SlideShare a Scribd company logo
Common network
security issues.
Page 2
Instructor, PACE-IT Program – Edmonds Community College
Areas of Expertise Industry Certifications
 PC Hardware
 Network Administration
 IT Project Management
 Network Design
 User Training
 IT Troubleshooting
Qualifications Summary
Education
 M.B.A., IT Management, Western Governor’s University
 B.S., IT Security, Western Governor’s University
Entrepreneur, executive leader, and proven manger
with 10+ years of experience turning complex issues
into efficient and effective solutions.
Strengths include developing and mentoring diverse
workforces, improving processes, analyzing
business needs and creating the solutions
required— with a focus on technology.
Page 3
– Security issues caused by
misconfigurations.
– Other network security issues.
PACE-IT.
Page 4
Common network security issues.
Page 5
It’s easy to assume that a
network is secured from
threats, while, in reality, it
may be very vulnerable.
A network may actually be vulnerable because of a misconfigured
security setting or because of a common practice within an
organization.
A network may not be as secure as you think due to the ever
changing threat landscape. Nefarious hackers are continually
seeking new exploits that they can use to breach network security
(including possible misconfigurations in network security
settings).
Common network security issues.
Page 6
– Misconfigured firewall and access control
list (ACL).
» A misconfigured firewall and ACL can result in three different
categories of security issues.
• Traffic that should be blocked isn’t, allowing threats in.
• Traffic that shouldn’t be blocked is; this can prevent receiving
vital updates.
• All traffic is blocked; this isn’t necessarily a security issue per
se but is still a misconfiguration.
» To protect against a misconfigured firewall or ACL, thoroughly
test them before putting them into action.
– Misconfigured application.
» A misconfigured application may become a security threat.
• A Web application that does not perform proper validation of
input may lead to a buffer overflow attack. This may lead to a
successful attack on the Web server on which it is hosted.
» Thoroughly testing applications before placing them into service
will mitigate the threat.
Common network security issues.
Page 7
– Unpatched operating system (OS) or
firmware.
» The manufacturers of OSs and hardware firmware will often
produce security patches (or fixes) for vulnerabilities as they
become known.
• An unpatched OS or firmware becomes very vulnerable in
short order and may become a threat to the network.
» Most software makers have an updating service; subscribing to
that service will help to mitigate the threat.
– Open TCP/IP ports.
» Open ports on networks are listening for requests for or by
services, applications, or protocols.
• All open ports are a security vulnerability and there are 65,535
possible ports that may be open.
» A best practice for network security is to specifically close all
unnecessary ports to harden a network.
Common network security issues.
Page 8
– Misconfigured authentication services.
» The TACACS+ and RADIUS services are often used to
authenticate devices and users on networks.
• A misconfiguration of either may lead to a security issue that
allows malicious users to be authenticated to use network
resources.
» Thoroughly reviewing the configuration of authentication
services will help to mitigate the problem. In addition, all default
local accounts should be disabled (these may present a slight
opening for a malicious user to exploit authentication services).
– Active default usernames and passwords.
» Almost all devices and applications come with default
usernames and passwords to ease the setup process.
• If left active, these defaults create a security issue—as they
tend to be well known or are easy to find through simple
research.
» A best practice is to disable all default usernames and
passwords after setting up the device or application.
Common network security issues.
Page 9
Common network security issues.
Page 10
– Malicious users.
» Malicious users may be the single biggest security issue facing
any network and they will fall into one of two categories:
• An untrusted malicious user: an outside entity that has
exploited a security weakness to gain access to network
resources (e.g., a hacker who has breached a database’s
security features to gain access to valuable information).
• A trusted malicious user: a person or entity that has been
explicitly granted access to network resources that then
exploits this trusted position for malicious purposes.
» A best practice is to review log files on a regular basis to see
what resources are being accessed and by whom to help
maintain security.
– Packet sniffers.
» Packet sniffers examine network traffic at a very basic level and
can be used to help in the administration of a network.
• Packet sniffers may also be used by malicious users to see
what protocols and activities are allowed on the network. This
may help them in further attacking the network.
Common network security issues.
Page 11
– Malware.
» It is usually defined as malicious software that has the intent of
causing harm. As a category, malware covers any code based
threat to a network or system.
• Examples of malware include: viruses, Trojans, and spyware.
» To protect against malware, anti-malware applications should
be running on every device. To be proactive, end user
education should also be in place to teach them to recognize
the dangers.
– ICMP (Internet Control Messaging Protocol)
related issues.
» ICMP can be a valuable tool for diagnosing issues on networks,
but it can also become a security vulnerability.
• ICMP can be exploited in a denial-of-service (DoS) type of
attack.
• ICMP can be used to redirect legitimate users to a new
malicious default gateway, possibly resulting in loss of data or
sensitive information.
» It is now a best practice to deny ICMP requests on a router’s
outward facing interface.
Common network security issues.
Page 12
– DoS or distributed DoS (DDoS).
» In an attempt to bring down a network or website, malicious
users will often send thousands (or hundred of thousands) of
requests for services.
• The attackers’ goal is to make that resource unreachable by
legitimate users.
» Many modern firewalls and other network appliances have
been configured to recognize the signature of such an attack
and can take steps to mitigate the results.
– Unintended backdoor access.
» When creating applications, developers often create backdoors
into the programs. Backdoors are a method of accessing an
application or service while bypassing the normal
authentication process. Unfortunately, these backdoors are
sometimes left open after the development process has been
completed. Once these become known, they can be exploited.
• In most cases, the application is listening on a specific port
(e.g., an open port) for a request for access.
» The best mitigation technique is to close all unnecessary ports
on a network.
Common network security issues.
Page 13
– Jamming.
» All wireless networks use radio frequency (RF) channels to
transmit data on the network. It is possible to create enough
interference on the RF channel that it is no longer useable on
the network.
• An attacker will often use jamming when performing a DoS
type attack; however, it can also be used to perform an evil
twin type attack.
» Many of the modern networking standards and devices employ
techniques to mitigate the threat of jamming (e.g., 802.11n and
802.11ac are difficult to jam).
– Banner grabbing.
» Many network devices display banners (displayed
messages)when users are signing into or requesting services
from network devices. These banners can impart information
about the type of device or the type of service that is being
requested.
• This information may be used by a hacker to research
possible exploits.
» The best practice is to disable all unnecessary services and
banners on network devices.
Common network security issues.
Page 14
Common network security issues.
Network security is an ever shifting landscape and some security issues
may be inadvertently created by misconfigurations. Some of these
misconfiguration issues can occur on: firewalls, ACLs, applications,
unpatched OSs or firmware, open TCP/IP ports, and authentication
services. The use of default usernames and passwords is another means
by which a network can be breached.
Topic
Security issues caused by
misconfigurations.
Summary
There are many security issues that face modern networks. Some of these
issues include: malicious users, packet sniffers, malware, ICMP, DoS or
DDoS attacks, unintended backdoor access, jamming, and banner
grabbing. Each of these vulnerabilities can be mitigated, thus hardening the
network.
Other network security
issues.
Page 15
THANK YOU!
This workforce solution was 100 percent funded by a $3 million grant awarded by the
U.S. Department of Labor's Employment and Training Administration. The solution was
created by the grantee and does not necessarily reflect the official position of the U.S.
Department of Labor. The Department of Labor makes no guarantees, warranties, or
assurances of any kind, express or implied, with respect to such information, including
any information on linked sites and including, but not limited to, accuracy of the
information or its completeness, timeliness, usefulness, adequacy, continued availability
or ownership. Funded by the Department of Labor, Employment and Training
Administration, Grant #TC-23745-12-60-A-53.
PACE-IT is an equal opportunity employer/program and auxiliary aids and services are
available upon request to individuals with disabilities. For those that are hearing
impaired, a video phone is available at the Services for Students with Disabilities (SSD)
office in Mountlake Terrace Hall 159. Check www.edcc.edu/ssd for office hours. Call
425.354.3113 on a video phone for more information about the PACE-IT program. For
any additional special accommodations needed, call the SSD office at 425.640.1814.
Edmonds Community College does not discriminate on the basis of race; color; religion;
national origin; sex; disability; sexual orientation; age; citizenship, marital, or veteran
status; or genetic information in its programs and activities.

More Related Content

PPTX
PACE-IT: Common Threats (part 1)
PPTX
PACE-IT: Basic Forensic Concepts
PPTX
PACE-IT: Physical Network Security Control
PPTX
PACE-IT: Common Threats (part 2)
PPTX
PACE-IT: Risk and Security Related Concepts
PPTX
PACE-IT: Common Network Vulnerabilities
PPTX
PACE-IT: Network Hardening Techniques (part 1)
PPTX
PACE-IT, Security+3.4: Summary of Wireless Attacks
PACE-IT: Common Threats (part 1)
PACE-IT: Basic Forensic Concepts
PACE-IT: Physical Network Security Control
PACE-IT: Common Threats (part 2)
PACE-IT: Risk and Security Related Concepts
PACE-IT: Common Network Vulnerabilities
PACE-IT: Network Hardening Techniques (part 1)
PACE-IT, Security+3.4: Summary of Wireless Attacks

What's hot (20)

PPTX
PACE-IT: Network Hardening Techniques (part 3)
PPTX
PACE-IT, Security+1.1: Introduction to Network Devices (part 2)
PPTX
PACE-IT: Network Hardening Techniques (part 2)
PPTX
PACE-IT, Security+ 2.4: Basic Forensic Procedures
PPTX
PACE-IT, Security+2.7: Physical Security and Enviornmental Controls
PPTX
PACE-IT, Security+2.6: Security Related Awareness and Training
PPTX
PACE-IT: Firewall Basics
PPTX
PACE-IT, Security+2.8: Risk Management Best Practices
PPTX
PACE-IT, Security+1.3: Secure Network Design Elements and Components
PPTX
PACE-IT, Security+1.4: Common Network Protocols (part 3)
PPTX
PACE-IT, Security+3.8: Vulnerability Scanning vs Pen Testing
PPTX
PACE-IT: Network Access Control
PPTX
PACE-IT, Security+ 4.3: Solutions to Establish Host Security
PPTX
PACE-IT, Security+1.2: Secure Network Administration Concepts
PPTX
PACE-IT, Security+3.2: Summary of Types of Attacks (part 1)
PPTX
Pace IT - Common Security Threats
PPTX
PACE-IT, Security+ 2.1: Risk Related Concepts (part 1)
PPTX
PACE-IT, Security+1.3: Cloud Concepts
PPTX
PACE-IT, Security+3.5: Types of Application Attacks (part 1)
PPTX
PACE-IT: Common WAN Components and Issues
PACE-IT: Network Hardening Techniques (part 3)
PACE-IT, Security+1.1: Introduction to Network Devices (part 2)
PACE-IT: Network Hardening Techniques (part 2)
PACE-IT, Security+ 2.4: Basic Forensic Procedures
PACE-IT, Security+2.7: Physical Security and Enviornmental Controls
PACE-IT, Security+2.6: Security Related Awareness and Training
PACE-IT: Firewall Basics
PACE-IT, Security+2.8: Risk Management Best Practices
PACE-IT, Security+1.3: Secure Network Design Elements and Components
PACE-IT, Security+1.4: Common Network Protocols (part 3)
PACE-IT, Security+3.8: Vulnerability Scanning vs Pen Testing
PACE-IT: Network Access Control
PACE-IT, Security+ 4.3: Solutions to Establish Host Security
PACE-IT, Security+1.2: Secure Network Administration Concepts
PACE-IT, Security+3.2: Summary of Types of Attacks (part 1)
Pace IT - Common Security Threats
PACE-IT, Security+ 2.1: Risk Related Concepts (part 1)
PACE-IT, Security+1.3: Cloud Concepts
PACE-IT, Security+3.5: Types of Application Attacks (part 1)
PACE-IT: Common WAN Components and Issues
Ad

Viewers also liked (20)

PPTX
Data Network Security
PPTX
Breaking DES
PPT
Network security
PPT
Network security
PPTX
Security
PPTX
Network security
PPT
Network security attacks
PDF
A SERVEY ON WIRELESS SENSOR NETWORK SECURITY ISSUES & CHALLENGES
PPT
Network Security
PPTX
Infomration & network security
PPTX
Data Encryption Standard (DES)
PPTX
Introduction of cryptography and network security
PPTX
RSA algorithm
PPT
DOC
Rsa Algorithm
PPTX
Wireless sensor network security issues
PPTX
Cryptography
PDF
RSA ALGORITHM
Data Network Security
Breaking DES
Network security
Network security
Security
Network security
Network security attacks
A SERVEY ON WIRELESS SENSOR NETWORK SECURITY ISSUES & CHALLENGES
Network Security
Infomration & network security
Data Encryption Standard (DES)
Introduction of cryptography and network security
RSA algorithm
Rsa Algorithm
Wireless sensor network security issues
Cryptography
RSA ALGORITHM
Ad

Similar to PACE-IT: Common Network Security Issues (20)

PPTX
Pace IT - Threats & Vulnerabilities Mitigation
PPTX
PACE-IT, Security+1.1: Introduction to Network Devices (part 3)
PPTX
PACE-IT, Security+3.1: Types of Malware
PPTX
PACE-IT: Introduction_to Network Devices (part 2) - N10 006
PDF
RAMNSS_2016_service_porfolio
PPT
Network Security Tools and applications
PDF
Welcome to International Journal of Engineering Research and Development (IJERD)
PDF
network security.pdf
PDF
Top 25 SOC Analyst interview questions.pdf
PPTX
Network security
PPTX
Network-security-ppt.pptx...............
PPTX
presentation_security_1510578971_320573.pptx
PPTX
network security ppt.pptx
PPT
SegurançA Da InformaçãO Faat V1 4
PDF
Toward Continuous Cybersecurity with Network Automation
PDF
Toward Continuous Cybersecurity With Network Automation
PPT
Information Technology Security Basics
DOCX
Seguridad web -articulo completo- ingles
DOCX
Chapter 10.0
Pace IT - Threats & Vulnerabilities Mitigation
PACE-IT, Security+1.1: Introduction to Network Devices (part 3)
PACE-IT, Security+3.1: Types of Malware
PACE-IT: Introduction_to Network Devices (part 2) - N10 006
RAMNSS_2016_service_porfolio
Network Security Tools and applications
Welcome to International Journal of Engineering Research and Development (IJERD)
network security.pdf
Top 25 SOC Analyst interview questions.pdf
Network security
Network-security-ppt.pptx...............
presentation_security_1510578971_320573.pptx
network security ppt.pptx
SegurançA Da InformaçãO Faat V1 4
Toward Continuous Cybersecurity with Network Automation
Toward Continuous Cybersecurity With Network Automation
Information Technology Security Basics
Seguridad web -articulo completo- ingles
Chapter 10.0

More from Pace IT at Edmonds Community College (20)

PPTX
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)
PPTX
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)
PPTX
PACE-IT, Security+ 6.2: Cryptographic Methods (part 2)
PPTX
PACE-IT, Security+ 6.2: Cryptographic Methods (part 1)
PPTX
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 1)
PPTX
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 2)
PPTX
PACE-IT, Security + 5.3: Security Controls for Account Management
PPTX
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 2)
PPTX
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 1)
PPTX
PACE-IT, Security + 5.1: Summary of Authentication Services
PPTX
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)
PPTX
PACE-IT, Security+ 4.1: Application Security Controls and Techniques
PPTX
PACE-IT, Security+ 4.5: Mitigating Risks in Alternative Environments
PPTX
PACE-IT, Security+ 4.4: Controls to Ensure Data Security
PPTX
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PPTX
PACE-IT, Security+3.7: Overview of Security Assessment Tools
PPTX
PACE-IT, Security+3.6: Security Enhancement Techniques
PPTX
PACE-IT, Security+3.5: Types of Application Attacks (part 2)
PPTX
PACE-IT, Security+3.3: Summary of Social Engineering Attacks
PPTX
PACE-IT, Security+3.2: Summary of Types of Attacks (part 2)
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)
PACE-IT, Security+ 6.2: Cryptographic Methods (part 2)
PACE-IT, Security+ 6.2: Cryptographic Methods (part 1)
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 1)
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 2)
PACE-IT, Security + 5.3: Security Controls for Account Management
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 2)
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 1)
PACE-IT, Security + 5.1: Summary of Authentication Services
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)
PACE-IT, Security+ 4.1: Application Security Controls and Techniques
PACE-IT, Security+ 4.5: Mitigating Risks in Alternative Environments
PACE-IT, Security+ 4.4: Controls to Ensure Data Security
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PACE-IT, Security+3.7: Overview of Security Assessment Tools
PACE-IT, Security+3.6: Security Enhancement Techniques
PACE-IT, Security+3.5: Types of Application Attacks (part 2)
PACE-IT, Security+3.3: Summary of Social Engineering Attacks
PACE-IT, Security+3.2: Summary of Types of Attacks (part 2)

Recently uploaded (20)

PPTX
Renaissance Architecture: A Journey from Faith to Humanism
PDF
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
PDF
Abdominal Access Techniques with Prof. Dr. R K Mishra
PDF
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
PDF
O5-L3 Freight Transport Ops (International) V1.pdf
PDF
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
PDF
Pre independence Education in Inndia.pdf
PDF
STATICS OF THE RIGID BODIES Hibbelers.pdf
PDF
Origin of periodic table-Mendeleev’s Periodic-Modern Periodic table
PPTX
Institutional Correction lecture only . . .
PPTX
Pharmacology of Heart Failure /Pharmacotherapy of CHF
PDF
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
PDF
102 student loan defaulters named and shamed – Is someone you know on the list?
PDF
TR - Agricultural Crops Production NC III.pdf
PPTX
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
PPTX
The Healthy Child – Unit II | Child Health Nursing I | B.Sc Nursing 5th Semester
PDF
2.FourierTransform-ShortQuestionswithAnswers.pdf
PDF
Anesthesia in Laparoscopic Surgery in India
PPTX
Week 4 Term 3 Study Techniques revisited.pptx
PDF
01-Introduction-to-Information-Management.pdf
Renaissance Architecture: A Journey from Faith to Humanism
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
Abdominal Access Techniques with Prof. Dr. R K Mishra
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
O5-L3 Freight Transport Ops (International) V1.pdf
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
Pre independence Education in Inndia.pdf
STATICS OF THE RIGID BODIES Hibbelers.pdf
Origin of periodic table-Mendeleev’s Periodic-Modern Periodic table
Institutional Correction lecture only . . .
Pharmacology of Heart Failure /Pharmacotherapy of CHF
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
102 student loan defaulters named and shamed – Is someone you know on the list?
TR - Agricultural Crops Production NC III.pdf
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
The Healthy Child – Unit II | Child Health Nursing I | B.Sc Nursing 5th Semester
2.FourierTransform-ShortQuestionswithAnswers.pdf
Anesthesia in Laparoscopic Surgery in India
Week 4 Term 3 Study Techniques revisited.pptx
01-Introduction-to-Information-Management.pdf

PACE-IT: Common Network Security Issues

  • 2. Page 2 Instructor, PACE-IT Program – Edmonds Community College Areas of Expertise Industry Certifications  PC Hardware  Network Administration  IT Project Management  Network Design  User Training  IT Troubleshooting Qualifications Summary Education  M.B.A., IT Management, Western Governor’s University  B.S., IT Security, Western Governor’s University Entrepreneur, executive leader, and proven manger with 10+ years of experience turning complex issues into efficient and effective solutions. Strengths include developing and mentoring diverse workforces, improving processes, analyzing business needs and creating the solutions required— with a focus on technology.
  • 3. Page 3 – Security issues caused by misconfigurations. – Other network security issues. PACE-IT.
  • 4. Page 4 Common network security issues.
  • 5. Page 5 It’s easy to assume that a network is secured from threats, while, in reality, it may be very vulnerable. A network may actually be vulnerable because of a misconfigured security setting or because of a common practice within an organization. A network may not be as secure as you think due to the ever changing threat landscape. Nefarious hackers are continually seeking new exploits that they can use to breach network security (including possible misconfigurations in network security settings). Common network security issues.
  • 6. Page 6 – Misconfigured firewall and access control list (ACL). » A misconfigured firewall and ACL can result in three different categories of security issues. • Traffic that should be blocked isn’t, allowing threats in. • Traffic that shouldn’t be blocked is; this can prevent receiving vital updates. • All traffic is blocked; this isn’t necessarily a security issue per se but is still a misconfiguration. » To protect against a misconfigured firewall or ACL, thoroughly test them before putting them into action. – Misconfigured application. » A misconfigured application may become a security threat. • A Web application that does not perform proper validation of input may lead to a buffer overflow attack. This may lead to a successful attack on the Web server on which it is hosted. » Thoroughly testing applications before placing them into service will mitigate the threat. Common network security issues.
  • 7. Page 7 – Unpatched operating system (OS) or firmware. » The manufacturers of OSs and hardware firmware will often produce security patches (or fixes) for vulnerabilities as they become known. • An unpatched OS or firmware becomes very vulnerable in short order and may become a threat to the network. » Most software makers have an updating service; subscribing to that service will help to mitigate the threat. – Open TCP/IP ports. » Open ports on networks are listening for requests for or by services, applications, or protocols. • All open ports are a security vulnerability and there are 65,535 possible ports that may be open. » A best practice for network security is to specifically close all unnecessary ports to harden a network. Common network security issues.
  • 8. Page 8 – Misconfigured authentication services. » The TACACS+ and RADIUS services are often used to authenticate devices and users on networks. • A misconfiguration of either may lead to a security issue that allows malicious users to be authenticated to use network resources. » Thoroughly reviewing the configuration of authentication services will help to mitigate the problem. In addition, all default local accounts should be disabled (these may present a slight opening for a malicious user to exploit authentication services). – Active default usernames and passwords. » Almost all devices and applications come with default usernames and passwords to ease the setup process. • If left active, these defaults create a security issue—as they tend to be well known or are easy to find through simple research. » A best practice is to disable all default usernames and passwords after setting up the device or application. Common network security issues.
  • 9. Page 9 Common network security issues.
  • 10. Page 10 – Malicious users. » Malicious users may be the single biggest security issue facing any network and they will fall into one of two categories: • An untrusted malicious user: an outside entity that has exploited a security weakness to gain access to network resources (e.g., a hacker who has breached a database’s security features to gain access to valuable information). • A trusted malicious user: a person or entity that has been explicitly granted access to network resources that then exploits this trusted position for malicious purposes. » A best practice is to review log files on a regular basis to see what resources are being accessed and by whom to help maintain security. – Packet sniffers. » Packet sniffers examine network traffic at a very basic level and can be used to help in the administration of a network. • Packet sniffers may also be used by malicious users to see what protocols and activities are allowed on the network. This may help them in further attacking the network. Common network security issues.
  • 11. Page 11 – Malware. » It is usually defined as malicious software that has the intent of causing harm. As a category, malware covers any code based threat to a network or system. • Examples of malware include: viruses, Trojans, and spyware. » To protect against malware, anti-malware applications should be running on every device. To be proactive, end user education should also be in place to teach them to recognize the dangers. – ICMP (Internet Control Messaging Protocol) related issues. » ICMP can be a valuable tool for diagnosing issues on networks, but it can also become a security vulnerability. • ICMP can be exploited in a denial-of-service (DoS) type of attack. • ICMP can be used to redirect legitimate users to a new malicious default gateway, possibly resulting in loss of data or sensitive information. » It is now a best practice to deny ICMP requests on a router’s outward facing interface. Common network security issues.
  • 12. Page 12 – DoS or distributed DoS (DDoS). » In an attempt to bring down a network or website, malicious users will often send thousands (or hundred of thousands) of requests for services. • The attackers’ goal is to make that resource unreachable by legitimate users. » Many modern firewalls and other network appliances have been configured to recognize the signature of such an attack and can take steps to mitigate the results. – Unintended backdoor access. » When creating applications, developers often create backdoors into the programs. Backdoors are a method of accessing an application or service while bypassing the normal authentication process. Unfortunately, these backdoors are sometimes left open after the development process has been completed. Once these become known, they can be exploited. • In most cases, the application is listening on a specific port (e.g., an open port) for a request for access. » The best mitigation technique is to close all unnecessary ports on a network. Common network security issues.
  • 13. Page 13 – Jamming. » All wireless networks use radio frequency (RF) channels to transmit data on the network. It is possible to create enough interference on the RF channel that it is no longer useable on the network. • An attacker will often use jamming when performing a DoS type attack; however, it can also be used to perform an evil twin type attack. » Many of the modern networking standards and devices employ techniques to mitigate the threat of jamming (e.g., 802.11n and 802.11ac are difficult to jam). – Banner grabbing. » Many network devices display banners (displayed messages)when users are signing into or requesting services from network devices. These banners can impart information about the type of device or the type of service that is being requested. • This information may be used by a hacker to research possible exploits. » The best practice is to disable all unnecessary services and banners on network devices. Common network security issues.
  • 14. Page 14 Common network security issues. Network security is an ever shifting landscape and some security issues may be inadvertently created by misconfigurations. Some of these misconfiguration issues can occur on: firewalls, ACLs, applications, unpatched OSs or firmware, open TCP/IP ports, and authentication services. The use of default usernames and passwords is another means by which a network can be breached. Topic Security issues caused by misconfigurations. Summary There are many security issues that face modern networks. Some of these issues include: malicious users, packet sniffers, malware, ICMP, DoS or DDoS attacks, unintended backdoor access, jamming, and banner grabbing. Each of these vulnerabilities can be mitigated, thus hardening the network. Other network security issues.
  • 16. This workforce solution was 100 percent funded by a $3 million grant awarded by the U.S. Department of Labor's Employment and Training Administration. The solution was created by the grantee and does not necessarily reflect the official position of the U.S. Department of Labor. The Department of Labor makes no guarantees, warranties, or assurances of any kind, express or implied, with respect to such information, including any information on linked sites and including, but not limited to, accuracy of the information or its completeness, timeliness, usefulness, adequacy, continued availability or ownership. Funded by the Department of Labor, Employment and Training Administration, Grant #TC-23745-12-60-A-53. PACE-IT is an equal opportunity employer/program and auxiliary aids and services are available upon request to individuals with disabilities. For those that are hearing impaired, a video phone is available at the Services for Students with Disabilities (SSD) office in Mountlake Terrace Hall 159. Check www.edcc.edu/ssd for office hours. Call 425.354.3113 on a video phone for more information about the PACE-IT program. For any additional special accommodations needed, call the SSD office at 425.640.1814. Edmonds Community College does not discriminate on the basis of race; color; religion; national origin; sex; disability; sexual orientation; age; citizenship, marital, or veteran status; or genetic information in its programs and activities.