Security Systems and Technologies
Introduction
2005 Cisco Systems, Inc. All rights reserved. 1
Learning Objectives
The Need for Network Security
Information Security Objectives
Introduction to Vulnerabilities, Threats, and Attacks
Defense mechanisms
2005 Cisco Systems, Inc. All rights reserved. 2
The Closed Network
2005 Cisco Systems, Inc. All rights reserved. 3
The Network Today
2005 Cisco Systems, Inc. All rights reserved. 4
Network Security Models
2005 Cisco Systems, Inc. All rights reserved. 5
Trends that Affect Security
Increase of network attacks
Increased sophistication of attacks
Increased dependence on the network
Lack of trained personnel
Lack of awareness
Lack of security policies
Wireless access
Legislation
Litigation
2005 Cisco Systems, Inc. All rights reserved. 6
Legal and Governmental
Policy Issues
Organizations that operate vulnerable networks
will face increasing and substantial liability.
US Federal legislation mandating security
includes the following:
GLB financial
services legislation
Government Information Security
Reform Act
HIPAA
CIPA
2005 Cisco Systems, Inc. All rights reserved. 7
Security Goals
Confidentiality
Integrity Avaliability
2005 Cisco Systems, Inc. All rights reserved. 8
Security Services
Confidentiality (privacy)
Authentication (who created or sent the data)
Integrity (has not been altered)
Non-repudiation (the order is final)
Access control (prevent misuse of resources)
Availability (permanence, non-erasure)
Denial of Service Attacks
Virus that deletes files
2005 Cisco Systems, Inc. All rights reserved. 9
Network Vulnerabilities
Technology
Configuration
Policy
2005 Cisco Systems, Inc. All rights reserved. 10
Threat CapabilitiesMore
Dangerous and Easier to Use
2005 Cisco Systems, Inc. All rights reserved. 11
Network Threats
There are four general categories of security threats to the
network:
Unstructured threats
Internal
Structured threats
exploitation
Internet Dial-in
External threats exploitation
Internal threats
Compromised
host
2005 Cisco Systems, Inc. All rights reserved. 12
2005 Cisco Systems, Inc. All rights reserved. 13
Security Attacks
2005 Cisco Systems, Inc. All rights reserved. 14
Security Attacks
Interruption: This is an attack on availability
Interception: This is an attack on confidentiality
Modification: This is an attack on integrity
Fabrication: This is an attack on authenticity
2005 Cisco Systems, Inc. All rights reserved. 15
Four Classes of Network Attacks
Reconnaissance attacks
Access attacks
Denial of service attacks
Worms, viruses, and Trojan horses
2005 Cisco Systems, Inc. All rights reserved. 16
Specific Attack Types
All of the following can be used to compromise your system:
Packet sniffers
IP weaknesses
Password attacks
DoS or DDoS
Man-in-the-middle attacks
Application layer attacks
Trust exploitation
Port redirection
Malware
2005 Cisco Systems, Inc. All rights reserved. 17
Methods of Defense
Perimeter defenses: fw, nips, anti-x, apt, etc.
Encryption
Software Controls: hips, dlp, restriction policies,
vulnerability analysis, security monitoring.
Hardware Controls (smartcards, tokens)
Physical Controls
Information Security Policy & Information Security
Management Systems
2005 Cisco Systems, Inc. All rights reserved. 18