+ All Categories
Home > Documents > Net+2009CP--P07

Net+2009CP--P07

Date post: 09-May-2017
Category:
Upload: david-williamson
View: 214 times
Download: 0 times
Share this document with a friend
59
Security threats and mitigation Unit objectives Describe and explain common security threats Explain ways to mitigate security threats
Transcript
Page 1: Net+2009CP--P07

Security threats and mitigation

Unit objectives Describe and explain common security

threats Explain ways to mitigate security

threats

Page 2: Net+2009CP--P07

Topic A Topic A: Security threats Topic B: Threat mitigation

Page 3: Net+2009CP--P07

Security threats Technology weaknesses Configuration weaknesses Policy weaknesses Human error or malice

Page 4: Net+2009CP--P07

Technology weaknesses TCP/IP Operating systems Network equipment

Page 5: Net+2009CP--P07

Configuration weaknesses Unsecured accounts System accounts with weak

passwords Internet services Default settings Network equipment Trojan horses Viruses

Page 6: Net+2009CP--P07

Human error and malice Human error

– Accident, ignorance, stress Malice

– Dishonesty– Impersonation– Disgruntled employees– Snoops– DoS attacks– Identify theft

Page 7: Net+2009CP--P07

Viruses, worms, Trojan horses Worms Trojans Zombies and botnets Rootkits

Page 8: Net+2009CP--P07

Activity A-1

Identifying common security threats

Page 9: Net+2009CP--P07

Social engineering Hacking people, not computers Goals include fraud, network intrusion,

espionage, identify theft, disruption Shoulder surfing

Page 10: Net+2009CP--P07

Dumpster diving Phone directories Organizational charts Policy manuals Calendars Outdated hardware System manuals, network diagrams

Page 11: Net+2009CP--P07

Online attacks Instant messenger and e-mail Unwitting employees run code or

applications

Page 12: Net+2009CP--P07

Countermeasures Discard items properly User education and awareness

Page 13: Net+2009CP--P07

Phishing Fraudulent e-mail appears to be from

a trusted sender Clues Countermeasures

Page 14: Net+2009CP--P07

Activity A-2

Discussing social engineering

Page 15: Net+2009CP--P07

Denial of service attacks Consume or disable resources by

flooding systems with TCP/IP packets Attacks hit client computers and

servers

Page 16: Net+2009CP--P07

TCP 3-way handshake

Page 17: Net+2009CP--P07

SYN flood defense

Page 18: Net+2009CP--P07

Smurf attacks Floods a host with ICMP packets Uses third-party network Configure routers to drop specific

ICMP packets

Page 19: Net+2009CP--P07

Ping of death Outdated attack IP packets manipulated to cause

buffer overflows

Page 20: Net+2009CP--P07

Activity A-3

Discussing DoS attacks

Page 21: Net+2009CP--P07

Distributed DoS attacks Attacker uses multiple hosts Handlers Zombies

Page 22: Net+2009CP--P07

DDoS countermeasures Packet filtering Turn off directed broadcasts Block ports

Page 23: Net+2009CP--P07

Activity A-4

Assessing your vulnerability to DDoS attacks

Page 24: Net+2009CP--P07

Man-in-the-middle Web spoofing Information theft TCP hijacking ARP poisoning ICMP redirect DNS poisoning

Page 25: Net+2009CP--P07

Spoofing IP address spoofing ARP poisoning Web spoofing DNS spoofing

Page 26: Net+2009CP--P07

IP address spoofing

1. Attacker identifies a target to be the attack victim and a machine trusted by the victim

2. Attacker determines sequence numbers

3. Victim accepts and responds to spoofed packets

4. Attacker responds

Page 27: Net+2009CP--P07

Activity A-5

Port scanning

Page 28: Net+2009CP--P07

Topic B Topic A: Security threats Topic B: Threat mitigation

Page 29: Net+2009CP--P07

Security policies Acceptable use Due care Privacy Separation of duties Need-to-know information Password management Account expiration Service level agreements How to destroy or dispose of equipment,

media, and printed documents

Page 30: Net+2009CP--P07

Acceptable use Defines how computer and network

resources can be used Protects information and limits

liabilities and legal actions Addresses productivity issues Employees should read and sign

document

Page 31: Net+2009CP--P07

Due care Diligence or care to exercise in a given

circumstance Identifies risks to organization Assesses risks and measures to be

taken to ensure information security

Page 32: Net+2009CP--P07

Privacy Privacy of customer and supplier

information– Contracts– Sales documents– Financial data– Personally identifiable information

Compromised information causes entities to lose trust

Page 33: Net+2009CP--P07

Separation of duties Avoids one person having all

knowledge of a process– Potential for abuse– Knowledge leaves with person

Distribute tasks Document all procedures Security divided into multiple elements

– Each element assigned to different people

Page 34: Net+2009CP--P07

Need to know Sensitive information accessed only

by those who must access Give IT team just enough permissions

to perform duties Give explicit access to those who

need it

Page 35: Net+2009CP--P07

Password management Minimum password length Required characters Reset interval Reuse How users handle Check for weak passwords

Page 36: Net+2009CP--P07

Account expiration Unneeded counts disabled or deleted Disable accounts for extended leaves

Page 37: Net+2009CP--P07

Service-level agreement Contract between service provider and

end user Defines levels of support Documents penalties Covers disaster recovery plans Contingency plans

Page 38: Net+2009CP--P07

Disposal and destruction Degauss magnetic media Zeroize drives Physically destroy media Lock recycle bins Shred or burn documents

Page 39: Net+2009CP--P07

Activity B-1

Creating a security policy

Page 40: Net+2009CP--P07

Human resources policy Document manual procedures for

automated duties Access policies

– ID badges– Keys– Restricted access areas

Personnel management– Hiring process– Employee review and maintenance– Employee termination

Page 41: Net+2009CP--P07

Activity B-2

Creating a human resources policy

Page 42: Net+2009CP--P07

Incident response policy

1. Preparation2. Detection 3. Containment4. Eradication5. Recovery6. Follow-up

Page 43: Net+2009CP--P07

Preparation Have steps in place Balance easy access with effective

controls Identify steps to be taken Acceptable risks Due diligence

Page 44: Net+2009CP--P07

Detection Ask questions and document

responses

Page 45: Net+2009CP--P07

Containment Shut down or take equipment offline Increase monitoring

Page 46: Net+2009CP--P07

Eradication Clean or delete files Restore data

Page 47: Net+2009CP--P07

Recovery Equipment Storage devices Passwords

Page 48: Net+2009CP--P07

Follow up Document process Update existing documents

Page 49: Net+2009CP--P07

Activity B-3

Creating an incident response and reporting policy

Page 50: Net+2009CP--P07

Change management Set of procedures Request for change Approval process RFC scheduled and completed Changes implemented

Page 51: Net+2009CP--P07

Configuration management documentation

Wiring schematics Physical network diagram Logical network diagram Baseline Policies, procedures, and

configurations Regulations

Page 52: Net+2009CP--P07

Activity B-4

Implementing change management

Page 53: Net+2009CP--P07

Education Educate staff about security

– Network administrators– End users

Enables all employees to be part of security team

Enables regular user to see potential security issues or security violation

Customize to provide level of knowledge needed by student– Big picture for end users– Detailed knowledge for administrative users– Exhaustive knowledge for security

administrators

Page 54: Net+2009CP--P07

Communication Identify what information can be

shared and with whom Identify what information can never be

shared Prove identity Social engineering threats

Page 55: Net+2009CP--P07

User awareness Reason for training Security contacts Who to contact about security incidents Actions to take Policies about system account use Policies about system media use Techniques for sanitizing media and hard

copies Maintaining security of accounts Application and data policies Internet, Web, and e-mail policies

Page 56: Net+2009CP--P07

Activity B-5

Identifying the need for user education and training

Page 57: Net+2009CP--P07

Types of training On-the-job Classroom Online

Page 58: Net+2009CP--P07

Activity B-6

Identifying education opportunities and methods

Page 59: Net+2009CP--P07

Unit summary Described and explained common

security threats Explained ways to mitigate security

threats


Recommended