Please enable JavaScript.
Coggle requires JavaScript to display documents.
Chapter 1. Modern Network Security Threats (4. Common Network Security…
Chapter 1. Modern Network Security Threats
What is Network security about?
Network security involves protocol, technologies, devices, tools and techniques
to secure data and mitigate threats
Network security professionals
attempt to prevent potential attacks while minimizing the effects of real-time attacks
Networks are targets
a company called
Norse Dark
Intelligence maintains an interactive display of current network attacks on
honeypot servers
These servers are decoys purposely deployed by organizations wishing to study how hackers compromise systems.
http://map.norsecorp.com/
CISCO's network administrator tools
Cisco Security Intelligence Operations (
SIO
)
Provides
alerts
to network professionals regarding current network attacks. For more info:
https://tools.cisco.com/security/center/home.x
4. Common Network Security Terms
Vulnerability
This defined as a
exploitable weakness
or flaw in an asset
Threat
A potential danger.
that in somehow can exploit a vulnerability and cause harm.
Risk
Is the combination of the
likelihood
that a threat exploit a vulnerability, and the
impact
that it carries
Asset
Anything that has
value
to the organization
Control
A countermeasure to reduce risk
5. Vectors of Network Attacks
Attack vectors are
the means that allow the access
of hackers to a computer or computer network
External threats
Many attack vectors originate from outside the corporate network.
For example, attackers may target a network, through the Internet, in an attempt to disrupt network operations and create a denial of service (DoS) attack
Internal threats
Internal users have direct access to the building and its infrastructure devices. Employees also have knowledge of the corporate network, its resources, and its confidential data.
Data Loss
Data loss or data exfiltration is when data is intentionally or unintentionally lost, stolen, or leaked
to the outside world
.
Data Vectors
Improper access control: weak passwords
Email/Social Network: Messages can could be captured and reveal confidential information
Unencrypted devices: A thief can retrieve confidential data.
Cloud storage devices: Sensitive data can be compromised due to weak security settings
Removable media: Transfer of valuable data to a usb drive, Loss valuable data stored in a removable drive.
Hard copy: Confidential data should be shredded when no longer required
Data Loss Prevention (
DLP
) controls must be implemented to protect the organization’s data
Network topology
Campus Area Networks
Consists of
interconnected LANs
within a
limited geographic area.
SOHO
Small Office and Home Office Networks are typically protected using a consumer grade router, such as a Linksys home wireless router.
WANs
Wide Area Networks span a wide geographical area, often over the public Internet.
Network Threats
Hacker
This is a common term used to describe a network attacker.
Someone with a strong interest in computers, who enjoys learning about them and experimenting with them (RFC 2828).
A person who delights in having an intimate understanding of the internal workings of a system, computers and computer networks in particular. The term is often misused in a pejorative context, where "cracker" would be the correct term (RFC 1983).
Hacking started in the 1960s with phone freaking, or
phreaking
At that time, telephone switches used various tones, or tone dialing, to indicate different functions. Early hackers realized that by mimicking a tone using a whistle, they could exploit the phone switches to make free long-distance calls.