Seguridad P1
Seguridad P1
Seguridad P1
• Introduction
• Securing Networks
• Network Threats
• Mitigating Threats
Drivers for Network Security
• Vulnerability
• Mitigation
• Risk
Vectors of Network Attacks
Data Loss
• Unencrypted Devices
• Removable Media
• Hard Copy
• Security traps
• Data encryption
• PIN enforcement
• Data wipe
• Jailbreak/root detection
The Hacker & The Evolution of Hackers
• Vulnerability Brokers
• Hacktivists
• Cyber Criminals
• State-Sponsored Hackers
Introduction of Attack Tools
Evolution of Security Tools
• Data modification
• IP address spoofing
• Password-based
• Denial-of-service
• Man-in-the-middle
• Compromised-key
• Sniffer
Malware
Various Types of Malware
Viruses
Trojan Horse Classification
Classifications:
• Security software disabler
• Remote-access
• Data-sending
• Destructive
• Proxy
• FTP
• DoS
Worms
Components:
1.
Propagate
• Enabling vulnerability for 19 days
• Propagation mechanism
• Payload
4.
Code Red 2.
Repeat the
cycle
Worm Launch DoS
attack for
next 7 days
Propagation
3.
Stop and go
dormant for
a few days
Other Malware
Ransomware Scareware
Spyware Phishing
Adware Rootkits
Common Network Attacks
Types of Network Attacks
Data
Modification
Syn Flood
Smurf Attack
Reconnaissance
Access
DoS
Reconnaissance Attacks
• Vulnerability scanners
• Exploitation tools
Access Attacks
• To gain access
• Trust exploitation
• Port redirection
• Man-in-the-middle
• Buffer overflow
• Pretexting
• Phishing
• Spearphishing
• Spam
• Tailgating
• Baiting
Denial of Service Attacks
DDoS Attacks
Confidentiality:
Uses encryption to
encrypt and hide
data.
Components
of
Availability:
Cryptography Integrity:
Assures data is
Uses hashing
accessible.
algorithms to
Guaranteed by
ensure data is
network hardening
unaltered during
mechanisms and
operation.
backup systems.
• Domains of Network Security
Network Security Domains
• Risk assessment
• Security policy
• Asset management
• Access control
• Compliance
Network Security Policy
Network Security Policy Objectives
Introducing the Cisco SecureX Architecture
The Security Artichoke
SecureX Product Families
Server Edge
and Branch
Secure Data
Secure Email
Center and
and Web
Virtualization
SecureX
Secure Secure
Access Mobility
SecureX Security Technology
SecureX Architecture:
• Scanning engines
• Delivery mechanisms
• Next-generation endpoint
Centralized Context-Aware Network Scanning Element
• Person’s identity
• Application in use
• Location
• Time of access
Cisco Security Intelligence Operations
Cisco Security Intelligence Operations (cont.)
Mitigating Common Network Threats
Defending the Network
Best practices:
• Develop a written security policy.
• Educate employees about the risks of social engineering, and develop strategies to validate
identities over the phone, via email, or in person.
• Keep patches up-to-date by installing them weekly or daily to prevent buffer overflow and
privilege escalation attacks.
Containment
Inoculation Quarantine
Treatment
Mitigating Reconnaissance Attacks
Mitigating Access Attacks
Mitigating DoS Attacks
Network Foundation Protection Framework
NFP Framework
Securing the Control Plane
Securing the Management Plane
Securing the Data Plane