SlideShare a Scribd company logo
CISCO SELF DEFENDING NETWORK 2012
Homework Help
https://www.homeworkping.com/
Research Paper help
https://www.homeworkping.com/
Online Tutoring
https://www.homeworkping.com/
click here for freelancing tutoring sites
A
CASE STUDY
ON
“Cisco Self-Defending Network”
Submitted By
Amit S. Pate Roll No.
Ganesh B. Darekar Roll No.
T.Y.I.T.
IN PARTIAL FULL-FILLMENT OF
SEMISTER 6
UNDER THE GUIDENCE OF
Mr.Roshni Patil
DEPT. OF INFORMATION TECHNOLOGY
DEPARTMENT OF I.T 1 S.H.MUTHA, KALYAN
CISCO SELF DEFENDING NETWORK 2012
SETH HIRACHAND MUTHA COLLEGE
KALYAN
Under
UNIVERSITY OF MUMBAI
YEAR 2011-2012
CERTIFICATE
This is to certify that
Amit s. pate roll no.
Of S.Y.I.T has submitted report on “Cisco Self-Defending Network”
under my guidance and supervision. The work has done to my
satisfaction in partial fulfilment of T.Y.Bsc.I.T as prescribed by the
University Of Mumbai during the academic year 2011-2012.
DEPARTMENT OF I.T 2 S.H.MUTHA, KALYAN
CISCO SELF DEFENDING NETWORK 2012
EXAMINAR HEAD OF DEPARTMENT
(Information Technology)
INDEX
TOPIC PAGE NO.
1. What is networking 4
2. Introduction 5
3. Overview of CISCO networking-system 6
4. Security solution 7
5. Self defending network 8
6. Component of CSDN 9
7. Security standard 10
8. Future of CSDN 13
9. Conclusion: 13
Bibliography 14
DEPARTMENT OF I.T 3 S.H.MUTHA, KALYAN
CISCO SELF DEFENDING NETWORK 2012
1. What are (Wireless / Computer) Networking?
In the world of computers, networking is the practice of linking two or
more computing devices together for the purpose of sharing data.
Networks are built with a mix of computer hardware and computer
software.
If your business has more than one computer, chances are you could
benefit from networking them. A local area network (LAN) connects
your company's computers, allowing them to share and exchange a
variety of information. While one computer can be useful on its own,
several networked computers can be much more useful.
DEPARTMENT OF I.T 4 S.H.MUTHA, KALYAN
CISCO SELF DEFENDING NETWORK 2012
2. Introduction
Takeaway: The need for security is more important than ever in the
business world. It's tough to decide how much to invest and what
solutions to choose, but you must ensure that your network is reasonably
secure. Here is an attempt made by us to explain the Cisco’s Self-
Defending Network.
If you're a cynical consumer, the Cisco Self-Defending Network (CSDN)
solution probably begs the sarcastic question: "Yeah, right; the network
that can just defend itself?" However, as Cisco typically makes quality
products and solutions, I can't believe that the self-defending network
concept is all bad; actually, it may even be the best solution on the market
today.
DEPARTMENT OF I.T 5 S.H.MUTHA, KALYAN
CISCO SELF DEFENDING NETWORK 2012
3. What is Security?
While taking advantage of the possibility of defining strict rules of
communication inside the network one must achieve a satisfactory level
of security.
This involves a suitable distribution of roles among the systems. In
this case hacking into one of the barriers won't compromise the whole
network; such a hack will be limited to several devices or systems. For
instance, breaking the first firewall will not cause a catastrophe. The
hacker would only have access to the network cards of the web servers
which have been placed outside and that have been protected as well as
possible. In this case the servers' protection may be pushed to the limit
because they only keep the URL's data; therefore the process will be
efficient. In effect, the only threat to the whole system is to be flooded
with unfiltered TCP/UDP/ICMP packets of the published network cards
of the web servers. Of course, despite the existence of the firewall barrier
the attack may be addressed directly at the web servers, with the use of
the newest (or most fashionable) gap in the IIS security locks.
This case is a bit more dangerous but besieging a single server is
no victory for the hacker because all of the server-database connections
run in trusted mode. This means that there is no APS site that could give
DEPARTMENT OF I.T 6 S.H.MUTHA, KALYAN
CISCO SELF DEFENDING NETWORK 2012
the attacker a password or account enabling him to penetrate the system
further. On the other hand, there is a good chance that another server
from the NLB cluster would answer the attacker's query, causing slight
confusion. The attacker can't even dream of going further, to any of the
DMZ servers which only work in the internal network (SQL, DC, etc.).
The correct hardening process of the external systems makes sending
their packets into the network impossible. Please notice how far the
aggressor is from the trusted internal network, the true heart of the
system. Attack attempts from the corporation network are not definitely
successful because a good set of rules does not allow direct
Why look at security solutions in the first place?
Since every business today depends on the Internet and LAN networks
for some business critical function, the need for security is more
important than ever. A company that does not have strong security can
end up on the news as being hacked, their stock can plummet, and they
can be out of business in no time. Once released, viruses and worms can
hit businesses and consumers around the world in a matter of seconds or
minutes.
However, you and your company don't have unlimited funds; you can't
just put in every solution you discover. You have to weigh the level of
investment in security with the level of risk that is perceived by your
business. It's tough to decide how much to invest and what solutions to
choose, but you must ensure that your network is reasonably secure.
DEPARTMENT OF I.T 7 S.H.MUTHA, KALYAN
CISCO SELF DEFENDING NETWORK 2012
A secured network connection of Cisco
4. What is the Self-Defending Network?
The CSDN is a large complex roadmap made up of many Cisco
components. You aren't required to have all the components. CSDN does
its job using all these different components. Examples of these
components are: Cisco NAC (admission control); Cisco Security Agent
(endpoint protection); Cisco MARS (event correlation); Network
Intrusion Detection System (NIDS); authentication servers; Anti-X
systems like ASA and Iron port; network and host-based firewalls; and
antivirus.
The theory of CSDN is that the network has the ability and the
intelligence to protect itself from threats. However, this can only happen
if the components of the network are working together to ensure this level
of security, intelligence, and adaptability.
DEPARTMENT OF I.T 8 S.H.MUTHA, KALYAN
CISCO SELF DEFENDING NETWORK 2012
5. How do the components of the CSDN work
together?
In Figure A, you can see how the components of the CSDN are all over
the network. Every link, piece of hardware, and operating system is
somehow secured by the CSDN. By covering all the bases, CSDN
attempts to thwart security issues wherever they crop up in the network.
In addition, the attempt of the CSDN is to provide end-to-end visibility of
the network's security events and status.
Figure A
DEPARTMENT OF I.T 9 S.H.MUTHA, KALYAN
CISCO SELF DEFENDING NETWORK 2012
Graphic courtesy of Cisco.
Network devices must work together and be integrated in order for the
CSDN to do its job. Therefore, you probably aren't going to have third-
party network components on your network participate in the CSDN.
6. Besides hardware components, what else is
involved in CDSN?
While you can buy all the network hardware components you like,
software and services are also a huge part of CSDN. Just as with anything
else, without the people (services), the hardware isn't going to implement
itself. Once the CSDN is implemented and the servicemen are gone, the
network will still need to be monitored and maintained.
DEPARTMENT OF I.T 10 S.H.MUTHA, KALYAN
CISCO SELF DEFENDING NETWORK 2012
Cisco offers a lot of services revolving around the Self-Defending
Network. Figure B illustrates these offerings:
Figure B
Graphic courtesy of Cisco.
As you can see, Cisco offers services beginning with planning the
network, moving through designing, implementing, and operating the
network. Later, Cisco can come back and optimize the implemented
security systems.
While this all sounds great, I would caution anyone evaluating a security
solution to determine how much time and effort will be required to
implement and maintain that solution. Undoubtedly, the long-term
DEPARTMENT OF I.T 11 S.H.MUTHA, KALYAN
CISCO SELF DEFENDING NETWORK 2012
maintenance of any security system is far greater than the original price
tag.
7. How are credentials fundamental for network
security?
When it comes to the implementation of the CSDN, user and device
credentials are very important. The user and device credentials are used to
identify that device and to authenticate the user.
DEPARTMENT OF I.T 12 S.H.MUTHA, KALYAN
CISCO SELF DEFENDING NETWORK 2012
In Figure C, you can see how the device identification is checked, then
the operating system and application posture, and the user identity, based
on username, password, and security certificate keys.
Figure C
As you can see, user and device credentials are critical to the success of
CSDN.
8. Where are the security standards in CSDN?
There are a number of standards at work in the CSDN roadmap. One of
the most crucial technologies related to the CSDN is Network Admission
Control (NAC). NAC is used to review device security posture before
DEPARTMENT OF I.T 13 S.H.MUTHA, KALYAN
CISCO SELF DEFENDING NETWORK 2012
admission to the network. In many cases, this is done with 802.1X;
however, that is only part of what NAC does and how it works.
The battle between Cisco's NAC and Microsoft's new Network Access
Protection (NAP) is about to heat up. Fortunately for consumers, both
companies have agreed that there will be some compatibilities and
interoperability between these two technologies. In the end, there are
many standards at work in creating this self-defending network.
What is the future of CSDN?
A complex framework, CDSN has a goal for all of their devices to
communicate together, preventing any danger to the network. The theory
is that the devices will collaborate, with one device telling another that it
is in danger. In my mind, the thought of many different hardware and
software network security devices all working together sounds almost too
good to be true.
However, devices still don't easily integrate with other Cisco security
devices, as they aren't easy to implement and are typically expensive.
Even though the CSDN framework has been around for over six years,
there's still a lot of work left to be done before networks can truly be self-
defending
BIBLIOGRAPHY:
1. www.cisco.com/self_defending _network
2. www.google.com
DEPARTMENT OF I.T 14 S.H.MUTHA, KALYAN
CISCO SELF DEFENDING NETWORK 2012
3. www.wikipedia.com
4. Tanenbaum, Computer Networks [144-216].
Homework Help
https://www.homeworkping.com/
Math homework help
https://www.homeworkping.com/
Research Paper help
https://www.homeworkping.com/
Algebra Help
https://www.homeworkping.com/
Calculus Help
https://www.homeworkping.com/
Accounting help
https://www.homeworkping.com/
Paper Help
https://www.homeworkping.com/
Writing Help
https://www.homeworkping.com/
Online Tutor
https://www.homeworkping.com/
Online Tutoring
https://www.homeworkping.com/
DEPARTMENT OF I.T 15 S.H.MUTHA, KALYAN

More Related Content

PDF
IoT Solutions for Smart Energy Smart Grid and Smart Utility Applications
PPTX
Module 5 Wireless Network Design Considerations
PDF
DELL Technologies - The IoT Value Chain - Solutions for the Smart World - Del...
PDF
Setting off the 5G Advanced evolution with 3GPP Release 18
PPTX
333731522-GPON-Technical-v1-1.pptx
PDF
“Introducing the Kria Robotics Starter Kit: Robotics and Machine Vision for S...
PPTX
Programming with arduino
PPTX
Introduction to SDN and NFV
IoT Solutions for Smart Energy Smart Grid and Smart Utility Applications
Module 5 Wireless Network Design Considerations
DELL Technologies - The IoT Value Chain - Solutions for the Smart World - Del...
Setting off the 5G Advanced evolution with 3GPP Release 18
333731522-GPON-Technical-v1-1.pptx
“Introducing the Kria Robotics Starter Kit: Robotics and Machine Vision for S...
Programming with arduino
Introduction to SDN and NFV

What's hot (20)

PPTX
Components of IOT Implementation
PDF
Cisco Catalyst 9000 Switching Family
PPT
Internet Of Things
PDF
Software Defined WAN – SD-WAN
PDF
Aruba presentation solutions overview - v1
PDF
SD WAN Overview | What is SD WAN | Benefits of SD WAN
PDF
Huawei GPON Fundamentals
PPTX
IoT
PDF
An Introduction to IoT: Connectivity & Case Studies
PDF
5G and Internet of Things (IoT)
DOCX
Report File On RedTacton
PDF
Huawei ipran solution
PDF
LPWAN Technologies for Internet of Things (IoT) and M2M Scenarios
PDF
Security challenges in IoT
DOCX
optical switch
PPTX
PPTX
Near Field Communiation
PPT
WIRELESS SENSOR NETWORK
PDF
Zynq ultrascale
Components of IOT Implementation
Cisco Catalyst 9000 Switching Family
Internet Of Things
Software Defined WAN – SD-WAN
Aruba presentation solutions overview - v1
SD WAN Overview | What is SD WAN | Benefits of SD WAN
Huawei GPON Fundamentals
IoT
An Introduction to IoT: Connectivity & Case Studies
5G and Internet of Things (IoT)
Report File On RedTacton
Huawei ipran solution
LPWAN Technologies for Internet of Things (IoT) and M2M Scenarios
Security challenges in IoT
optical switch
Near Field Communiation
WIRELESS SENSOR NETWORK
Zynq ultrascale
Ad

Similar to 85320337 networking-case-study (20)

PDF
Advance security in cloud computing for military weapons
PDF
Presentation cisco cloud security
PDF
Cisco VMDC Cloud Security 1.0 Design Guide
PDF
Cisco VMDC Cloud Security 1.0 Design Guide
PPTX
Blockchain in cyber security
DOCX
Mca5042 cryptography and network security
PDF
A STUDY ON ADOPTION OF BLOCKCHAIN TECHNOLOGY IN CYBERSECURITY
PDF
Using Cisco’s VMDC to help facilitate PCI compliance
PDF
The Challenge of Integrating Security Solutions with CI.pdf
PPTX
SOMETHING INTANGIBLE, BUT REAL ABOUT CYBERSECURITY
PDF
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
PDF
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
PDF
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
PDF
5 benefits that ai gives to cloud security venkat k - medium
PDF
2021 01-27 reducing risk of ransomware webinar
PDF
DTS Solution - ISACA UAE Chapter - ISAFE 2014 - RU PWNED - Living a Life as a...
PDF
Handout1o
PDF
UniCredit Business Integrated Solutions
PDF
Private sector cyber resilience and the role of data diodes
PDF
SECURITY IN COULD DATA STORAGE USING SOFT COMPUTING TECHNIQUES AND ELGAMAL CR...
Advance security in cloud computing for military weapons
Presentation cisco cloud security
Cisco VMDC Cloud Security 1.0 Design Guide
Cisco VMDC Cloud Security 1.0 Design Guide
Blockchain in cyber security
Mca5042 cryptography and network security
A STUDY ON ADOPTION OF BLOCKCHAIN TECHNOLOGY IN CYBERSECURITY
Using Cisco’s VMDC to help facilitate PCI compliance
The Challenge of Integrating Security Solutions with CI.pdf
SOMETHING INTANGIBLE, BUT REAL ABOUT CYBERSECURITY
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
5 benefits that ai gives to cloud security venkat k - medium
2021 01-27 reducing risk of ransomware webinar
DTS Solution - ISACA UAE Chapter - ISAFE 2014 - RU PWNED - Living a Life as a...
Handout1o
UniCredit Business Integrated Solutions
Private sector cyber resilience and the role of data diodes
SECURITY IN COULD DATA STORAGE USING SOFT COMPUTING TECHNIQUES AND ELGAMAL CR...
Ad

More from homeworkping3 (20)

ODT
238304497 case-digest
DOCX
238247664 crim1 cases-2
DOC
238234981 swamping-and-spoonfeeding
DOCX
238218643 jit final-manual-of-power-elx
DOCX
238103493 stat con-cases-set
DOC
238097308 envi-cases-full
DOCX
238057402 forestry
DOCX
238057020 envi-air-water
DOC
238056086 t6-g6
DOC
238019494 rule-06-kinds-of-pleadings
DOC
237978847 pipin-study-7
DOC
237968686 evs-1
DOCX
237962770 arthur-lim-et-case
DOC
237922817 city-cell
DOC
237778794 ethical-issues-case-studies
DOC
237768769 case
DOCX
237754196 case-study
DOC
237750650 labour-turnover
DOCX
237712710 case-study
DOCX
237654933 mathematics-t-form-6
238304497 case-digest
238247664 crim1 cases-2
238234981 swamping-and-spoonfeeding
238218643 jit final-manual-of-power-elx
238103493 stat con-cases-set
238097308 envi-cases-full
238057402 forestry
238057020 envi-air-water
238056086 t6-g6
238019494 rule-06-kinds-of-pleadings
237978847 pipin-study-7
237968686 evs-1
237962770 arthur-lim-et-case
237922817 city-cell
237778794 ethical-issues-case-studies
237768769 case
237754196 case-study
237750650 labour-turnover
237712710 case-study
237654933 mathematics-t-form-6

Recently uploaded (20)

PPTX
Cell Types and Its function , kingdom of life
PPTX
Institutional Correction lecture only . . .
PDF
2.FourierTransform-ShortQuestionswithAnswers.pdf
PDF
01-Introduction-to-Information-Management.pdf
PPTX
GDM (1) (1).pptx small presentation for students
PDF
VCE English Exam - Section C Student Revision Booklet
PDF
Computing-Curriculum for Schools in Ghana
PDF
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
PDF
O7-L3 Supply Chain Operations - ICLT Program
PDF
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
PDF
STATICS OF THE RIGID BODIES Hibbelers.pdf
PDF
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
PPTX
Final Presentation General Medicine 03-08-2024.pptx
PPTX
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
PPTX
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
PDF
OBE - B.A.(HON'S) IN INTERIOR ARCHITECTURE -Ar.MOHIUDDIN.pdf
PPTX
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
PDF
A systematic review of self-coping strategies used by university students to ...
PPTX
Presentation on HIE in infants and its manifestations
PDF
Abdominal Access Techniques with Prof. Dr. R K Mishra
Cell Types and Its function , kingdom of life
Institutional Correction lecture only . . .
2.FourierTransform-ShortQuestionswithAnswers.pdf
01-Introduction-to-Information-Management.pdf
GDM (1) (1).pptx small presentation for students
VCE English Exam - Section C Student Revision Booklet
Computing-Curriculum for Schools in Ghana
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
O7-L3 Supply Chain Operations - ICLT Program
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
STATICS OF THE RIGID BODIES Hibbelers.pdf
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
Final Presentation General Medicine 03-08-2024.pptx
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
OBE - B.A.(HON'S) IN INTERIOR ARCHITECTURE -Ar.MOHIUDDIN.pdf
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
A systematic review of self-coping strategies used by university students to ...
Presentation on HIE in infants and its manifestations
Abdominal Access Techniques with Prof. Dr. R K Mishra

85320337 networking-case-study

  • 1. CISCO SELF DEFENDING NETWORK 2012 Homework Help https://www.homeworkping.com/ Research Paper help https://www.homeworkping.com/ Online Tutoring https://www.homeworkping.com/ click here for freelancing tutoring sites A CASE STUDY ON “Cisco Self-Defending Network” Submitted By Amit S. Pate Roll No. Ganesh B. Darekar Roll No. T.Y.I.T. IN PARTIAL FULL-FILLMENT OF SEMISTER 6 UNDER THE GUIDENCE OF Mr.Roshni Patil DEPT. OF INFORMATION TECHNOLOGY DEPARTMENT OF I.T 1 S.H.MUTHA, KALYAN
  • 2. CISCO SELF DEFENDING NETWORK 2012 SETH HIRACHAND MUTHA COLLEGE KALYAN Under UNIVERSITY OF MUMBAI YEAR 2011-2012 CERTIFICATE This is to certify that Amit s. pate roll no. Of S.Y.I.T has submitted report on “Cisco Self-Defending Network” under my guidance and supervision. The work has done to my satisfaction in partial fulfilment of T.Y.Bsc.I.T as prescribed by the University Of Mumbai during the academic year 2011-2012. DEPARTMENT OF I.T 2 S.H.MUTHA, KALYAN
  • 3. CISCO SELF DEFENDING NETWORK 2012 EXAMINAR HEAD OF DEPARTMENT (Information Technology) INDEX TOPIC PAGE NO. 1. What is networking 4 2. Introduction 5 3. Overview of CISCO networking-system 6 4. Security solution 7 5. Self defending network 8 6. Component of CSDN 9 7. Security standard 10 8. Future of CSDN 13 9. Conclusion: 13 Bibliography 14 DEPARTMENT OF I.T 3 S.H.MUTHA, KALYAN
  • 4. CISCO SELF DEFENDING NETWORK 2012 1. What are (Wireless / Computer) Networking? In the world of computers, networking is the practice of linking two or more computing devices together for the purpose of sharing data. Networks are built with a mix of computer hardware and computer software. If your business has more than one computer, chances are you could benefit from networking them. A local area network (LAN) connects your company's computers, allowing them to share and exchange a variety of information. While one computer can be useful on its own, several networked computers can be much more useful. DEPARTMENT OF I.T 4 S.H.MUTHA, KALYAN
  • 5. CISCO SELF DEFENDING NETWORK 2012 2. Introduction Takeaway: The need for security is more important than ever in the business world. It's tough to decide how much to invest and what solutions to choose, but you must ensure that your network is reasonably secure. Here is an attempt made by us to explain the Cisco’s Self- Defending Network. If you're a cynical consumer, the Cisco Self-Defending Network (CSDN) solution probably begs the sarcastic question: "Yeah, right; the network that can just defend itself?" However, as Cisco typically makes quality products and solutions, I can't believe that the self-defending network concept is all bad; actually, it may even be the best solution on the market today. DEPARTMENT OF I.T 5 S.H.MUTHA, KALYAN
  • 6. CISCO SELF DEFENDING NETWORK 2012 3. What is Security? While taking advantage of the possibility of defining strict rules of communication inside the network one must achieve a satisfactory level of security. This involves a suitable distribution of roles among the systems. In this case hacking into one of the barriers won't compromise the whole network; such a hack will be limited to several devices or systems. For instance, breaking the first firewall will not cause a catastrophe. The hacker would only have access to the network cards of the web servers which have been placed outside and that have been protected as well as possible. In this case the servers' protection may be pushed to the limit because they only keep the URL's data; therefore the process will be efficient. In effect, the only threat to the whole system is to be flooded with unfiltered TCP/UDP/ICMP packets of the published network cards of the web servers. Of course, despite the existence of the firewall barrier the attack may be addressed directly at the web servers, with the use of the newest (or most fashionable) gap in the IIS security locks. This case is a bit more dangerous but besieging a single server is no victory for the hacker because all of the server-database connections run in trusted mode. This means that there is no APS site that could give DEPARTMENT OF I.T 6 S.H.MUTHA, KALYAN
  • 7. CISCO SELF DEFENDING NETWORK 2012 the attacker a password or account enabling him to penetrate the system further. On the other hand, there is a good chance that another server from the NLB cluster would answer the attacker's query, causing slight confusion. The attacker can't even dream of going further, to any of the DMZ servers which only work in the internal network (SQL, DC, etc.). The correct hardening process of the external systems makes sending their packets into the network impossible. Please notice how far the aggressor is from the trusted internal network, the true heart of the system. Attack attempts from the corporation network are not definitely successful because a good set of rules does not allow direct Why look at security solutions in the first place? Since every business today depends on the Internet and LAN networks for some business critical function, the need for security is more important than ever. A company that does not have strong security can end up on the news as being hacked, their stock can plummet, and they can be out of business in no time. Once released, viruses and worms can hit businesses and consumers around the world in a matter of seconds or minutes. However, you and your company don't have unlimited funds; you can't just put in every solution you discover. You have to weigh the level of investment in security with the level of risk that is perceived by your business. It's tough to decide how much to invest and what solutions to choose, but you must ensure that your network is reasonably secure. DEPARTMENT OF I.T 7 S.H.MUTHA, KALYAN
  • 8. CISCO SELF DEFENDING NETWORK 2012 A secured network connection of Cisco 4. What is the Self-Defending Network? The CSDN is a large complex roadmap made up of many Cisco components. You aren't required to have all the components. CSDN does its job using all these different components. Examples of these components are: Cisco NAC (admission control); Cisco Security Agent (endpoint protection); Cisco MARS (event correlation); Network Intrusion Detection System (NIDS); authentication servers; Anti-X systems like ASA and Iron port; network and host-based firewalls; and antivirus. The theory of CSDN is that the network has the ability and the intelligence to protect itself from threats. However, this can only happen if the components of the network are working together to ensure this level of security, intelligence, and adaptability. DEPARTMENT OF I.T 8 S.H.MUTHA, KALYAN
  • 9. CISCO SELF DEFENDING NETWORK 2012 5. How do the components of the CSDN work together? In Figure A, you can see how the components of the CSDN are all over the network. Every link, piece of hardware, and operating system is somehow secured by the CSDN. By covering all the bases, CSDN attempts to thwart security issues wherever they crop up in the network. In addition, the attempt of the CSDN is to provide end-to-end visibility of the network's security events and status. Figure A DEPARTMENT OF I.T 9 S.H.MUTHA, KALYAN
  • 10. CISCO SELF DEFENDING NETWORK 2012 Graphic courtesy of Cisco. Network devices must work together and be integrated in order for the CSDN to do its job. Therefore, you probably aren't going to have third- party network components on your network participate in the CSDN. 6. Besides hardware components, what else is involved in CDSN? While you can buy all the network hardware components you like, software and services are also a huge part of CSDN. Just as with anything else, without the people (services), the hardware isn't going to implement itself. Once the CSDN is implemented and the servicemen are gone, the network will still need to be monitored and maintained. DEPARTMENT OF I.T 10 S.H.MUTHA, KALYAN
  • 11. CISCO SELF DEFENDING NETWORK 2012 Cisco offers a lot of services revolving around the Self-Defending Network. Figure B illustrates these offerings: Figure B Graphic courtesy of Cisco. As you can see, Cisco offers services beginning with planning the network, moving through designing, implementing, and operating the network. Later, Cisco can come back and optimize the implemented security systems. While this all sounds great, I would caution anyone evaluating a security solution to determine how much time and effort will be required to implement and maintain that solution. Undoubtedly, the long-term DEPARTMENT OF I.T 11 S.H.MUTHA, KALYAN
  • 12. CISCO SELF DEFENDING NETWORK 2012 maintenance of any security system is far greater than the original price tag. 7. How are credentials fundamental for network security? When it comes to the implementation of the CSDN, user and device credentials are very important. The user and device credentials are used to identify that device and to authenticate the user. DEPARTMENT OF I.T 12 S.H.MUTHA, KALYAN
  • 13. CISCO SELF DEFENDING NETWORK 2012 In Figure C, you can see how the device identification is checked, then the operating system and application posture, and the user identity, based on username, password, and security certificate keys. Figure C As you can see, user and device credentials are critical to the success of CSDN. 8. Where are the security standards in CSDN? There are a number of standards at work in the CSDN roadmap. One of the most crucial technologies related to the CSDN is Network Admission Control (NAC). NAC is used to review device security posture before DEPARTMENT OF I.T 13 S.H.MUTHA, KALYAN
  • 14. CISCO SELF DEFENDING NETWORK 2012 admission to the network. In many cases, this is done with 802.1X; however, that is only part of what NAC does and how it works. The battle between Cisco's NAC and Microsoft's new Network Access Protection (NAP) is about to heat up. Fortunately for consumers, both companies have agreed that there will be some compatibilities and interoperability between these two technologies. In the end, there are many standards at work in creating this self-defending network. What is the future of CSDN? A complex framework, CDSN has a goal for all of their devices to communicate together, preventing any danger to the network. The theory is that the devices will collaborate, with one device telling another that it is in danger. In my mind, the thought of many different hardware and software network security devices all working together sounds almost too good to be true. However, devices still don't easily integrate with other Cisco security devices, as they aren't easy to implement and are typically expensive. Even though the CSDN framework has been around for over six years, there's still a lot of work left to be done before networks can truly be self- defending BIBLIOGRAPHY: 1. www.cisco.com/self_defending _network 2. www.google.com DEPARTMENT OF I.T 14 S.H.MUTHA, KALYAN
  • 15. CISCO SELF DEFENDING NETWORK 2012 3. www.wikipedia.com 4. Tanenbaum, Computer Networks [144-216]. Homework Help https://www.homeworkping.com/ Math homework help https://www.homeworkping.com/ Research Paper help https://www.homeworkping.com/ Algebra Help https://www.homeworkping.com/ Calculus Help https://www.homeworkping.com/ Accounting help https://www.homeworkping.com/ Paper Help https://www.homeworkping.com/ Writing Help https://www.homeworkping.com/ Online Tutor https://www.homeworkping.com/ Online Tutoring https://www.homeworkping.com/ DEPARTMENT OF I.T 15 S.H.MUTHA, KALYAN