Coconote
AI notes
AI voice & video notes
Try for free
🔐
Network Security Fundamentals Overview
Oct 9, 2024
CCNA Cisco Netacad: Network Security Fundamentals
Introduction
Focus on:
Configuring switches and routers for security
Security threats and vulnerabilities
Network attacks and mitigation
Device security
Security Threats and Vulnerabilities
Types of Threats
Information Theft
: Unauthorized access to confidential information (e.g., social insurance numbers).
Data Loss and Manipulation
: Destroying or altering data records (e.g., changing grades or reformatting hard drives).
Identity Theft
: Stealing personal data to assume someone else's identity. Affects individuals and corporations.
Disruption of Services
: Preventing legitimate access to services (e.g., DDoS attacks).
Types of Vulnerabilities
Technological Vulnerabilities
:
TCP/IP protocol weaknesses
OS security issues
Network equipment weaknesses
Configuration Vulnerabilities
:
Unsecured accounts
Default settings and passwords
Misconfigured services
Security Policy Vulnerabilities
:
Lack of policies
Authentication issues
No disaster recovery plan
Network Attacks
Types of Malware
Viruses
: Attach to executables; need user action to spread.
Worms
: Standalone; exploit vulnerabilities to spread without user help.
Trojan Horses
: Appear legit; create backdoors for unauthorized access.
Types of Network Attacks
Reconnaissance Attacks
: Mapping systems and vulnerabilities.
Access Attacks
: Unauthorized data/system access.
Denial of Service (DoS) Attacks
: Disrupting communication by overwhelming systems.
Access Attack Techniques
Password Attacks
: Brute force, trojans, packet sniffers
Trust Exploitation
: Misuse of privileged access.
Port Redirection
: Using a compromised system to attack others.
Man-in-the-Middle (MitM)
: Intercepting and altering communications.
Network Attack Mitigation
Defense in Depth
VPN
: Secure tunnels for remote access.
Firewalls
: Prevent unauthorized access.
Intrusion Prevention System (IPS)
: Monitors and responds to detected threats.
AAA (Authentication, Authorization, Accounting)
: Control access and track usage.
Security Strategies
Regular updates and patches for OS and software.
Strong and regularly changed passwords.
Encrypting communications (e.g., SSH).
Device Security
Cisco Auto Secure
Default security settings are inadequate; use Auto Secure to enhance security.
Practical Security Measures
Change default usernames and passwords.
Restrict resource access
Disable unnecessary services.
Regular backups stored securely off-site.
Conclusion
Review key points including types of threats, vulnerabilities, network attacks, and mitigation strategies.
Importance of strong security policies and proactive device management.