Lesson 1 - Network Defense Fundamentals
Lesson 1 - Network Defense Fundamentals
Lesson 1 - Network Defense Fundamentals
Lesson 1
Network Defense Fundamentals
Objectives
1A Describe the five keys of network security.
1B Describe the concepts of defensive technologies
in creating a layered defense.
1C Describe the objectives of access control
methods.
1D Identify the impact of a layered defense on the
performance of the network.
1E Define concepts of auditing in a network.
Topic 1A: Describe Network Defense
Five Key Issues of Network Security
Malicious threats
– authorized or unauthorized users
– intentional or un-intentional
– internal or external
Network Security Administrators Must:
• access control
• authentication
• authentication tokens
Access Control
Passwords
Biometrics
Authentication Token
PIN
11 step process
Time Based Tokens
utilizes an authentication technique where the
security token and the security server use an
identical algorithm.
RSA SecureID Token
Software Tokens
Firewalls
Encryption
Passwords
IDS
Auditing
Firewalls
• Entry point in a properly designed network
• Jobs performed
– Packet filtering
– Network address translation
– Proxy services
• Disadvantages
– May block access to essential resources
– Latency
Encryption
Considerations
– more bandwidth
– extra workload
Passwords
Considerations
– administrators must educate users
– generating easy to remember passwords
Intrusion Detection Systems
Considerations
– filtering the proper packets to examine
– false alarms
– slower response
Auditing
Considerations
– logging the proper information
– attacker’s hiding their tracks
Task 1D-1: Describing the Problems of
Additional Layers of Security
Operational audit
– usually done by internal resources to examine
operational and on-going activities within a
network system for compliance with an
established security policy
Independent Audit
Privacy of individuals