Professional Documents
Culture Documents
Objectives
Describe the threats to network security Explain the goals of network security Describe a layered approach to network defense Explain how network security defenses affect your organization
Disgruntled employees
Motivation: revenge over perceived injustice
Packet monkeys
Block Web-site activities through a distributed denial-ofservice (DDoS) attack
Terrorists
Motivations: political goals, psychological effect
Worm
Replicates repeatedly Self-propagating Can install backdoor or destroy data on disk
Trojan program
Installs malware under guise of performing useful task
Spyware
Can decrease productivity, carry additional malware, use system resources, or steal information Includes adware, tracking cookies, dialers, and spam
Always-on connectivity
Computers are easier to attack because IP address remains the same while connected Remote users connecting to internal network may cause vulnerability
Restrictive policies
Denies all traffic by default To allow a specific type of traffic, a new rule must be placed before the deny all rule
Some programs customize log files and allow searching for items/events
Summary
Network intruders are motivated by various desires
Data; revenge; financial gain; proprietary information for resale
Summary (cont.)
Network security has many several layers of defense Auditing and log files help detect vulnerable points in a system Routers at network perimeter need access control for security Defense affects the entire organization