© 2000, Cisco Systems, Inc. CSPFF 1.111-1 Chapter 1 Network Security and the Cisco Secure PIX Firewall.

Презентация:



Advertisements
Похожие презентации
© 2001, Cisco Systems, Inc. CSIDS Chapter 2 Introduction to Network Security.
Advertisements

© 2003, Cisco Systems, Inc. All rights reserved. CSPFA Chapter 2 Network Security and Cisco.
© 2000, Cisco Systems, Inc. CSPFF Chapter 2 Cisco Secure PIX Firewall Models and Features.
Designing Security Services © 2004 Cisco Systems, Inc. All rights reserved. Evaluating Network Security Policies ARCH v
© 2003, Cisco Systems, Inc. All rights reserved. CSPFA Chapter 3 Cisco PIX Firewall Technology and Features.
© 2000, Cisco Systems, Inc. CSPFF Chapter 8 Configuration of Multiple Interfaces.
© 2000, Cisco Systems, Inc. 7-1 Chapter 7 Access Configuration Through the Cisco Secure PIX Firewall.
© 2000, Cisco Systems, Inc. CSPFF Chapter 5 Cisco Secure PIX Firewall Configuration.
© 2004, Cisco Systems, Inc. All rights reserved. CSPFA Lesson 3 Cisco PIX Firewall Technology and Features.
© 2001, Cisco Systems, Inc. CSIDS Chapter 10 IP Blocking Configuration.
© 2007 Cisco Systems, Inc. All rights reserved.DESGN v Security Design Review Define the security requirements. Define the security policy. Integrate.
© 1999, Cisco Systems, Inc. 2-1 Network Security Threats Chapter 2.
© 2001, Cisco Systems, Inc. CSIDS Cisco Secure Intrusion Detection System 2.0.
Chapter 7: Planning Ethernet VLANs 7-1 Copyright © 1998, Cisco Systems, Inc.
Copyright 2003 CCNA 4 Chapter 22 Developing Network Security and Network Management Strategies By Your Name.
© 2006 Cisco Systems, Inc. All rights reserved.ISCW v IPsec VPNs Implementing the Cisco VPN Client.
© 2006 Cisco Systems, Inc. All rights reserved. HIPS v Configuring Rules Configuring System Correlation Rules.
© 2000, Cisco Systems, Inc. CSPFF 1.11Intro-1 Introduction.
Chapter 13: Monitoring Device Availability 13-1 Copyright © 1998, Cisco Systems, Inc.
© 2003, Cisco Systems, Inc. All rights reserved. CSVPN Lesson 7 Configure the Cisco VPN Firewall Feature for IPSec Software Client.
Транксрипт:

© 2000, Cisco Systems, Inc. CSPFF Chapter 1 Network Security and the Cisco Secure PIX Firewall

© 2000, Cisco Systems, Inc. CSPFF Objectives Upon completion of this chapter, you will be able to perform the following tasks: State the reasons for securing computer networks. Define computer hacking and describe the four primary threats associated with that activity. Define the four primary types of threats against network security. Describe the three primary methods of attack against todays computer networks. Describe the purpose of the Security Wheel.

© 2000, Cisco Systems, Inc. CSPFF Network Security

© 2000, Cisco Systems, Inc. CSPFF Network Security Is Essential Network security is essential because the Internet has made networked computers accessible and vulnerable.

© 2000, Cisco Systems, Inc. CSPFF Network Security Threats There are four primary threats to network security: Unstructured threats Structured threats External threats Internal threats

© 2000, Cisco Systems, Inc. CSPFF Three Primary Network Attacks There are three types of network attacks: Reconnaissance attacks Access attacks Denial of service attacks

© 2000, Cisco Systems, Inc. CSPFF Network Security as a Continuous Process Network security is a continuous process built around a security policy. Step 1: Secure Step 2: Monitor Step 3: Test Step 4: Improve Secure Monitor Test Improve Security Policy

© 2000, Cisco Systems, Inc. CSPFF Secure Monitor Test Improve Security Policy Secure the Network Implement security solutions to stop or prevent unauthorized access or activities, and to protect information. Authentication Encryption Firewalls Vulnerability Patching

© 2000, Cisco Systems, Inc. CSPFF Secure Monitor Test Improve Security Policy Monitor Security Detects violations to the security policy Involves system auditing and real-time intrusion detection Validates the security implementation in Step 1

© 2000, Cisco Systems, Inc. CSPFF Secure Monitor Test Improve Security Policy Test Security Validates effectiveness of the security policy through system auditing and vulnerability scanning

© 2000, Cisco Systems, Inc. CSPFF Secure Monitor Test Improve Security Policy Improve Security Use information from the monitor and test phases to make improvements to the security implementation. Adjust the security policy as security vulnerabilities and risks are identified.

© 2000, Cisco Systems, Inc. CSPFF Summary

© 2000, Cisco Systems, Inc. CSPFF Summary Network security is essential because networked computers are accessible and vulnerable from any computer in the world. There are four primary threats to network security: unstructured threats, structured threats, external threats, and internal threats. There are three types of network attacks: reconnaissance attacks, access attacks, and denial of service attacks. The Security Wheel is the graphical representation of security as a continuous process.

© 2000, Cisco Systems, Inc. CSPFF Review Questions

© 2000, Cisco Systems, Inc. CSPFF Review Questions Q1) Why is there a need for network security? Q2) Why should network security be a continuous process? Q3) Define the term hacking. Q4) Name and describe the three primary types of network attacks. Q5) Name the four steps of the Security Wheel.