Beruflich Dokumente
Kultur Dokumente
Network Security
Objetives
Describe general methods for mitigating security threats Explain Security Policies Configure Basic Router Security Disable unused router network services and interfaces
Phreaker! manipulates the phone network to perform an unauthori#ed function" Spammer! sends large $uantities of unsolicited e% mail messages" Phisher! tricks others into providing sensitive information
*orm! malware that can spread itself automatically Spyware! malware that collects information about
users without their knowledge
Sophisticated attack tools and open networks have created an increased need for network security and dynamic security policies
Security Po icy
+nforms about obligatory re$uirements Specifies the mechanisms through which these re$uirements can be met Provides a baseline ,ust me!
Clear Specific Written in ordinay language
Security Threats
.etwork
Protocol
Operating System Network e uipment
Physical
!ardware
"n#iromental "lectrical $aintance
Security Threats
/nstructured Structured External +nternal
"ttacks
Reconnaisance!
%nternet ueries& ping sweeps& port scans and packet sniffers
-ccess
Password attack& 'rust "(plotation& Port redirection& $an)in)the)middle
Denial of Service
*oS& *doS& Ping of *eath& S+N ,lood& Smurf -ttack& Papa Smurf -ttack& ,raggel -ttack
Mitigation Techni#ues
Default usernames and passwords should be changed" -ccess to system resources should be restricted" -ny unnecessary services and applications should be turned off and0or uninstalled"
Mitigation Techni#ues
Sa$eguar% a router
,anage router security Secure remote access 2ogging router activity Secure vulnerable router services and interfaces Secure routing protocols Control and filter network traffic
Passwords configuration
-#oid dictionary
words Com.ine letters& num.ers& and sym.ols/ $ake passwords lengthy/
Secure &)3
Similar to RIP
,i e systems
-ackup )OS
.pgra%e )OS
)OS &ecovery
)OS &ecovery
)OS &ecovery