CCNAS CHPT 1
CCNAS CHPT 1
CCNAS CHPT 1
THREATS
Securing networks
Network threats
Mitigating threats
Modern Network Security
•
Threats
Who ?
- Attacker
- Target
• What ?
- Confidential Data
- Important Devices
• Why ?
- Money
- Popularity
External and Internal Threat
Internet
External Threat
Internal Threat
Target
Data Loss
■ Script Kiddies
■ State Sponsored
■ Cyber Criminals
■ Hacktivists
■ Vulnerability Broker
Hacker Tools
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 10
Various Types of Malware
Viruses
Trojan Horse Classification
Classifications:
• Security software disabler
• Remote-access
• Data-sending
• Destructive
• Proxy
• FTP
• DoS
Worms
658 server
Components:
• Enabling vulnerability
• Propagation mechanism 1.
Propagate for
19 days
• Payload
4.
Code Red 2.
Repeat the
cycle
Worm Launch DoS
attack for next
Propagation 7 days
3.
Stop and go
dormant for a
few days
Other Malware
Ransomware Scareware
Spyware Phishing
Adware Rootkits
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 17
Types of Network Attacks
Data
Modification
Syn Flood
Smurf Attack
Reconnaissance
Access
DoS
Reconnaissance Attacks
• Vulnerability scanners
• Exploitation tools
Access Attacks
• To gain access
• Trust exploitation
• Port redirection
• Man-in-the-middle
• Buffer overflow
• Pretexting
• Phishing
• Spearphishing
• Spam
• Tailgating
• Baiting
Denial of Service Attacks
DDoS Attacks
Confidentiality:
Uses encryption to
encrypt and hide
data.
Components
of
Cryptography
Availability:
Integrity:
Assures data is
Uses hashing
accessible.
algorithms to
Guaranteed by
ensure data is
network hardening
unaltered during
mechanisms and
operation.
backup systems.
Network Security Domains
• Risk assessment
• Security policy
• Asset management
• Access control
• Compliance
Network Security Policy
The Security Artichoke
Evolution of Network Security Tools
SecureX Product Families
Server Edge
and Branch
Secure Data
Secure Email
Center and
and Web
Virtualization
SecureX
Secure
Secure Access
Mobility
SecureX Security Technology
• Delivery mechanisms
• Next-generation endpoint
Defending the Network
Best practices:
• Educate employees about the risks of social engineering, and develop strategies to
validate identities over the phone, via email, or in person.
• Keep patches up-to-date by installing them weekly or daily to prevent buffer overflow
and privilege escalation attacks.
worm, other.
berdasarkan tipe-tipenya.
TERIMA KASIH