- 13
- 0
- 约2.67万字
- 约 87页
- 2015-10-01 发布于河南
- 举报
Cisco 网络安全部署 PPT 内部员工培训材料.ppt
Deploying Secure Networks Session 2502 What You Can Expect to Learn “Network security is a system” Detailed network attack methodology Threat mitigation options Network security design components Specific optimizations to existing infrastructure Deploying Secure Networks Security Threat Components Security Design—an Example Design Under Fire Threat Mitigation Design Optimizations Security Design—a Better Example Design Under Fire (2) Distributed Denial of Service (DDoS) Smurf Attack DDoS, How Does It Work? Stacheldraht Attack Stacheldraht Attack Stacheldraht Transport Details Root Kits Application Layer Attacks Port Redirection Attack Deploying Secure Networks Security Threat Components Security Design—an Example Design Under Fire Threat Mitigation Design Optimizations Security Design—a Better Example Design Under Fire (2) How Is Enterprise Security Deployed Today? Access Router ACL (no State Inbound s0) Firewall Rules Design Considerations Dual “firewall” configuration Inbound traffic limited to relevant services on DMZ SSH allowed for encrypted remote administration Open internal network Full outbound access allowed (no traditional FTP) Deploying Secure Networks Security Threat Components Security Design—an Example Design Under Fire Threat Mitigation Design Optimizations Security Design—a Better Example Design Under Fire (2) Bring on the Hackers! Network Recon “Own” a System Exploit Trust Get the Goods! “Own” the Network “Own” the Network Past the firewall No more security More recon Vulnerability exploits Hacker has a new playground! Crunchy on the Outside…Soft in the Middle Distributed Denial of Service Attack Phase 1: Setup Distribution Network Phase 2: Pick a Target and Attack Setup a Distribution Net Attack! Client coordinates attack Victim bandwidth is quickly eliminated Attack Review Network compromise was completely successful Firewall acted as configured Vulnerabilities started at the host level via an out of date system Network DDoS was completely
您可能关注的文档
- china-10-sichuan_v1_m56577569830510996.pdf
- china-10-tianjin_v1_m56577569830510997.pdf
- china-10-yunnan_v1_m56577569830511000.pdf
- china-10-zhejiang_v1_m56577569830511001.pdf
- China-Air-Quality-Paper-July-2016.pdf
- China-Global-Investment-Tracker.xls
- China-index-of-housing-affordability-by-City-UPDATED.pdf
- China-Japan.doc
- China-Pharmaceutical-Industry-Report.pdf
- china-us space coop crs.pdf
- 2026《面向多样性的隐私保护推荐方法概述》7800字.docx
- 2026《基于PLC的智能立体停车场的控制系统设计》7200字.docx
- 2026《太赫兹技术概述》4200字.docx
- 2026《分布式电力系统经济调度研究现状国内外文献综述》2800字.docx
- 2026《曲美家具集团股份有限公司成本管理存在的问题及对策》5600字.docx
- 2026《基于肌肉信号的人体运动研究国内外文献综述》3400字.doc
- 2026《基于城市林学植物配置问题研究》7200字.docx
- 2026《社区重点人群管理平台设计与实现》7900字.docx
- 2026《区县医院内网的设计与实施研究》6900字.doc
- 2026《静电除尘的原理及高频电源的优势综述》3100字.doc
原创力文档

文档评论(0)