Module 1 Flashcards
Reasons for Network Security
Network security breaches can
disrupt e-commerce,
cause the loss of business data,
threaten people’s privacy, and
compromise the integrity of information.
These breaches can result in
lost revenue for corporations,
theft of intellectual property,
lawsuits, and
can even threaten public safety.
provides comprehensive security and threat intelligence to defend customers and protect their assets.
Cisco Talos Intelligence Group website
responsible for investigating and mitigating potential vulnerabilities in Cisco products.
Cisco Product Security Incident Response Team (PSIRT)
An ___ is a path by which a threat actor can gain access to a server, host, or network. _____
originate from inside or outside the corporate network, as shown in the figure.
attack vector
An internal user, such as an employee, can accidentally or intentionally:
Steal and copy confidential data to removable media, email, messaging software, and other media.
Compromise internal servers or network infrastructure devices.
Disconnect a critical network connection and cause a network outage.
Connect an infected USB drive into a corporate computer system.
____ have the potential to cause greater damage than ___ because internal users have direct access to the building and its infrastructure devices. Employees may also have knowledge of the corporate network, its resources, and its confidential data.
Internal threats than external threats
is likely to be an organization’s most valuable asset.
Data
Organizational data can include
research and development data,
sales data,
financial data,
human resource and legal data,
employee data,
contractor data, and
customer data.
is when data is intentionally or unintentionally lost, stolen, or leaked to the outside world.
Data loss, or data exfiltration,
The data loss can result in:
Brand damage and loss of reputation
Loss of competitive advantage
Loss of customers
Loss of revenue
Litigation/legal action that results in fines and civil penalties
Significant cost and effort to notify affected parties and recover from the breach
Various ____ controls must be implemented that combine strategic, operational, and tactical measures.
Data Loss Prevention (DLP)
data loss vectors are
Email/Social Networking
Unencrypted Devices
Cloud Storage Devices
Removable Media
Hard Copy
Improper Access Control
The most common vector for data loss includes instant messaging software and social media sites. For instance, intercepted email or IM messages could be captured and reveal confidential information.
Email/Social Networking
A stolen corporate laptop typically contains confidential organizational data. If the data is not stored using an encryption algorithm, then the thief can retrieve valuable confidential data.
Unencrypted Devices
Saving data to the cloud has many potential benefits. However, sensitive data can be lost if access to the cloud is compromised due to weak security settings.
Cloud Storage Devices
One risk is that an employee could perform an unauthorized transfer of data to a USB drive. Another risk is that a USB drive containing valuable corporate data could be lost.
Removable Media
Corporate data should be disposed of thoroughly. For example, confidential data should be shredded when no longer required. Otherwise, a thief could retrieve discarded reports and gain valuable information.
Hard Copy
Passwords are the first line of defense. Stolen passwords or weak passwords which have been compromised can provide an attacker easy access to corporate data.
Improper Access Control
__ consists of interconnected LANs within a limited geographic area.
Campus Area Networks
Connections to untrusted networks must be checked in-depth by multiple layers of defense before reaching enterprise resources.
This is known as defense-in-depth.
The Cisco Integrated Services Router is secured. It protects data in motion that is flowing from the CAN to the outside world by establishing _____. ___ ensure data confidentiality and integrity from authenticated sources.
Virtual Private Networks (VPNs). VPNs
performs stateful packet filtering to filter return traffic from the outside network into the campus network.
ASA Firewall
A Cisco Adaptive Security Appliance (ASA) firewall
continuously monitors incoming and outgoing network traffic for malicious activity. It logs information about the activity, and attempts to block and report it.
IPS
A Cisco Intrusion Prevention System (IPS) device
These distribution layer switches are secured and provide secure redundant trunk connections to the Layer 2 switches. Several different security features can be implemented, such as ACLs, DHCP snooping, Dynamic ARP Inspection (DAI), and IP source guard.
Layer 3 Switches
These access layer switches are secured and connect user-facing ports to the network. Several different security features can be implemented, such as port security, DHCP snooping, and 802.1X user authentication.
Layer 2 Switches
provide advanced threat defense, application visibility and control, reporting, and secure mobility to secure and control email and web traffic.
ESA/WSA
A Cisco Email Security Appliance (ESA) and Web Security Appliance (WSA)
authenticates users, authorizes what they are allowed to do, and tracks what they are doing.
AAA Server
An authentication, authorization, and accounting (AAA) server