You are on page 1of 41

Chapter 11:

Managing a Secure Network

CCNA Security v2.0


11.0 Introduction
11.1 Network Security Testing
11.2 Developing a
Comprehensive Security Policy
11.3 Summary

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 2
Upon completion of this section, you should be able to:
• Describe the techniques used in network security testing.

• Describe the tools used in network security testing.

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 3
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 4
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 5
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 6
Operational Status of the Network:
• Penetration testing

• Network scanning

• Vulnerability scanning

• Password cracking

• Log review

• Integrity checks

• Virus detection

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 7
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 8
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 9
• Nmap/Zenmap

• SuperScan

• SIEM

• GFI LANguard

• Tripwire

• Nessus

• L0phtCrack

• Metasploit

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 10
Sample Nmap Screenshot Sample Zenmap Screenshot

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 11
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 12
Essential functions:
• Forensic Analysis

• Correlation

• Aggregation

• Retention

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 13
Upon completion of this section, you should be able to:
• Explain the purpose of a comprehensive security policy.

• Describe the structure of a comprehensive security policy.

• Describe the standards, guidelines, and procedures of a security policy.

• Explain the roles and responsibilities entailed by a security policy.

• Explain security awareness and how to achieve through education and training.

• Explain how to respond to a security breach.

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 14
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 15
Determine what the assets of an organization are by asking:
• What does the organization have that others want?

• What processes, data, or information systems are critical to the


organization?
• What would stop the organization from doing business or fulfilling its
mission?

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 16
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 17
Audience Determines Security Policy Content

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 18
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 19
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 20
A governing policy includes:
• Statement of the issue that the policy addresses

• How the policy applies in the environment

• Roles and responsibilities of those affected by the policy

• Actions, activities, and processes that are allowed (and not allowed)

• Consequences of noncompliance

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 21
Technical components:
• General policies

• Telephony policy

• Email and communication policy

• Remote access policy

• Network policy

• Application policy

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 22
Customize End-User Policies for Groups

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 23
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 24
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 25
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 26
NIST Information Technology Portal

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 27
NSA Website

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 28
Common Criteria Website

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 29
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 30
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 31
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 32
• Chief Executive Officer (CEO) • Chief Security Officer (CSO)

• Chief Technology Officer (CTO) • Chief Information Security


Officer (CISO)
• Chief Information Officer (CIO)

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 33
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 34
Primary components:
• Awareness campaigns

• Training and education

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 35
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 36
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 37
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 38
Chapter Objectives:
• Explain the various techniques and tools used for network security testing.

• Explain how to develop a comprehensive security policy.

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 39
Thank you.
• Remember, there are
helpful tutorials and user
guides available via your
NetSpace home page. 1
(https://www.netacad.com) 2
• These resources cover a
variety of topics including
navigation, assessments,
and assignments.
• A screenshot has been
provided here highlighting
the tutorials related to
activating exams, managing
assessments, and creating
quizzes.

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 41

You might also like