SlideShare a Scribd company logo
2
Most read
3
Most read
Network
hardening
techniques I.
Page 2
Instructor, PACE-IT Program – Edmonds Community College
Areas of expertise Industry Certifications
 PC Hardware
 Network Administration
 IT Project Management
 Network Design
 User Training
 IT Troubleshooting
Qualifications Summary
Education
 M.B.A., IT Management, Western Governor’s University
 B.S., IT Security, Western Governor’s University
Entrepreneur, executive leader, and proven manger
with 10+ years of experience turning complex issues
into efficient and effective solutions.
Strengths include developing and mentoring diverse
workforces, improving processes, analyzing
business needs and creating the solutions
required— with a focus on technology.
Page 3
PACE-IT.
– Using secure protocols.
– Using anti-malware software.
– Implementing switch and router
security.
Page 4
Network hardening techniques I.
Page 5
Network security is always
an ongoing process because
the threats to it keep
changing.
Although security threats are continually evolving,
administrators can use some techniques to harden
the base network structure to help ease the ever
shifting security landscape.
These hardening techniques establish a good
security foundation that can be further built upon,
making the network that much harder to crack.
Network hardening techniques I.
Page 6
Network hardening techniques I.
– SSH (Secure Shell).
» A protocol that is used to create an encrypted communications
session between devices.
• Commonly used to create a secure virtual terminal session.
– SNMP (Simple Network Management
Protocol) v.3.
» A protocol used to manage and configure devices remotely on
the network. It is more secure than the prior two versions.
– SFTP (Secure File Transfer Protocol).
» A protocol used to transfer data (files) and manage file
structures (directories) in a secure manner through the use of
an SSH session.
• It is a better option than FTP, which requires user
authentication, but does not encrypt the communication.
Page 7
Network hardening techniques I.
– TLS (Transport Layer Security).
» A cryptographic protocol used to encrypt online
communications. It uses certificates and asymmetrical
cryptography to authenticate hosts and exchange security keys.
• It is a better option than SSL (Secure Socket Layer), which
functions in a similar manner.
– HTTPS (Hypertext Transport Protocol
Secure).
» A protocol that is used to secure the communication channel
between a Web browser and a Web server.
• It uses either TLS or SSL technology.
– IPsec (Internet Protocol Security).
» A network layer (Layer 3) IP security protocol suite that can use
multiple methods to mutually authenticate both ends of the
communications channel. It also will encrypt all data
transmissions.
• Unlike most other protocols, it can provide end-to-end security
for any application.
Page 8
Network hardening techniques I.
Page 9
Network hardening techniques I.
– Anti-malware software options.
» Anti-malware applications help to protect networks and network
resources against malware intrusions (e.g., spyware, viruses,
and worms). There are three main options when using anti-
malware software.
• Host-based anti-malware: the application is installed on the
individual machines and only protects those nodes on which it
resides. It is easily tuned to the needs of the individual host,
but requires the user to keep it up to date.
• Network-based anti-malware: the application is installed
within the local network and served to the individual clients
that require it. It is easily administered, but harder to tune for
the individual hosts.
• Cloud-based anti-malware: the application resides in the
cloud (outside of the local network) and is served to the
clients inside the local network as needed. This service has a
very small footprint on the local machines and tends to be
kept more current than the other options.
Page 10
Network hardening techniques I.
Page 11
When is using a password
not secure? The answer is
when the password is kept in
clear text.
One solution to this is to save passwords and other sensitive
information as hashes. Hashing is a cryptographic process that
uses an algorithm to derive a set value (the hashed value) from
the sensitive data. The hash can be used to verify that data is
coming from where it is supposed to and that it has not been
intercepted or changed in transit.
The most popular hashing algorithms are MD5 (message-digest
algorithm) and SHA (Secure Hash Algorithm). Of the two, SHA is
the more secure.
Network hardening techniques I.
Page 12
Network hardening techniques I.
– Switch port security measures.
» Switch port security should be enabled.
» The native VLAN should be changed from its default value.
• All active ports should be assigned to non-native VLANs.
• All non-active switch ports should be assigned to an unused
non-native VLAN.
• VLANs should be created to clearly segment the network into
logical areas.
» MAC address filtering should be considered. This will only
allow specific MAC addresses to connect to specific ports.
» DHCP snooping should be enabled. This will only allow DHCP
responses from an administrator defined switch port.
» Dynamic ARP Inspection (DAI) should be enabled. This
process is combined with DHCP snooping to restrict the
opportunity for ARP cache poisoning to occur. All ARP requests
are compared against the ARP table contained in the
administratively defined DHCP server.
Page 13
Network hardening techniques I.
– Router security measures.
» Each interface on a router should have an access control list
(ACL) in place to control and filter traffic.
• Each interface can actually have two ACLs—one on the
inbound side of the interface and one on the outbound side.
» An ACL is a set of rules that is used to govern and filter the flow
of network traffic into and out of a network.
• The ACL examines packets against its established rules,
beginning from the first rule at the top of the list. The rules
either allow or deny the packet from continuing.
• Once the packet matches a rule, the rule is enforced and the
ACL process is exited.
• ACL rules can be based on protocols and ports, IP addresses,
source addresses, destination addresses, etc.
• All ACLs end with an implicit deny—meaning that if it isn’t
specifically allowed, then a packet is discarded.
» The ACL can be time based (e.g., day of the week or time of
day) and can fulfill a specific function based on the reason it is
created (e.g., an ACL can be used to filter out websites or Web
content).
Page 14
Network hardening techniques I.
Hardening techniques are used by administrators as a foundation to
network security. Some secure protocols that can and should be used on
the network are: SSH, SNMP v.3, SFTP, TLS (and possibly SSL), HTTPS,
and IPsec.
Topic
Using secure protocols.
Summary
Anti-malware applications are used to protect against malware intrusions on
systems. There are three main options for using these applications: host-
based, network-based, and cloud-based. Each of the options has its own
advantages.
Using anti-malware software.
Passwords and sensitive data should be kept as hashed values. The most
popular hashing algorithms are MD5 and SHA. Switch port security includes
adjusting VLAN settings, MAC address filtering, DHCP snooping, and DAI.
To harden a router, each interface should have at least one ACL active on
it. All ACLs have an implicit deny at the end of the list.
Implementing switch and
router security.
Page 15
THANK YOU!
This workforce solution was 100 percent funded by a $3 million grant awarded by the
U.S. Department of Labor's Employment and Training Administration. The solution was
created by the grantee and does not necessarily reflect the official position of the U.S.
Department of Labor. The Department of Labor makes no guarantees, warranties, or
assurances of any kind, express or implied, with respect to such information, including
any information on linked sites and including, but not limited to, accuracy of the
information or its completeness, timeliness, usefulness, adequacy, continued availability
or ownership. Funded by the Department of Labor, Employment and Training
Administration, Grant #TC-23745-12-60-A-53.
PACE-IT is an equal opportunity employer/program and auxiliary aids and services are
available upon request to individuals with disabilities. For those that are hearing
impaired, a video phone is available at the Services for Students with Disabilities (SSD)
office in Mountlake Terrace Hall 159. Check www.edcc.edu/ssd for office hours. Call
425.354.3113 on a video phone for more information about the PACE-IT program. For
any additional special accommodations needed, call the SSD office at 425.640.1814.
Edmonds Community College does not discriminate on the basis of race; color; religion;
national origin; sex; disability; sexual orientation; age; citizenship, marital, or veteran
status; or genetic information in its programs and activities.

More Related Content

PPTX
PACE-IT: Network Hardening Techniques (part 3)
PPTX
SHA- Secure hashing algorithm
PPTX
Hash Function
PPTX
Encryption algorithms
PPTX
Intrusion detection and prevention system
PPT
Software security
PDF
How to Achieve Agile API Security
PPTX
Advanced persistent threat (apt)
PACE-IT: Network Hardening Techniques (part 3)
SHA- Secure hashing algorithm
Hash Function
Encryption algorithms
Intrusion detection and prevention system
Software security
How to Achieve Agile API Security
Advanced persistent threat (apt)

What's hot (20)

PPT
Introduction To OWASP
PPTX
OWASP Top 10 2021 What's New
PDF
Palo Alto VM-100 Configuration Lab
PPTX
Networking in cloud computing
PPTX
Hash Function
PPTX
Secure coding practices
PPTX
Virtualization in cloud computing
PPT
Fullandparavirtualization.ppt
PPT
Information Security Policies and Standards
PDF
Internet Governance
PPTX
NIST CyberSecurity Framework: An Overview
PPTX
Intrusion prevention system(ips)
PPTX
Cloud computing and Cloud security fundamentals
PPTX
Information and network security 8 security mechanisms
PDF
Application Security - Your Success Depends on it
PDF
18CS2005 Cryptography and Network Security
PPTX
Cryptanalysis
PPT
Cloud and dynamic infrastructure
PPTX
Design Goals of Distributed System
PDF
MapReduce in Cloud Computing
Introduction To OWASP
OWASP Top 10 2021 What's New
Palo Alto VM-100 Configuration Lab
Networking in cloud computing
Hash Function
Secure coding practices
Virtualization in cloud computing
Fullandparavirtualization.ppt
Information Security Policies and Standards
Internet Governance
NIST CyberSecurity Framework: An Overview
Intrusion prevention system(ips)
Cloud computing and Cloud security fundamentals
Information and network security 8 security mechanisms
Application Security - Your Success Depends on it
18CS2005 Cryptography and Network Security
Cryptanalysis
Cloud and dynamic infrastructure
Design Goals of Distributed System
MapReduce in Cloud Computing
Ad

Similar to PACE-IT: Network Hardening Techniques (part 1) (20)

PPTX
PACE-IT, Security+1.2: Secure Network Administration Concepts
PPTX
PACE-IT, Security+1.1: Introduction to Network Devices (part 1)
PPTX
PACE-IT: Network Hardening Techniques (part 2)
PPTX
PACE-IT: Introduction_to Network Devices (part 2) - N10 006
PPTX
PACE-IT: Networking Services and Applications (part 1) - N10 006
PPTX
PACE-IT, Security+1.4: Common Network Protocols (part 3)
PPTX
PACE-IT: Firewall Basics
PPTX
PACE-IT: Common Network Vulnerabilities
PPTX
CompTIA Security Plus Mini Bootcamp Session
PDF
SDN Security: Two Sides of the Same Coin
PPTX
PDF
Ciss previsionnotes
PDF
Comptia Security+ Exam Notes
PPTX
CLOUD SECURITY.pptx
PPTX
PACE-IT, Security+1.4: Common Network Protocols (part 2)
PPTX
PDF
Deploying Network Taps for Improved Security
PDF
4.report (cryptography & computer network)
PPTX
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 1)
PPT
Persentation of Cyber Security in Smart Grid
PACE-IT, Security+1.2: Secure Network Administration Concepts
PACE-IT, Security+1.1: Introduction to Network Devices (part 1)
PACE-IT: Network Hardening Techniques (part 2)
PACE-IT: Introduction_to Network Devices (part 2) - N10 006
PACE-IT: Networking Services and Applications (part 1) - N10 006
PACE-IT, Security+1.4: Common Network Protocols (part 3)
PACE-IT: Firewall Basics
PACE-IT: Common Network Vulnerabilities
CompTIA Security Plus Mini Bootcamp Session
SDN Security: Two Sides of the Same Coin
Ciss previsionnotes
Comptia Security+ Exam Notes
CLOUD SECURITY.pptx
PACE-IT, Security+1.4: Common Network Protocols (part 2)
Deploying Network Taps for Improved Security
4.report (cryptography & computer network)
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 1)
Persentation of Cyber Security in Smart Grid
Ad

More from Pace IT at Edmonds Community College (20)

PPTX
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)
PPTX
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)
PPTX
PACE-IT, Security+ 6.2: Cryptographic Methods (part 2)
PPTX
PACE-IT, Security+ 6.2: Cryptographic Methods (part 1)
PPTX
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 2)
PPTX
PACE-IT, Security + 5.3: Security Controls for Account Management
PPTX
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 2)
PPTX
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 1)
PPTX
PACE-IT, Security + 5.1: Summary of Authentication Services
PPTX
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)
PPTX
PACE-IT, Security+ 4.1: Application Security Controls and Techniques
PPTX
PACE-IT, Security+ 4.5: Mitigating Risks in Alternative Environments
PPTX
PACE-IT, Security+ 4.4: Controls to Ensure Data Security
PPTX
PACE-IT, Security+ 4.3: Solutions to Establish Host Security
PPTX
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PPTX
PACE-IT, Security+3.7: Overview of Security Assessment Tools
PPTX
PACE-IT, Security+3.6: Security Enhancement Techniques
PPTX
PACE-IT, Security+3.5: Types of Application Attacks (part 2)
PPTX
PACE-IT, Security+3.5: Types of Application Attacks (part 1)
PPTX
PACE-IT, Security+3.4: Summary of Wireless Attacks
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)
PACE-IT, Security+ 6.2: Cryptographic Methods (part 2)
PACE-IT, Security+ 6.2: Cryptographic Methods (part 1)
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 2)
PACE-IT, Security + 5.3: Security Controls for Account Management
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 2)
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 1)
PACE-IT, Security + 5.1: Summary of Authentication Services
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)
PACE-IT, Security+ 4.1: Application Security Controls and Techniques
PACE-IT, Security+ 4.5: Mitigating Risks in Alternative Environments
PACE-IT, Security+ 4.4: Controls to Ensure Data Security
PACE-IT, Security+ 4.3: Solutions to Establish Host Security
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PACE-IT, Security+3.7: Overview of Security Assessment Tools
PACE-IT, Security+3.6: Security Enhancement Techniques
PACE-IT, Security+3.5: Types of Application Attacks (part 2)
PACE-IT, Security+3.5: Types of Application Attacks (part 1)
PACE-IT, Security+3.4: Summary of Wireless Attacks

Recently uploaded (20)

PPTX
Microbial diseases, their pathogenesis and prophylaxis
PDF
Weekly quiz Compilation Jan -July 25.pdf
PDF
A GUIDE TO GENETICS FOR UNDERGRADUATE MEDICAL STUDENTS
PPTX
Final Presentation General Medicine 03-08-2024.pptx
PDF
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
PDF
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
PDF
Module 4: Burden of Disease Tutorial Slides S2 2025
PDF
Abdominal Access Techniques with Prof. Dr. R K Mishra
PDF
A systematic review of self-coping strategies used by university students to ...
PPTX
Tissue processing ( HISTOPATHOLOGICAL TECHNIQUE
PPTX
Introduction-to-Literarature-and-Literary-Studies-week-Prelim-coverage.pptx
PDF
RTP_AR_KS1_Tutor's Guide_English [FOR REPRODUCTION].pdf
PDF
STATICS OF THE RIGID BODIES Hibbelers.pdf
PDF
FourierSeries-QuestionsWithAnswers(Part-A).pdf
PPTX
Cell Types and Its function , kingdom of life
PDF
VCE English Exam - Section C Student Revision Booklet
PDF
O7-L3 Supply Chain Operations - ICLT Program
PDF
RMMM.pdf make it easy to upload and study
PPTX
Lesson notes of climatology university.
PDF
Classroom Observation Tools for Teachers
Microbial diseases, their pathogenesis and prophylaxis
Weekly quiz Compilation Jan -July 25.pdf
A GUIDE TO GENETICS FOR UNDERGRADUATE MEDICAL STUDENTS
Final Presentation General Medicine 03-08-2024.pptx
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
Module 4: Burden of Disease Tutorial Slides S2 2025
Abdominal Access Techniques with Prof. Dr. R K Mishra
A systematic review of self-coping strategies used by university students to ...
Tissue processing ( HISTOPATHOLOGICAL TECHNIQUE
Introduction-to-Literarature-and-Literary-Studies-week-Prelim-coverage.pptx
RTP_AR_KS1_Tutor's Guide_English [FOR REPRODUCTION].pdf
STATICS OF THE RIGID BODIES Hibbelers.pdf
FourierSeries-QuestionsWithAnswers(Part-A).pdf
Cell Types and Its function , kingdom of life
VCE English Exam - Section C Student Revision Booklet
O7-L3 Supply Chain Operations - ICLT Program
RMMM.pdf make it easy to upload and study
Lesson notes of climatology university.
Classroom Observation Tools for Teachers

PACE-IT: Network Hardening Techniques (part 1)

  • 2. Page 2 Instructor, PACE-IT Program – Edmonds Community College Areas of expertise Industry Certifications  PC Hardware  Network Administration  IT Project Management  Network Design  User Training  IT Troubleshooting Qualifications Summary Education  M.B.A., IT Management, Western Governor’s University  B.S., IT Security, Western Governor’s University Entrepreneur, executive leader, and proven manger with 10+ years of experience turning complex issues into efficient and effective solutions. Strengths include developing and mentoring diverse workforces, improving processes, analyzing business needs and creating the solutions required— with a focus on technology.
  • 3. Page 3 PACE-IT. – Using secure protocols. – Using anti-malware software. – Implementing switch and router security.
  • 4. Page 4 Network hardening techniques I.
  • 5. Page 5 Network security is always an ongoing process because the threats to it keep changing. Although security threats are continually evolving, administrators can use some techniques to harden the base network structure to help ease the ever shifting security landscape. These hardening techniques establish a good security foundation that can be further built upon, making the network that much harder to crack. Network hardening techniques I.
  • 6. Page 6 Network hardening techniques I. – SSH (Secure Shell). » A protocol that is used to create an encrypted communications session between devices. • Commonly used to create a secure virtual terminal session. – SNMP (Simple Network Management Protocol) v.3. » A protocol used to manage and configure devices remotely on the network. It is more secure than the prior two versions. – SFTP (Secure File Transfer Protocol). » A protocol used to transfer data (files) and manage file structures (directories) in a secure manner through the use of an SSH session. • It is a better option than FTP, which requires user authentication, but does not encrypt the communication.
  • 7. Page 7 Network hardening techniques I. – TLS (Transport Layer Security). » A cryptographic protocol used to encrypt online communications. It uses certificates and asymmetrical cryptography to authenticate hosts and exchange security keys. • It is a better option than SSL (Secure Socket Layer), which functions in a similar manner. – HTTPS (Hypertext Transport Protocol Secure). » A protocol that is used to secure the communication channel between a Web browser and a Web server. • It uses either TLS or SSL technology. – IPsec (Internet Protocol Security). » A network layer (Layer 3) IP security protocol suite that can use multiple methods to mutually authenticate both ends of the communications channel. It also will encrypt all data transmissions. • Unlike most other protocols, it can provide end-to-end security for any application.
  • 8. Page 8 Network hardening techniques I.
  • 9. Page 9 Network hardening techniques I. – Anti-malware software options. » Anti-malware applications help to protect networks and network resources against malware intrusions (e.g., spyware, viruses, and worms). There are three main options when using anti- malware software. • Host-based anti-malware: the application is installed on the individual machines and only protects those nodes on which it resides. It is easily tuned to the needs of the individual host, but requires the user to keep it up to date. • Network-based anti-malware: the application is installed within the local network and served to the individual clients that require it. It is easily administered, but harder to tune for the individual hosts. • Cloud-based anti-malware: the application resides in the cloud (outside of the local network) and is served to the clients inside the local network as needed. This service has a very small footprint on the local machines and tends to be kept more current than the other options.
  • 10. Page 10 Network hardening techniques I.
  • 11. Page 11 When is using a password not secure? The answer is when the password is kept in clear text. One solution to this is to save passwords and other sensitive information as hashes. Hashing is a cryptographic process that uses an algorithm to derive a set value (the hashed value) from the sensitive data. The hash can be used to verify that data is coming from where it is supposed to and that it has not been intercepted or changed in transit. The most popular hashing algorithms are MD5 (message-digest algorithm) and SHA (Secure Hash Algorithm). Of the two, SHA is the more secure. Network hardening techniques I.
  • 12. Page 12 Network hardening techniques I. – Switch port security measures. » Switch port security should be enabled. » The native VLAN should be changed from its default value. • All active ports should be assigned to non-native VLANs. • All non-active switch ports should be assigned to an unused non-native VLAN. • VLANs should be created to clearly segment the network into logical areas. » MAC address filtering should be considered. This will only allow specific MAC addresses to connect to specific ports. » DHCP snooping should be enabled. This will only allow DHCP responses from an administrator defined switch port. » Dynamic ARP Inspection (DAI) should be enabled. This process is combined with DHCP snooping to restrict the opportunity for ARP cache poisoning to occur. All ARP requests are compared against the ARP table contained in the administratively defined DHCP server.
  • 13. Page 13 Network hardening techniques I. – Router security measures. » Each interface on a router should have an access control list (ACL) in place to control and filter traffic. • Each interface can actually have two ACLs—one on the inbound side of the interface and one on the outbound side. » An ACL is a set of rules that is used to govern and filter the flow of network traffic into and out of a network. • The ACL examines packets against its established rules, beginning from the first rule at the top of the list. The rules either allow or deny the packet from continuing. • Once the packet matches a rule, the rule is enforced and the ACL process is exited. • ACL rules can be based on protocols and ports, IP addresses, source addresses, destination addresses, etc. • All ACLs end with an implicit deny—meaning that if it isn’t specifically allowed, then a packet is discarded. » The ACL can be time based (e.g., day of the week or time of day) and can fulfill a specific function based on the reason it is created (e.g., an ACL can be used to filter out websites or Web content).
  • 14. Page 14 Network hardening techniques I. Hardening techniques are used by administrators as a foundation to network security. Some secure protocols that can and should be used on the network are: SSH, SNMP v.3, SFTP, TLS (and possibly SSL), HTTPS, and IPsec. Topic Using secure protocols. Summary Anti-malware applications are used to protect against malware intrusions on systems. There are three main options for using these applications: host- based, network-based, and cloud-based. Each of the options has its own advantages. Using anti-malware software. Passwords and sensitive data should be kept as hashed values. The most popular hashing algorithms are MD5 and SHA. Switch port security includes adjusting VLAN settings, MAC address filtering, DHCP snooping, and DAI. To harden a router, each interface should have at least one ACL active on it. All ACLs have an implicit deny at the end of the list. Implementing switch and router security.
  • 16. This workforce solution was 100 percent funded by a $3 million grant awarded by the U.S. Department of Labor's Employment and Training Administration. The solution was created by the grantee and does not necessarily reflect the official position of the U.S. Department of Labor. The Department of Labor makes no guarantees, warranties, or assurances of any kind, express or implied, with respect to such information, including any information on linked sites and including, but not limited to, accuracy of the information or its completeness, timeliness, usefulness, adequacy, continued availability or ownership. Funded by the Department of Labor, Employment and Training Administration, Grant #TC-23745-12-60-A-53. PACE-IT is an equal opportunity employer/program and auxiliary aids and services are available upon request to individuals with disabilities. For those that are hearing impaired, a video phone is available at the Services for Students with Disabilities (SSD) office in Mountlake Terrace Hall 159. Check www.edcc.edu/ssd for office hours. Call 425.354.3113 on a video phone for more information about the PACE-IT program. For any additional special accommodations needed, call the SSD office at 425.640.1814. Edmonds Community College does not discriminate on the basis of race; color; religion; national origin; sex; disability; sexual orientation; age; citizenship, marital, or veteran status; or genetic information in its programs and activities.