68
1 CCNA Security Chapter 1: Modern Network Security Chapter 1: Modern Network Security Threats Threats

1 CCNA Security Chapter 1: Modern Network Security Threats

Embed Size (px)

Citation preview

Page 1: 1 CCNA Security  Chapter 1: Modern Network Security Threats

1

CCNA Security

Chapter 1: Modern Network Security Chapter 1: Modern Network Security ThreatsThreats

Page 2: 1 CCNA Security  Chapter 1: Modern Network Security Threats

2

Lesson Objectives

Describe the evolution of network security.

Describe the drivers for network security.

Describe the major network security organizations.

Describe the domains of network security.

Describe network security policies.

Describe viruses, worms, and Trojan Horses.

Page 3: 1 CCNA Security  Chapter 1: Modern Network Security Threats

3

Lesson Objectives

Describe how to mitigate threats from viruses, worms, and Trojan Horses.

Describe how network attacks are categorized.

Describe reconnaissance attacks.

Describe access attacks.

Describe Denial of Service attacks.

Describe how to mitigate network attacks.

Page 4: 1 CCNA Security  Chapter 1: Modern Network Security Threats

4

Modern Network Security Threats

1.11.1 Fundamental Principles of a Secure Network Fundamental Principles of a Secure Network

1.2 1.2 Viruses, Worms, and Trojan HorsesViruses, Worms, and Trojan Horses

1.31.3 Attack Methodologies Attack Methodologies

Page 5: 1 CCNA Security  Chapter 1: Modern Network Security Threats

5

1.1 Fundamental Fundamental PrinciplesPrinciples of a

Secure Network

Page 6: 1 CCNA Security  Chapter 1: Modern Network Security Threats

6

1.1 Fundamental PrinciplesFundamental Principles of a Secure Network

1.1.1 1.1.1 EvolutionEvolution of Network Security of Network Security

1.1.2 1.1.2 DriversDrivers for Network Security for Network Security

1.1.3 Network Security Organizations1.1.3 Network Security Organizations

1.1.4 1.1.4 DomainsDomains of Network Security of Network Security

1.1.5 Network Security 1.1.5 Network Security PolicesPolices

Page 7: 1 CCNA Security  Chapter 1: Modern Network Security Threats

7

1.1.1 Evolution of Network Security

In July 2001, the In July 2001, the Code RedCode Red worm attacked worm attacked web servers globally, infecting over web servers globally, infecting over 350,000350,000 hosts.hosts.

In July 2001, the In July 2001, the Code RedCode Red worm attacked worm attacked web servers globally, infecting over web servers globally, infecting over 350,000350,000 hosts.hosts.

Page 8: 1 CCNA Security  Chapter 1: Modern Network Security Threats

8

Evolution of Network Security

““Necessity is the Necessity is the mother mother of invention.”of invention.”““Necessity is the Necessity is the mother mother of invention.”of invention.”

Page 9: 1 CCNA Security  Chapter 1: Modern Network Security Threats

9

Evolution of Network Security

Page 10: 1 CCNA Security  Chapter 1: Modern Network Security Threats

10

Evolution of Network Security

Internal threatsInternal threats can cause even greater can cause even greater damagedamage than than external threatsexternal threats..

Page 11: 1 CCNA Security  Chapter 1: Modern Network Security Threats

11

Evolution of Network Security

ConfidentialityConfidentiality

IntegrityIntegrity

AvailabilityAvailability

Page 12: 1 CCNA Security  Chapter 1: Modern Network Security Threats

12

1.1.2 Drivers for Network Security

Hackers–White hat

–Black hat

Hacking is a Hacking is a driving forcedriving force in in network security.network security.

Page 13: 1 CCNA Security  Chapter 1: Modern Network Security Threats

13

Drivers for Network Security

Hacker:Hacker:

1960s: PhreakingPhreaking,

John Draper

1980s: Wardialing Wardialing

1990s: WardrivingWardriving

……

Page 14: 1 CCNA Security  Chapter 1: Modern Network Security Threats

14

Drivers for Network Security

Page 15: 1 CCNA Security  Chapter 1: Modern Network Security Threats

15

Drivers for Network Security

Network security professionals

Page 16: 1 CCNA Security  Chapter 1: Modern Network Security Threats

16

1.1.3 Network Security Organizations

www.infosyssec.com

www.sans.org

www.cisecurity.org

www.cert.org

www.isc2.org

www.first.org

www.infragard.net

www.mitre.org

www.cnss.gov

Page 17: 1 CCNA Security  Chapter 1: Modern Network Security Threats

17

Network Security Organizations - SANS

Page 18: 1 CCNA Security  Chapter 1: Modern Network Security Threats

18

Network Security Organizations - CERT

Page 19: 1 CCNA Security  Chapter 1: Modern Network Security Threats

19

Systems Security Certified Practitioner (SCCP)

Certification and Accreditation Professional (CAP)

Certified Secure Software Lifecycle Professional (CSSLP)

Certified Information Systems Security Professional (CISSP)

Information security certifications Offered by (ISC)2

Network Security Organizations - ISC2

Page 20: 1 CCNA Security  Chapter 1: Modern Network Security Threats

20

1.1.4 Domains of Network Security

ISO/IEC 17799ISO/IEC 17799

Page 21: 1 CCNA Security  Chapter 1: Modern Network Security Threats

21

Domains of Network Security

Page 22: 1 CCNA Security  Chapter 1: Modern Network Security Threats

22

Network Security Policies(SDN)

Page 23: 1 CCNA Security  Chapter 1: Modern Network Security Threats

23

Network Security Policies

Page 24: 1 CCNA Security  Chapter 1: Modern Network Security Threats

24

Network Security Policies

Page 25: 1 CCNA Security  Chapter 1: Modern Network Security Threats

25

Network Security Policies

ComprehensiveComprehensive

SuccinctSuccinct

Page 26: 1 CCNA Security  Chapter 1: Modern Network Security Threats

26

1.2 Viruses, Worms, 1.2 Viruses, Worms, and Trojan Horsesand Trojan Horses

Page 27: 1 CCNA Security  Chapter 1: Modern Network Security Threats

27

1.2 Viruses, Worms, and Trojan Horses

1.2.1 Virus

1.2.2 Worm

1.2.3 Trojan Horse

1.2.4 Mitigating Virus, Worms, and Trojan Horse

Page 28: 1 CCNA Security  Chapter 1: Modern Network Security Threats

28

1.2.1 Viruses

A A virusvirus is malicious is malicious softwaresoftware which attaches which attaches to another program to to another program to executeexecute a specific a specific unwantedunwanted function on a computer. function on a computer.

Page 29: 1 CCNA Security  Chapter 1: Modern Network Security Threats

29

1.2.2 Worms

A A wormworm executes arbitrary code and installs executes arbitrary code and installs copies copies

of itself in the of itself in the memory memory of the infected computer, of the infected computer, which then which then infectsinfects other hosts. other hosts.

Page 30: 1 CCNA Security  Chapter 1: Modern Network Security Threats

30

Worms

Three major components to most worm attacks:

–Enabling vulnerability

–Propagation mechanism

–Payload

Page 31: 1 CCNA Security  Chapter 1: Modern Network Security Threats

31

Worms

Five basic phases of attack of worm and virus:

探测

渗透

持续

传播

瘫痪

Page 32: 1 CCNA Security  Chapter 1: Modern Network Security Threats

32

1.2.3 Trojan Horses1.2.3 Trojan Horses

A A Trojan HorseTrojan Horse is malware software is malware software that carries that carries

out malicious operations under the out malicious operations under the guiseguise of of a desired function. a desired function.

Page 33: 1 CCNA Security  Chapter 1: Modern Network Security Threats

33

1.2.4 Mitigating Viruses, Worms, and Trojan Horses

Viruses and Trojan HorsesViruses and Trojan Horses tend to take advantage of tend to take advantage of

locallocal root buffer overflows. root buffer overflows.

WormsWorms such as SQL Slammer and Code Red exploit such as SQL Slammer and Code Red exploit

remoteremote root buffer overflows. root buffer overflows.

Page 34: 1 CCNA Security  Chapter 1: Modern Network Security Threats

34

1.2.4 Mitigating Viruses, Worms, and Trojan Horses

The primary means of The primary means of mitigating virus and mitigating virus and Trojan horse attacks is Trojan horse attacks is

anti-virus softwareanti-virus software. .

Page 35: 1 CCNA Security  Chapter 1: Modern Network Security Threats

35

Mitigating Viruses, Worms, and Trojan Horses

Worms are more network-based than viruses.

The response to a worm infection can be broken down into four phases: Containment(抑制)Inoculation(接种)Quarantine(隔离)Treatment(治疗)

Page 36: 1 CCNA Security  Chapter 1: Modern Network Security Threats

36

Mitigating Viruses, Worms, and Trojan Horses

Example ( SQL Slammer worm):

Page 37: 1 CCNA Security  Chapter 1: Modern Network Security Threats

37

Mitigating Viruses, Worms, and Trojan Horses

• Host-based intrusion prevention system (HIPS) Cisco Security Agent (CSA)

Cisco Network Admission Control (NAC)

Cisco Security Monitoring, Analysis, and Response System (MARS)

Page 38: 1 CCNA Security  Chapter 1: Modern Network Security Threats

38

1.3 Attack 1.3 Attack MethodologiesMethodologies

Page 39: 1 CCNA Security  Chapter 1: Modern Network Security Threats

39

1.3 Attack Methodologies

1.3.1 1.3.1 Reconnaissance Reconnaissance AttackAttack

1.3.2 1.3.2 AccessAccess Attacks Attacks

1.3.3 1.3.3 Denial of ServiceDenial of Service Attacks Attacks

1.3.4 1.3.4 MitigatingMitigating Network Attacks Network Attacks

Page 40: 1 CCNA Security  Chapter 1: Modern Network Security Threats

40

1.3.1 Reconnaissance Attack

This course classifies attacks in three major categories.

Page 41: 1 CCNA Security  Chapter 1: Modern Network Security Threats

41

Reconnaissance Attack

Reconnaissance attacks use various tools to Reconnaissance attacks use various tools to gain access to a network: gain access to a network:

– Packet sniffersPacket sniffers

– Ping sweepsPing sweeps

– Port scansPort scans

– Internet information queriesInternet information queries

Page 42: 1 CCNA Security  Chapter 1: Modern Network Security Threats

42

Reconnaissance Attack A packet sniffer is a software application.

Uses a network adapter card in promiscuous mode to capture all network packets that are sent across a LAN.

Some network applications distribute network packets in unencrypted plaintext.

Numerous freeware and shareware packet sniffers.

Page 43: 1 CCNA Security  Chapter 1: Modern Network Security Threats

43

Reconnaissance Attack

Page 44: 1 CCNA Security  Chapter 1: Modern Network Security Threats

44

Reconnaissance Attack

Keep in mind that reconnaissance attacks are Keep in mind that reconnaissance attacks are

typically the typically the precursorprecursor to further attacks. to further attacks.

The network-based intrusion prevention The network-based intrusion prevention

functionality supported by Cisco IOS functionality supported by Cisco IOS security security

imagesimages running on ISRs. running on ISRs.

Page 45: 1 CCNA Security  Chapter 1: Modern Network Security Threats

45

1.3.2 Access Attacks

There are There are five typesfive types of access attacks: of access attacks:• Password attack Password attack

• Trust exploitation Trust exploitation

• Port redirection Port redirection

• Man-in-the-middle attack Man-in-the-middle attack

• Buffer overflowBuffer overflow

Page 46: 1 CCNA Security  Chapter 1: Modern Network Security Threats

46

Access Attacks

Password attack

Attackers can implement password attacks using several different methods:

–Brute-force attacks

–Trojan Horse programs

–Packet sniffers

Page 47: 1 CCNA Security  Chapter 1: Modern Network Security Threats

47

Access Attacks

Trust exploitation

Page 48: 1 CCNA Security  Chapter 1: Modern Network Security Threats

48

Access Attacks

Port redirection

Page 49: 1 CCNA Security  Chapter 1: Modern Network Security Threats

49

Access Attacks

Man-in-the-middle attack

Page 50: 1 CCNA Security  Chapter 1: Modern Network Security Threats

50

Access Attacks

Buffer overflow

Page 51: 1 CCNA Security  Chapter 1: Modern Network Security Threats

51

Access Attacks

Detect the Access Attacks:

– Reviewing logsReviewing logs

Check the numbers of failed loginfailed login attempts.

– Bandwidth utilizationBandwidth utilization

Detect the Man-in-the-middle attacks.

– Process loadsProcess loads

Detect the buffer overflowbuffer overflow attacks.

Page 52: 1 CCNA Security  Chapter 1: Modern Network Security Threats

52

1.3.3 Denial of Service Attacks

A DoSDoS attack is a networknetwork attack.

DoS attacks attempt to compromise the availabilitycompromise the availability of a network, host, or application.

There are two major reasons a DoS attack occurs:

–A host or application fails to handle an unexpected condition.

–A network, host, or application is unable to handle an enormous quantity of data.

Page 53: 1 CCNA Security  Chapter 1: Modern Network Security Threats

53

Denial of Service Attacks

Dos

Page 54: 1 CCNA Security  Chapter 1: Modern Network Security Threats

54

Denial of Service Attacks

DDos — Distribute Dos

Page 55: 1 CCNA Security  Chapter 1: Modern Network Security Threats

55

Denial of Service Attacks Ping of Death

A hacker sends an echo request in an IP packet larger than the maximum packet size of 65,535 bytes

– ping -t -l 65550 192.168.1.1

Page 56: 1 CCNA Security  Chapter 1: Modern Network Security Threats

56

Denial of Service Attacks Smurf Attack

Page 57: 1 CCNA Security  Chapter 1: Modern Network Security Threats

57

Denial of Service Attacks

TCP SYN Flood

Page 58: 1 CCNA Security  Chapter 1: Modern Network Security Threats

58

Denial of Service Attacks - Email Attacks

Sends a Sends a copycopy of itself to everyone mail listed. of itself to everyone mail listed.

Email Email BombBomb.  . 

Page 59: 1 CCNA Security  Chapter 1: Modern Network Security Threats

59

DoS - Physical Infrastructure Attacks

Snip your Snip your cablescables! !

Affect Power!Affect Power!

DestructionDestruction of devices! of devices!

Page 60: 1 CCNA Security  Chapter 1: Modern Network Security Threats

60

Social EngineeringSocial Engineering Attacks AttacksSocial EngineeringSocial Engineering Attacks Attacks

Page 61: 1 CCNA Security  Chapter 1: Modern Network Security Threats

61

Tools of the Attacker

The following are a few of the most popular tools used by network attackers:

Enumeration tools (dumpreg, netview and netuser)

Port/address scanners (AngryIP, nmap, Nessus)

Vulnerability scanners (Meta Sploit, Core Impact, ISS)

Packet Sniffers (Snort, Wire Shark, Air Magnet)

Root kits

Cryptographic cracking tools (Cain, WepCrack)

Malicious codes (worms, Trojan horse, time bombs)

System hijack tools (netcat, MetaSploit, Core Impact)

Page 62: 1 CCNA Security  Chapter 1: Modern Network Security Threats

62

1.3.4 Mitigating Network Attacks

Reconnaissance attacksReconnaissance attacks can be mitigated in several ways.

1. Implement authenticationauthentication to ensure proper access.

2. Use encryptioencryptionn to render packet sniffer attacks useless.

3. Use anti-sniffer toolsanti-sniffer tools to detect packet sniffer attacks.

4. Implement a switchedswitched infrastructure.

5. Use a firewall and IPSfirewall and IPS.

Page 63: 1 CCNA Security  Chapter 1: Modern Network Security Threats

63

Mitigating Network Attacks

Several techniques are available for mitigating access access

attacksattacks.

1.1. StrongStrong password security

2. Principle of minimum trustminimum trust

3.3. CryptographyCryptography

4. Applying operating system and application patchespatches

Page 64: 1 CCNA Security  Chapter 1: Modern Network Security Threats

64

Mitigating Network Attacks

The Primary Means of Mitigating DoSDoS Attacks :

1.1. IPSIPS and firewallsfirewalls (Cisco ASAs and ISRs)

2.2. Anti-spoofingAnti-spoofing technologies

3.3. Quality of ServiceQuality of Service – traffic policing

Page 65: 1 CCNA Security  Chapter 1: Modern Network Security Threats

65

10 best practices (1)

Page 66: 1 CCNA Security  Chapter 1: Modern Network Security Threats

66

10 best practices (2)

Avoid unnecessary inputs

Shutdown services and ports Backup

Educate

Page 67: 1 CCNA Security  Chapter 1: Modern Network Security Threats

67

Security of the network is ultimately the responsibility of

everyone

Page 68: 1 CCNA Security  Chapter 1: Modern Network Security Threats

68