DOC PREVIEW
UT Arlington INSY 3303 - Securing Your Network

This preview shows page 1-2-3-23-24-25-26-47-48-49 out of 49 pages.

Save
View full document
View full document
Premium Document
Do you want full access? Go Premium and unlock all 49 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 49 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 49 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 49 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 49 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 49 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 49 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 49 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 49 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 49 pages.
Access to all documents
Download any document
Ad free experience
Premium Document
Do you want full access? Go Premium and unlock all 49 pages.
Access to all documents
Download any document
Ad free experience

Unformatted text preview:

Hands-on Networking FundamentalsUsing Operating System Security FeaturesUsing Operating System Security Features (continued)Using Network Security FeaturesLearning More About SecurityAnatomy of Malicious AttacksStand-Alone Workstation or Server AttacksAttacks Enabled by Access to PasswordsViruses, Worms, and Trojan HorsesDenial of ServiceSource Routing AttackSpoofingE-mail AttackPort ScanningSlide 15Wireless AttacksUnsolicited Commercial E-mailSpywareActivity 11-3: Configuring Cookie Handling in Internet ExplorerSlide 20Inside AttacksSocial Engineering AttacksHow to Protect Your NetworkInstalling UpdatesUsing IP SecurityUsing IP Security (continued)Slide 27Activity 11-6: Configuring IPSec as a Security Policy in Windows ServerSlide 29Establishing Border and Firewall SecuritySlide 31Using Packet FilteringUsing Network Address Translation (NAT)Configuring NAT in Windows ServerSlide 35Activity 11-7: Configuring NAT in Windows ServerConfiguring NAT and a Firewall Using IP Tables in UNIX/LinuxSlide 38Slide 39Deploying ProxiesSlide 41Using Routers for Border SecurityCreating a Demilitarized ZoneConfiguring Operating System FirewallsActivity 11-8: Configure Windows FirewallActivity 11-9: Configure a Firewall in UNIX/LinuxDesigning Security For Home And Office NetworksDesigning a Secure Home NetworkDesigning a Secure Office NetworkHands-on Networking Fundamentals Chapter 11Securing Your NetworkHands-on Networking Fundamentals 2Using Operating System Security Features•Require password protected accounts for logon•Use latest authentication and encryption techniques•Use digital certificates for network communication•Configure permissions for file and folder security•Employ shared resource security, such as share permissionsHands-on Networking Fundamentals 3Using Operating System Security Features (continued)•Set up security policies–Require “strong” passwords for accounts –Lock out accounts after excessive logon attempts•Configure best wireless networking security available •Set up virtual private networks (VPNs) for secure remote communications•Use disaster recovery techniques, such as regular backupsHands-on Networking Fundamentals 4Using Network Security Features•Some combination of network devices and software•Four network-hardening techniques–Design networks around switches and routers •Devices control access to specific portions of a network–Employ network and operating system firewalls –Use star-based network topology, a secure design –Regularly monitor network activityHands-on Networking Fundamentals 5Learning More About Security•Partial list of organizations providing security support–American Society for Industrial Security (ASIS)–Computer Emergency Response Team Coordination Center (CERT/CC)–Forum of Incident Response and Security Teams (FIRST)–InfraGard–Information Security Forum (ISF)–Information Systems Security Association (ISSA)–National Security Institute (NSI)–SysAdmin, Audit, Network, Security (SANS) InstituteHands-on Networking Fundamentals 6Anatomy of Malicious Attacks•Attacks may target operating system, network or both•A partial listing of typical attacks–Stand-alone workstation or server attacks–Attacks enabled by access to passwords–Viruses, worms, Trojan horses, and spyware–Buffer attacks, denial of service–Source routing attacks, port scanning –Spoofing, e-mail attacks, unsolicited commercial e-mail–Wireless attacks–Inside attacks–Social engineeringHands-on Networking Fundamentals 7Stand-Alone Workstation or Server Attacks •Simple attack centers on unattended computer–User may not have logged off before leaving desk–Screen saver with password may not be configured•Servers may also be targets–System administrator steps away without logging off–Unauthorized individual gains access to computer room•Configure screen saver with password •A simple but effective means of gaining protectionHands-on Networking Fundamentals 8Attacks Enabled by Access to Passwords•Guard access with password protected user account•Counter-productive practices–Sharing passwords with others–Displaying password in work area•Sophisticated techniques used to acquire password –Logon to key administrator accounts locally or remotely –Use Domain Name system (DNS) on a network•Find user account name•Attempt access with passwords generated by softwareHands-on Networking Fundamentals 9Viruses, Worms, and Trojan Horses •Virus: unwanted program relayed by disk or file –Can replicate throughout system–Some can cause permanent damage•Virus hoax: e-mail falsely warning of a virus–Intended to cause message forwarding–Generates needless worry and extra traffic•Worm: copies itself or sends itself to other computers•Difference between worm and virus–Worms create new files, viruses infect files and disks•Trojan horse: a malicious program in disguise–Example: Trojan.Idly returns target account/passwordHands-on Networking Fundamentals 10Denial of Service•Also known as DoS attack•Blocks access to network host, Web site or service•Using the local network to launch DoS attacks–Shutdown server via Administrator account–Overrun disk capacity on system without disk quotas•Remote technique: flood network with erroneous data–May be frames or packets with unidentifiable errors –Example: Jolt2 sends packet fragments that cannot be reconstructed•Distributed denial of service (DDoS) attack–Attack computer causes others to send attack packetsHands-on Networking Fundamentals 11Source Routing Attack•Source routing: packet sender specifies precise path–Used for network troubleshooting and on token rings–Example: traceroute utility maps route through network•Source routing attack–Source address and routing data modified–Packet appears to come from a different source•Benefits to attacker –Trust (misplaced) on the network–Access to privately configured network•May use Network Address Translation (NAT)•NAT translates IP private address to public formHands-on Networking Fundamentals 12Spoofing•Address of source packet altered to disguise attacker•Several ways to launch attack–Attacker initiates access to a computer–Attacker appears as legitimate transmission•Spoofing encompasses other types of attacks–Source routing attack –DoS attack flooding host with packets from bogus sourcesHands-on Networking Fundamentals 13E-mail Attack•A variety of


View Full Document

UT Arlington INSY 3303 - Securing Your Network

Download Securing Your Network
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view Securing Your Network and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view Securing Your Network 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?