Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

Securing The Network: Building A Simple Network

Download as pdf or txt
Download as pdf or txt
You are on page 1of 10

Securing the

Network

Building a Simple Network

http://vnexperts.net

ICND1 v1.01-1

Closed Networks

Attacks from inside the network remain a threat.


http://vnexperts.net

ICND1 v1.01-2

Open Networks

http://vnexperts.net

ICND1 v1.01-3

Threat Capabilities
More Dangerous and Easier to Use

http://vnexperts.net

ICND1 v1.01-4

E-Business Challenge

http://vnexperts.net

ICND1 v1.01-5

Adversaries, Adversary Motivations, and


Classes of Attack
Adversaries

Motivations

Classes of Attack

Nation-states

Intelligence

Passive

Terrorists

Theft

Active

Criminals

DoS

Close-in

Hackers

Embarrassment

Insider

Crackers

Challenge

Distributed

Competitors
Script kiddies
Disgruntled
employees
Government
http://vnexperts.net

ICND1 v1.01-6

Common Threats
Physical installations
Hardware threats
Environmental threats
Electrical threats
Maintenance threats
Reconnaissance attacksLearning information about a target
network by using readily available information and applications
Access attacksAttacks on networks or systems for these reasons:
Retrieve data
Gain access
Escalate their access privileges
Password attacksTools used by hackers to compromise
passwords
http://vnexperts.net

ICND1 v1.01-7

Password Attack Threat Mitigation


Here are password attack threat-mitigation techniques:
Do not allow users to use the same password on multiple
systems.
Disable accounts after a certain number of unsuccessful login
attempts.
Do not use cleartext passwords.
Use strong passwords; for example, mY8!Rthd8y rather than
mybirthday.

http://vnexperts.net

ICND1 v1.01-8

Summary
Sophisticated attack tools and open networks continue to
generate an increased need for network security policies and
infrastructure to protect organizations from internally and
externally based attacks.
Organizations must balance network security needs against
e-business processes, legal issues, and government policies.
Establishing a network security policy is the first step in changing
a network over to a secure infrastructure.
Network adversaries come in many shapes and sizes and with
multiple motivations.

http://vnexperts.net

ICND1 v1.01-9

Summary (Cont.)
It is very important to provide physical installation security for
enterprise network devices.
Password attack threats can be mitigated.
Restrict password use.
Disable accounts after unsuccessful logins.
Do not use cleartext passwords; use strong passwords.

http://vnexperts.net

ICND1 v1.01-10

You might also like