VPN

Cisco IOS VPN

Cisco IOS IDS

Cisco IOS IDS

Cisco IOS Firewall

Cisco IOS Firewall

SOHO 90, 830,1700, 2600, 3600, 3700, 7000 series

Page 49: Networks and Protocols CE00997-3 Week 10b. Overview of Network Security

User Identity• Mechanisms for proving who you are

–Both people and devices can be authenticated

• Three authentication attributes:–Something you know

–Something you have

–Something you are

• Common approaches to Identity:–Passwords

–Tokens

–PKI (Digital Certificates)

–Biometrics

Page 50: Networks and Protocols CE00997-3 Week 10b. Overview of Network Security

Cisco ACS 3.1 and Appliance

• Windows 2000 & NT• RADIUS and TACACS+• High performance (400+

authentications per second)• Wireless security enhancements• Supports any access: wireless,

Firewall, VPN, voice, content or switched

• 802.1x provides IBNS for wireless and switch port authentication

• Support for directory services and LDAP

Page 51: Networks and Protocols CE00997-3 Week 10b. Overview of Network Security

Types of Firewalls– Server Based

• Microsoft ISA• CheckPoint• BorderManager

– Appliance• PIX Security

Appliance• Netscreen• SonicWall

– Personal• Norton• McAfee• ZoneAlarms

– Integrated• IOS Firewall• Switch Firewall

Page 52: Networks and Protocols CE00997-3 Week 10b. Overview of Network Security

Solution BreadthSolution Breadth

SwitchModuleSwitchModule

IOS FWRouterIOS FWRouter

VPNClientVPNClient

PIXAppliancePIXAppliance

MgmtMgmt

Firewall Solutions

Firewall Service Module (FWSM)Firewall Service Module (FWSM)

VPN Client Software — Built in Personal FWVPN Client Software — Built in Personal FW

800800 17001700 26002600 3xxx3xxx 7xxx7xxx

PIX 501PIX 501 PIX 506EPIX 506E PIX 515EPIX 515E PIX 525PIX 525 PIX 535PIX 535

Secure CLI

Secure CLI

Web UIEmbedded Mgr

Web UIEmbedded Mgr

Enterprise MgmtVMS

Enterprise MgmtVMS

Page 53: Networks and Protocols CE00997-3 Week 10b. Overview of Network Security

SMBSMB

Co

nne

ctiv

ity

Performance

Gigabit Ethernet

PIX Security Appliance Lineup

EnterpriseEnterpriseROBOROBO

PIX 515E

PIX 525

PIX 535

SOHOSOHO

PIX 501

PIX 506E

Service ProviderService Provider

Stateful Inspection FirewallStateful Inspection FirewallAppliance is Hardened OSAppliance is Hardened OSIPSec VPNIPSec VPNIntegrated Intrusion DetectionIntegrated Intrusion DetectionHot Standby, Stateful Failover Hot Standby, Stateful Failover Easy VPN Client/ServerEasy VPN Client/ServerVoIP SupportVoIP Support

Page 54: Networks and Protocols CE00997-3 Week 10b. Overview of Network Security

SecuritySecurityOfferingsOfferings

SecureOperating SystemFoundation

IP Services

IOS Firewall

Network Integrated SolutionsNetwork Integrated Solutions

VPNVPN FirewallFirewall IntrusionIntrusionProtectionProtection VV33PNPN

IPsecIPsec CBAC Stateful InspectionCBAC Stateful Inspection IDSIDS SSHSSH SSLSSL

ACLACL AAAAAA NATNAT L2TP/EAPL2TP/EAPMSCHAPv2MSCHAPv2

PKIPKI

802.1X802.1X

BGPBGP GREGRE

MulticastMulticast Application Aware QoSApplication Aware QoS

DHCP/DNSDHCP/DNS

MPLSMPLSVoIPVoIP

EIGRPEIGRP OSPFOSPFMultiprotocolMultiprotocol

HTTPSHTTPS Secure ARPSecure ARPuRPFuRPF

Authentication Authentication per user via AAAper user via AAA

Command Command Authorization via AAAAuthorization via AAA

Device Access by Device Access by Privilege LevelPrivilege Level

Activity LoggingActivity Logging

NetflowNetflow

IP CompIP Comp

SNMPv3SNMPv3(Unicast Reverse Path Forward)(Unicast Reverse Path Forward)

Page 55: Networks and Protocols CE00997-3 Week 10b. Overview of Network Security

Catalyst Switch Integration

FirewallIDSVirtual Private Network

Appliance Capabilities Cisco Infrastructure

© 2002, Cisco Systems, Inc. All rights reserved.

VPN SSL NAM IDSFirewall

Security Services Modules

Page 56: Networks and Protocols CE00997-3 Week 10b. Overview of Network Security

Secure Connectivity

• Defines “peers”–Two devices in a network that need to connect–Tunnel makes peers seem virtually next to each other–Ignores network complexity in between

• Technologies–Point-to-Point Tunneling Protocol (PPTP)–Layer 2 Tunneling Protocol (L2TP)–IP Security (IPSec)–Secure Shell (SSH)–Secure Sockets Layer (SSL)–Transport Layer Security (TLS)

Page 57: Networks and Protocols CE00997-3 Week 10b. Overview of Network Security

Solution BreadthSolution Breadth

SwitchModuleSwitchModule

RouterRouter

VPNClientVPNClient

PIXPIX

MgmtMgmt

3000 Concentrator3000 Concentrator

VPN Solutions

30053005 30153015 30803080

VPN Service Module (VPNSM)VPN Service Module (VPNSM)

VPN Client SoftwareVPN Client Software 30023002

800800 17001700 26002600 3xxx3xxx 7xxx7xxx

PIX 501PIX 501 PIX 506EPIX 506E PIX 515EPIX 515E PIX 525PIX 525 PIX 535PIX 535

Secure Menu, CLISecure

Menu, CLIWeb UI

Embedded MgrWeb UI

Embedded MgrEnterprise Mgmt

VMSEnterprise Mgmt

VMS

30303030 30603060

Page 58: Networks and Protocols CE00997-3 Week 10b. Overview of Network Security

SMBSMB

Co

nne

ctiv

ity

Performance

VPN 3000 Concentrator Lineup

EnterpriseEnterpriseROBOROBOSOHOSOHO Service ProviderService Provider

High Performance VPN ApplianceHigh Performance VPN ApplianceCentralized Remote Access ControlCentralized Remote Access ControlScalable PlatformScalable PlatformRedundancyRedundancyAdvanced Client Feature supportAdvanced Client Feature supportFIPS 140 Level 2FIPS 140 Level 2DES/3DES/AESDES/3DES/AESNAT TransparencyNAT Transparency

Cisco VPN 3005

Cisco VPN 3015

Cisco VPN 3030

Cisco VPN 3060

Cisco VPN 3080

Cisco VPN 3002 Hardware Client

Page 59: Networks and Protocols CE00997-3 Week 10b. Overview of Network Security

Cisco VPN Software Client

Supported Operating Systems

•Windows 95, 98, NT, 2K ME XP

•Solaris, Linux

•Mac OS XVirtual Adapter (Win2K / XP)Common Graphical Interface for Windows and Mac VPN Clients (New GUI)Alerts (Delete With Reason)Personal Firewall Enhancements (including AYT for Cisco Security Agent &

Sygate)Coexistence with Third-Party VPN Vendors

Encryption using DES, 3DES, or AES

Terminate on Cisco IOS routers, PIX firewalls, VPN 3000

Centralized Configuration & Policy Management

v3.6 is FIPS 140-1 Level 1 Certified

Page 60: Networks and Protocols CE00997-3 Week 10b. Overview of Network Security

SMBSMB

Co

nne

ctiv

ity

Performance

VPN Router Lineup

EnterpriseEnterpriseROBOROBOSOHOSOHO Service ProviderService Provider

High Performance Integrated VPN ApplianceHigh Performance Integrated VPN ApplianceScalable PlatformScalable PlatformRedundancyRedundancyAdvanced Client Feature supportAdvanced Client Feature supportDES/3DES/AESDES/3DES/AES

Cisco 1761-VPN

Cisco 2600/2691-VPN

Cisco 3600-VPN

Cisco 3700-VPN

Cisco 7x00-VPN

Cisco 806 and 1721-VPN

Page 61: Networks and Protocols CE00997-3 Week 10b. Overview of Network Security

Solution BreadthSolution Breadth

SwitchSensorSwitchSensor

RouterSensorRouterSensor

HostSensorHostSensor

FirewallSensorFirewallSensor

MgmtMgmt

NetworkSensorNetworkSensor

IDS Solutions

42104210 42354235 42504250

IDSM-2IDSM-2

Server AgentServer Agent Desktop AgentDesktop Agent

800800 17001700 26002600 3xxx3xxx 7xxx7xxx

PIX 501PIX 501 PIX 506EPIX 506E PIX 515EPIX 515E PIX 525PIX 525 PIX 535PIX 535

Secure Command Line

Secure Command Line

Web UIEmbedded Mgr

Web UIEmbedded Mgr

Enterprise MgmtVMS

Enterprise MgmtVMS

4250-XL4250-XL

Page 62: Networks and Protocols CE00997-3 Week 10b. Overview of Network Security

Security and Identity Management Solutions Lineup

Page 63: Networks and Protocols CE00997-3 Week 10b. Overview of Network Security

Cisco AVVID ArchitectureE-LearningE-LearningSupply

ChainSupply Chain

Workforce OptimizationWorkforce

OptimizationCustomer

CareCustomer

CareInternet

CommerceInternet

Commerce

Intelligent Network Services

NetworkPlatforms

Mu

lticast

Mu

lticast

Lo

ad

L

oa

d

Ba

lan

cing

Ba

lan

cing

Ca

chin

gC

ach

ing

DN

SD

NS

Se

rvices

Se

rvices

Ma

na

ge

me

nt

Ma

na

ge

me

nt

Acco

un

ting

Acco

un

ting

Re

al T

ime

Re

al T

ime

Se

rvices

Se

rvices

Qo

SQ

oS

Se

curity

Se

curity

Intelligent Network ClassificationIntelligent Network Classification

InternetBusiness

Integrators

InternetMiddleware

Layer

MessagingMessaging

Contact CenterContact Center

Voice Call ProcessingVoice Call Processing

CollaborationCollaboration

Video on DemandVideo on Demand

Personal ProductivityPersonal Productivity

Policy ManagementPolicy Management

Content DistributionContent Distribution

Address ManagementAddress Management

SecuritySecurity

SLA ManagementSLA Management

Clients

MultimediaMultimedia

Page 64: Networks and Protocols CE00997-3 Week 10b. Overview of Network Security

SAFE Modular BlueprintEnterprise campus Enterprise edge Service

provider edge

BuildingBuilding

Building distributionBuilding

distributionManagementManagement

ServerServer

CoreCore

Edge distribution

Edge distribution

E-commerceE-commerce

CorporateInternet

CorporateInternet

VPN andremote access

VPN andremote access

WANWAN

ISP BISP B

ISP AISP A

PSTNPSTN

Frameor

ATM

Frameor

ATM

Page 65: Networks and Protocols CE00997-3 Week 10b. Overview of Network Security

Security Resources on the Internet• Cisco Connection Online—http://www.cisco.com• SecurityFocus.com—http://www.securityfocus.com• SANS—http://www.sans.org• CERT—http://www.cert.org• CIAC—http://www.ciac.org/ciac• CVE—http://cve.mitre.org• Computer Security Institute—http://www.gocsi.com• Center for Internet Security—ttp://www.cisecurity.org• Cisco Connection Online—

–http://www.cisco.com/go/security• Cisco Product Specific Incident Response Team (PSIRT)—

–http://www.cisco.com/go/psirt

Page 66: Networks and Protocols CE00997-3 Week 10b. Overview of Network Security

Summary– The need for network security has increased as

networks have become more complex and interconnected.

– The following are the four types of security threats:• Structured• Unstructured• Internal• External

– There are many common attack methods and techniques used by hackers• Reconnaissance• Access• Denial of Service

Page 67: Networks and Protocols CE00997-3 Week 10b. Overview of Network Security

Summary (cont.)– The Security Wheel is the graphical representation

of security as a continuous process built around a security policy which includes securing, monitoring, testing and improving network security.

– There are many components of a complete security policy

– Common management protocols are integral to maintaining a secure infrastructure

– Five key areas of network security are• Perimeter Security• Secure Connectivity• Identity Services• Intrusion Detection• Management