Securing The Network: Building A Simple Network

Download as pps, pdf, or txt
Download as pps, pdf, or txt
You are on page 1of 11

Securing the

Network

Building a Simple Network

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-1


Closed Networks

Attacks from inside the network remain a threat.


© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-2
Open Networks

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-3


Threat Capabilities—
More Dangerous and Easier to Use

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-4


E-Business Challenge

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-5


Adversaries, Adversary Motivations, and
Classes of Attack

Adversaries Motivations Classes of Attack


 Nation-states  Intelligence  Passive
 Terrorists  Theft  Active
 Criminals  DoS  Close-in
 Hackers  Embarrassment  Insider
 Crackers  Challenge  Distributed
 Competitors
 “Script kiddies”
 Disgruntled
employees
 Government

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-6


Common Threats
 Physical installations
– Hardware threats
– Environmental threats
– Electrical threats
– Maintenance threats
 Reconnaissance attacks—Learning information about a target
network by using readily available information and applications
 Access attacks—Attacks on networks or systems for these reasons:
– Retrieve data
– Gain access
– Escalate their access privileges
 Password attacks—Tools used by hackers to compromise passwords

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-7


Password Attack Threat Mitigation

Here are password attack threat-mitigation techniques:


 Do not allow users to use the same password on multiple
systems.
 Disable accounts after a certain number of unsuccessful login
attempts.
 Do not use cleartext passwords.
 Use “strong” passwords; for example, “mY8!Rthd8y” rather than
“mybirthday.”

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-8


Summary

 Sophisticated attack tools and open networks continue to


generate an increased need for network security policies and
infrastructure to protect organizations from internally and
externally based attacks.
 Organizations must balance network security needs against
e-business processes, legal issues, and government policies.
Establishing a network security policy is the first step in changing
a network over to a secure infrastructure.
 Network adversaries come in many shapes and sizes and with
multiple motivations.

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-9


Summary (Cont.)
 It is very important to provide physical installation security for
enterprise network devices.
 Password attack threats can be mitigated.
– Restrict password use.
– Disable accounts after unsuccessful logins.
– Do not use cleartext passwords; use strong passwords.

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-10


© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-11

You might also like