1. Trang chủ
  2. » Công Nghệ Thông Tin

Chapter 4 – Network Security docx

143 602 0

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

THÔNG TIN TÀI LIỆU

Thông tin cơ bản

Định dạng
Số trang 143
Dung lượng 10,88 MB

Nội dung

1 Chapter 4 Network Security CCNA Exploration 4.0 Học viện mạng Bach Khoa - Website: www.bkacad.com Why is Network Security Important? Vote Bank Medicate Travel Purchase Threat Capabilities Sophistication of Hacker Tools Packet Forging/ Spoofing 2000 19951990 1985 Password Guessing Self Replicating Code Password Cracking Exploiting Known Vulnerabilities Disabling Audits Back Doors Hijacking Sessions Sweepers Sniffers Stealth Diagnostics Technical Knowledge Required High Low Think Like a Attacker Học viện mạng Bach Khoa - Website: www.bkacad.com Step 1: Footprint Analysis Học viện mạng Bach Khoa - Website: www.bkacad.com Step 2: Enumerate Information Học viện mạng Bach Khoa - Website: www.bkacad.com Step 3: Manipulate Users to Gain Access Học viện mạng Bach Khoa - Website: www.bkacad.com Step 4: Escalate Privilege Học viện mạng Bach Khoa - Website: www.bkacad.com Step 5: Gather Additional Password & Secrets Học viện mạng Bach Khoa - Website: www.bkacad.com Step 6: Install Back Doors and Port Redirections Học viện mạng Bach Khoa - Website: www.bkacad.com [...]... Bach Khoa - Website: www.bkacad.com Open Access Network • • • An open security model is the easiest to implement Simple passwords and server security become the foundation of this model If encryption is used, it is implemented by individual users or on servers Học viện mạng Bach Khoa - Website: www.bkacad.com Restrictive Access Network A restrictive security model is more difficult to implement Firewalls... model Học viện mạng Bach Khoa - Website: www.bkacad.com Closed Access Networks • • • A closed security model is most difficult to implement All available security measures are implemented in this design This model assumes that the protected assets are premium, all users are not trustworthy, and that threats are frequent Network security departments must clarify that they only implement the policy,... compliance with the policy Học viện mạng Bach Khoa - Website: www.bkacad.com Developing a Security Policy Học viện mạng Bach Khoa - Website: www.bkacad.com Common Security Threats Học viện mạng Bach Khoa - Website: www.bkacad.com Common Security Threats Học viện mạng Bach Khoa - Website: www.bkacad.com Common Security Threats Học viện mạng Bach Khoa - Website: www.bkacad.com Threats to Physical Infrastructure... Website: www.bkacad.com Developing a Security Policy • A security policy meets these goals: 1 Informs users, staff, and managers of their obligatory requirements for protecting technology and information assets 2 Specifies the mechanisms through which these requirements can be met 3 Provides a baseline from which to acquire, configure, and audit computer systems and networks for compliance with the policy... www.bkacad.com Network Security Threats Học viện mạng Bach Khoa - Website: www.bkacad.com Unstructured threats Học viện mạng Bach Khoa - Website: www.bkacad.com Structured threats Học viện mạng Bach Khoa - Website: www.bkacad.com External threats Học viện mạng Bach Khoa - Website: www.bkacad.com Internal threats Học viện mạng Bach Khoa - Website: www.bkacad.com Social Engineering Types of Network Attacks... Khoa - Website: www.bkacad.com 100% Security “ The only system which is truly secure is one which is switched off and unplugged, locked in a titanium lined safe, buried in a concrete bunker, and is surrounded by nerve gas and very highly paid armed guards Even then, I wouldn’t stake my life on it… Học viện mạng Bach Khoa - Website: www.bkacad.com ” Open versus Closed Networks Học viện mạng Bach Khoa - . 1 Chapter 4 – Network Security CCNA Exploration 4. 0 Học viện mạng Bach Khoa - Website: www.bkacad.com Why is Network Security Important? Vote Bank Medicate Travel Purchase Threat. www.bkacad.com Open versus Closed Networks Học viện mạng Bach Khoa - Website: www.bkacad.com Open Access Network • An open security model is the easiest to

Ngày đăng: 16/03/2014, 08:20

TỪ KHÓA LIÊN QUAN