Sie sind auf Seite 1von 32

Chapter 4

Network Security

Objetives

Describe general methods for mitigating security threats Explain Security Policies Configure Basic Router Security Disable unused router network services and interfaces

Why is Network Security important?

Security common terms

acker! computer programming expert"


White hat Black hat (Cracker)

Phreaker! manipulates the phone network to perform an unauthori#ed function" Spammer! sends large $uantities of unsolicited e% mail messages" Phisher! tricks others into providing sensitive information

Security common terms

&irus! computer program that can replicate itself and


spread from one computer to another with 'help(

)royan! malware that mas$uerades as a helpful


program or legitame file

*orm! malware that can spread itself automatically Spyware! malware that collects information about
users without their knowledge

Rootkits! software designed to hide the existence of


certain processes or programs

Mitigating Security Threats

Sophisticated attack tools and open networks have created an increased need for network security and dynamic security policies

Security Po icy

+nforms about obligatory re$uirements Specifies the mechanisms through which these re$uirements can be met Provides a baseline ,ust me!
Clear Specific Written in ordinay language

Security Po icy! components


)itle -udience ,onitor Set of rules Conse$uences of violations

Security Threats

.etwork
Protocol
Operating System Network e uipment

Physical
!ardware
"n#iromental "lectrical $aintance

Security Threats
/nstructured Structured External +nternal

"ttacks

Reconnaisance!
%nternet ueries& ping sweeps& port scans and packet sniffers

-ccess
Password attack& 'rust "(plotation& Port redirection& $an)in)the)middle

Denial of Service
*oS& *doS& Ping of *eath& S+N ,lood& Smurf -ttack& Papa Smurf -ttack& ,raggel -ttack

Mitigation Techni#ues

Default usernames and passwords should be changed" -ccess to system resources should be restricted" -ny unnecessary services and applications should be turned off and0or uninstalled"

Mitigation Techni#ues

1or host and servers!


-nti#irus ,irewall OS Patches

1or the network!


$onitoring *etection and pre#ention

Network Security Whee

Sa$eguar% a router

,anage router security Secure remote access 2ogging router activity Secure vulnerable router services and interfaces Secure routing protocols Control and filter network traffic

Manage &outer Security

Passwords configuration
-#oid dictionary
words Com.ine letters& num.ers& and sym.ols/ $ake passwords lengthy/

Secure &emote "ccess

Prevent logins on unused lines

Secure &emote "ccess

Control +ncoming &)3 -ccess

Secure &emote "ccess

Secure &)3

'ogging &outer "ctivity

Registre router activity at logging server

Secure (u nerab e &outer Protoco s

Secure (u nerab e &outer )nter$aces

Secure &outing Protoco s! &)P

Secure &outing Protoco ! *)+&P


Equal to RIP

Similar to RIP

Secure &outing Protoco ! OSP,

,i e systems

-ackup )OS

.pgra%e )OS

)OS &ecovery

)OS &ecovery

)OS &ecovery

Das könnte Ihnen auch gefallen