Network Security v1.0 - Module 1 (Securing Networks)
Module 1: Securing Networks
Module Objectives:
Explain network security and understand the challenges, tools, and techniques for securing networks.
1.1 Current State of Affairs
Networks are Targets:
Networks are constantly under attack. Real-time data, such as the Kaspersky Cyberthreat Real-Time Map, highlights ongoing attacks.
Reasons for Network Security:
Breaches can disrupt e-commerce, cause data loss, threaten privacy, and damage information integrity.
Cisco Talos Intelligence Group and PSIRT provide insights and mitigate vulnerabilities.
Vectors of Network Attacks:
Attack vectors can come from inside or outside a network. These include threats via the internet leading to Denial of Service (DoS) attacks.
Data Loss:
A critical concern as it can have serious financial and legal consequences.
1.2 Network Topology Overview
Campus Area Networks:
Larger, often regional, networks that require robust security measures for both physical and logical access.
Small Office and Home Office (SOHO) Networks:
Secured with consumer-grade wireless routers that integrate firewalls and WPA2 encryption for wireless security.
Port security is used on Layer 2 switches to secure user-facing ports, and antivirus software is deployed on hosts.
Wide Area Networks (WANs):
Span large geographical areas, often over public internet connections.
Adaptive Security Appliances (ASA) protect WANs by enabling VPN tunnels for secure data transfer.
Data Center Networks:
VPNs and ASA devices secure the connection between remote sites and the data center.
Physical security is crucial, with measures like video surveillance, motion detectors, and biometric access controls.
Cloud Networks and Virtualization:
Virtualization allows cloud computing by separating the hardware from the application.
Security concerns for cloud networks include hyperjacking, antivirus storms, and outdated security policies on virtual machines (VMs).
The Evolving Network Border (BYOD):
The Borderless Network concept is designed to support Bring Your Own Device (BYOD), where users access the network from various locations and devices.
Mobile Device Management (MDM) features include:
Data encryption, PIN enforcement, data wipe, data loss prevention (DLP), and jailbreak/root detection.
1.3 Securing Networks Summary
Network security breaches can severely impact businesses by compromising data integrity and privacy.
Security tools include Cisco devices, VPNs, ASA firewalls, IPS, and AAA servers.
Defense-in-depth approach requires the use of multiple security layers such as firewalls, Layer 3 and Layer 2 switches, and host-level security.
Physical security for data centers involves both outside perimeter and inside perimeter protections.
Cloud VMs are prone to attacks like hyperjacking and instant on activation issues.
Borderless Networks support flexible access via a variety of endpoints and connectivity methods.