Podcast
Questions and Answers
Which of these is an example of an inside perimeter security measure?
Which of these is an example of an inside perimeter security measure?
- Fences and gates
- On-premise security officers
- Electronic motion detectors (correct)
- Continuous video surveillance
Which of the following is NOT a title associated with modern hacking?
Which of the following is NOT a title associated with modern hacking?
- Script Kiddies
- State-Sponsored Hackers
- Cyber Investigators (correct)
- Vulnerability Brokers
What type of tool would be used to identify vulnerabilities in a system?
What type of tool would be used to identify vulnerabilities in a system?
- Packet Sniffer
- Vulnerability Scanner (correct)
- Packet crafter
- Rootkit detector
Which of the following is a tool that can be used for network scanning and hacking?
Which of the following is a tool that can be used for network scanning and hacking?
Which of the following is a security measure used on the outside perimeter?
Which of the following is a security measure used on the outside perimeter?
Which of the following is NOT identified as a common network security term?
Which of the following is NOT identified as a common network security term?
Which of these is LEAST likely to be a vector of data loss?
Which of these is LEAST likely to be a vector of data loss?
Which type of network is often associated with large organizations in a single geographical area?
Which type of network is often associated with large organizations in a single geographical area?
What is the PRIMARY purpose of 'mitigation', within the context of network security?
What is the PRIMARY purpose of 'mitigation', within the context of network security?
Which of these is MOST likely to be a characteristic of a Wide Area Network (WAN)?
Which of these is MOST likely to be a characteristic of a Wide Area Network (WAN)?
Which of the following is a network hacking attack that involves intercepting network traffic?
Which of the following is a network hacking attack that involves intercepting network traffic?
Which type of malware is characterized by its ability to self-replicate and spread across networks?
Which type of malware is characterized by its ability to self-replicate and spread across networks?
A Trojan horse that disables security software falls under which classification?
A Trojan horse that disables security software falls under which classification?
What is the initial phase of the Code Red worm's activity?
What is the initial phase of the Code Red worm's activity?
Which of these is NOT a typical component of a worm?
Which of these is NOT a typical component of a worm?
Which of the following is a type of malware?
Which of the following is a type of malware?
What is the primary goal of a reconnaissance attack?
What is the primary goal of a reconnaissance attack?
Which of the following is considered an access attack?
Which of the following is considered an access attack?
Which of these techniques is commonly used in social engineering attacks?
Which of these techniques is commonly used in social engineering attacks?
In the context of DDoS attacks, what are compromised computers called?
In the context of DDoS attacks, what are compromised computers called?
A 'vulnerability' is a weakness that can be exploited to cause harm to a network or system.
A 'vulnerability' is a weakness that can be exploited to cause harm to a network or system.
Email and webmail are not considered a vector of data loss.
Email and webmail are not considered a vector of data loss.
Small office and home office networks don't typically need security protections as they rarely have valuable data.
Small office and home office networks don't typically need security protections as they rarely have valuable data.
Unencrypted devices are not a significant vector for data loss.
Unencrypted devices are not a significant vector for data loss.
A 'threat' is an event that has the potential to cause harm to a network system.
A 'threat' is an event that has the potential to cause harm to a network system.
Ransomeware is a form of malware.
Ransomeware is a form of malware.
A smurf attack is a type of access attack.
A smurf attack is a type of access attack.
A 'port scan' is a form of a reconnaissance attack.
A 'port scan' is a form of a reconnaissance attack.
Man-in-the-middle attacks are an example of password attacks.
Man-in-the-middle attacks are an example of password attacks.
In a DDoS attack, infected machines are referred to as 'handlers'.
In a DDoS attack, infected machines are referred to as 'handlers'.
Fences and gates are a form of inside perimeter security.
Fences and gates are a form of inside perimeter security.
Script kiddies are considered a modern hacking title.
Script kiddies are considered a modern hacking title.
Password crackers can be used as penetration testing tools.
Password crackers can be used as penetration testing tools.
Security traps are an example of outside perimeter security.
Security traps are an example of outside perimeter security.
State-sponsored hackers are not considered a modern hacking title.
State-sponsored hackers are not considered a modern hacking title.
Eavesdropping is a type of network hacking attack.
Eavesdropping is a type of network hacking attack.
A proxy Trojan horse is one that aims to disable user security software.
A proxy Trojan horse is one that aims to disable user security software.
Data modification involves changing data in transit or at rest.
Data modification involves changing data in transit or at rest.
Worms require user interaction to spread from one device to another.
Worms require user interaction to spread from one device to another.
A 'sniffer' is a tool used to analyze network traffic and capture data.
A 'sniffer' is a tool used to analyze network traffic and capture data.
Flashcards
Network Threat
Network Threat
Any potential danger to a network's security, including malware, unauthorized access, and data breaches.
Vulnerability
Vulnerability
A weakness in a network's security that can be exploited by attackers.
Mitigation
Mitigation
Actions taken to reduce the risk of a threat exploiting a vulnerability.
Risk
Risk
Signup and view all the flashcards
Campus Area Network (CAN)
Campus Area Network (CAN)
Signup and view all the flashcards
Script Kiddies
Script Kiddies
Signup and view all the flashcards
Vulnerability Brokers
Vulnerability Brokers
Signup and view all the flashcards
Hacktivists
Hacktivists
Signup and view all the flashcards
Cyber Criminals
Cyber Criminals
Signup and view all the flashcards
State-Sponsored Hackers
State-Sponsored Hackers
Signup and view all the flashcards
Worm
Worm
Signup and view all the flashcards
Trojan Horse
Trojan Horse
Signup and view all the flashcards
Virus
Virus
Signup and view all the flashcards
Denial-of-service Attack
Denial-of-service Attack
Signup and view all the flashcards
Man-in-the-middle Attack
Man-in-the-middle Attack
Signup and view all the flashcards
Denial of Service (DoS) Attacks
Denial of Service (DoS) Attacks
Signup and view all the flashcards
Distributed Denial of Service (DDoS) Attacks
Distributed Denial of Service (DDoS) Attacks
Signup and view all the flashcards
Access Attacks
Access Attacks
Signup and view all the flashcards
Reconnaissance Attacks
Reconnaissance Attacks
Signup and view all the flashcards
Phishing
Phishing
Signup and view all the flashcards
What is a worm?
What is a worm?
Signup and view all the flashcards
What is a security software disabler Trojan Horse?
What is a security software disabler Trojan Horse?
Signup and view all the flashcards
What is the propagation mechanism of a worm?
What is the propagation mechanism of a worm?
Signup and view all the flashcards
What is a Trojan Horse?
What is a Trojan Horse?
Signup and view all the flashcards
What is a remote-access Trojan?
What is a remote-access Trojan?
Signup and view all the flashcards
Current Network Security Landscape
Current Network Security Landscape
Signup and view all the flashcards
Why all networks need protection
Why all networks need protection
Signup and view all the flashcards
Social Engineering Attack
Social Engineering Attack
Signup and view all the flashcards
Study Notes
Chapter 1: Modern Network Security Threats
- This chapter covers modern network security threats.
- The course is CCNA Security v2.0, taught by Dr. Nadhir Ben Halima.
- The course is part of the Cisco Networking Academy.
Chapter Outline
- Introduction to network security
- Securing networks
- Network threats
- Mitigating threats
- Summary
Section 1.1: Securing Networks
- Upon completion, students should be able to:
- Describe the current network security landscape.
- Explain why all types of networks need protection.
Topic 1.1.1: Current State of Affairs
- Networks are targets
- Attacks originate from various countries
- Various types of attacks occur
Topic 1.1.2: Network Topology Overview
- Campus Area Networks (CANs)
- Diagram shows a CAN with AAA servers, firewalls, VPN, IPS, Layer 3/2 switches, DHCP server, web server, email server, and hosts.
- Small Office and Home Office (SOHO) networks illustrated
- Diagram shows a SOHO network with a wireless router, a layer 2 switch, and wireless hosts, a desktop and printer
- Wide Area Networks (WANs)
- Diagram displays a WAN with branch sites, a POP, regional sites, Cisco ASA firewall, a mobile worker, a Corporate site and a SOHO site.
- Data Center Networks (DCNs)
- Includes outside perimeter security (security officers, fences, gates, video surveillance, alarms)
- Inside perimeter security (motion detectors, traps, video surveillance, biometric sensors)
Section 1.2: Network Threats
- Students should be able to:
- Describe the evolution of network security
- Describe various attack tools used by hackers
- Describe malware
- Explain common network attacks
Topic 1.2.1: Who is Hacking Our Networks?
- Different types of hackers:
- Script Kiddies
- Vulnerability Brokers
- Hacktivists
- Cyber Criminals
- State-Sponsored Hackers
Topic 1.2.2: Hacker Tools
- Different types of hacker tools
- Sophistication of attacker tools has increased over time.
- Sophistication of attacker tools from 1985 to 2015 has steadily increased
Topic 1.2.3: Malware
- Definition of virus
- Illustration of a virus diagram showing the network and computers
- Illustration of how a worm executes arbitrary code and installs copies of itself in the memory
- Illustration of a trojan horse attacking a device from within
- Illustration of a Trojan Horse diagram showing the various types of attacks
- Various types of malware:
- Viruses
- Worms
- Code Red Worm example, a worm's propagation
- Trojans Horses
- Spyware
- Rootkits
- Adware
Topic 1.2.4: Common Network Attacks
-
Various types of network attacks:
- Data modification
- Reconnaissance
- Denial-of-Service(DoS)
- Syn Flood
- Smurf Attack
- Reconnaissance Attacks
- Initial query of a target network
- Ping sweep of the target network
- Port scan of active IP addresses
- Vulnerability scanners
- Exploitation tools
- Access Attacks
- Password
- Port Redirection
- Man-in-the-middle
- Buffer overflow
- IP, MAC, DHCP spoofing
- Social Engineering Attacks
- Pretexting
- Phishing
- Spearphishing
- Spam
- Tailgating
- Something for Something
-
DDoS attacks.
-
DDoS attack is a distributed denial-of-service attack performed by a botnet
-
Botnet terminology: The compromised computers are called zombies, controlled by a handler system.
Section 1.3: Mitigating Threats
- Students will learn methods and resources to protect networks.
- Domains of network security
- Methods to mitigate common network attacks
- Securing the three functional areas of Cisco routers and switches.
Topic 1.3.1: Defending the Network
- Best practices for network defense:
- Develop a written security policy
- Educate employees about risks of social engineering
- Control physical access to systems
- Implement security hardware
- Perform backups
- Shut down unnecessary services
- Keep software up-to-date
- Perform security audits
Topic 1.3.2: Domains of Network Security
- Domains of network security:
- Risk assessment
- Security policy
- Organization of information security
- Asset management
- Human resources security
- Physical and environmental security
- Communications and operations management
- Information systems acquisition, development, and maintenance
- Access control
- Information security incident management
- Business continuity management
- Compliance
Topic 1.3.3: Cisco Network Foundation Protection Framework
- Framework diagram displays the control plane, management plane, and data plane
Topic 1.3.4: Mitigating Common Network Threats
- Summary of mitigation techniques
- Techniques to mitigate malware
- Techniques to mitigate common network threats
- Techniques for mitigating various other attacks, such as worms and DoS
Topic 1.3.5: Network Security Policy Objectives
- Questions to consider:
- What do you have that others want?
- What are critical data or information systems?
- What would stop an organization from fulfilling its mission?
Section 1.4: Summary
- Summary of network security concepts, attacks, and mitigation techniques are included
- Chapter objectives are restated
Additional Considerations
- Network security professionals and organizations are discussed
- Confidentiality, integrity, and availability (CIA) of a network are also addressed
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.