SlideShare a Scribd company logo
Common network
threats I.
Page 2
Instructor, PACE-IT Program – Edmonds Community College
Areas of Expertise Industry Certifications
 PC Hardware
 Network Administration
 IT Project Management
 Network Design
 User Training
 IT Troubleshooting
Qualifications Summary
Education
 M.B.A., IT Management, Western Governor’s University
 B.S., IT Security, Western Governor’s University
Entrepreneur, executive leader, and proven manger
with 10+ years of experience turning complex issues
into efficient and effective solutions.
Strengths include developing and mentoring diverse
workforces, improving processes, analyzing
business needs and creating the solutions
required— with a focus on technology.
Page 3
– Inside jobs or threats.
– Outside threats.
PACE-IT.
Page 4
Common network threats I.
Page 5
– Malicious employee.
» This is difficult to defend against, as the threat is already
inside the network.
• Resources must be granted in order for employees to
do their jobs.
» One of the best defenses is using the principle of least
privilege.
• Only granting the least amount of authorization that is
required for a person to get their work done.
– Compromised system.
» Once a PC or network device has been compromised, it
is vitally important to isolate it from the system as a
whole.
• A compromised PC or network device could lead to a
completely compromised network, as malware may be
able to spread across connections.
• Once malware gains access to network resources, it
can be extremely difficult to root out and remove.
Malware may also degrade the network’s performance.
Common network threats I.
Page 6
– Social engineering.
» The process of using social pressure to cause somebody to
compromise a system from inside the defenses of the network.
• The pressure can be applied in multiple forms: by phone, in
person, via email, through a rogue website, or by other
methods.
– ARP (Address Resolution Protocol) cache
poisoning.
» The ARP cache, which maps IP addresses to MAC addresses,
is corrupted by an attacker with the end result being that the
attacker has control of which IP addresses are associated with
MAC addresses.
• Commonly used in man-in-the-middle attacks.
– Protocol or packet abuse.
» The process of taking a specific protocol and repurposing it to
perform a different function.
• Commonly used to bypass a router’s access control list (ACL)
from inside a network (e.g., encapsulating a not allowed
protocol within a DNS (an allowed) protocol).
Common network threats I.
Page 7
– Man-in-the-middle attack.
» The attacker is not necessarily inside the network per se, but is
in between two end points that are communicating on a
network.
• In most cases, man-in-the-middle attacks involve disrupting
the ARP process between the two end points.
» The attack allows a malicious user to be able to view all
network packets that are flowing between the communicating
hosts.
– VLAN hopping.
» Circumventing the security that is inherent when virtual local
area networks (VLANs) are created. Normally, traffic that is
tagged for one VLAN is not allowed onto another VLAN without
the intervention of a router.
• VLAN hopping occurs when the attacker adds an additional
fake VLAN tag to the network packets. Once the packet gets
to the switch, the switch strips one of the VLAN tags off the
packet and passes it through. Once through the switch, the
packet is considered as belonging to the new VLAN.
Common network threats I.
Page 8
Common network threats I.
Page 9
One of the largest threats
that faces network security
personnel is the unknown
vulnerability.
Network and systems administrators expend a fair amount of
effort protecting the assets under their control and they can do a
good job of hardening their systems, but not a perfect job.
The problem lies with zero day attacks. Zero day attacks take
advantage of either new or very recently discovered
vulnerabilities, which means that networks and systems probably
haven’t yet been hardened against them.
The unfortunate reality is that attacks keep changing and security
experts must also be willing to adapt in order to keep pace.
Common network threats I.
Page 10
– Brute force attacks.
» Using computing power and time to compromise passwords.
• The attacker uses a program that continually tries different
password combinations (often in the form of a special
dictionary application) in an effort to crack a password.
– Spoofing.
» A category of threats where either the MAC address or IP
address of the attacker has been modified to look like a friendly
address in order to bypass network security.
• A common use in the past was to spoof the IP address, so
that an outside attacker was actually viewed as an inside
host.
– Session hijacking.
» An attacker attempts to take over a communication session
after a user has been authenticated.
• The hijacking can occur through various methods (e.g., using
a packet sniffer to steal a session cookie or installing malware
on a user’s computer that is activated after the user is
authenticated).
Common network threats I.
Page 11
Common network threats I.
Given the nature and purpose of networks, it can be difficult to make them
secure. Common threats that come from within the network itself are:
malicious employees, compromised systems, social engineering, ARP
cache poisoning, protocol or packet abuse, man-in-the-middle attacks, and
VLAN hopping.
Topic
Inside jobs or threats.
Summary
Of major concern to network security personnel are zero day attacks (the
exploitation of previously unknown vulnerabilities) and it is imperative that
they keep current with what is being developed. Other outside threats
include: brute force attacks, spoofing attacks, and session hijacking.
Outside threats.
Page 12
THANK YOU!
This workforce solution was 100 percent funded by a $3 million grant awarded by the
U.S. Department of Labor's Employment and Training Administration. The solution was
created by the grantee and does not necessarily reflect the official position of the U.S.
Department of Labor. The Department of Labor makes no guarantees, warranties, or
assurances of any kind, express or implied, with respect to such information, including
any information on linked sites and including, but not limited to, accuracy of the
information or its completeness, timeliness, usefulness, adequacy, continued availability
or ownership. Funded by the Department of Labor, Employment and Training
Administration, Grant #TC-23745-12-60-A-53.
PACE-IT is an equal opportunity employer/program and auxiliary aids and services are
available upon request to individuals with disabilities. For those that are hearing
impaired, a video phone is available at the Services for Students with Disabilities (SSD)
office in Mountlake Terrace Hall 159. Check www.edcc.edu/ssd for office hours. Call
425.354.3113 on a video phone for more information about the PACE-IT program. For
any additional special accommodations needed, call the SSD office at 425.640.1814.
Edmonds Community College does not discriminate on the basis of race; color; religion;
national origin; sex; disability; sexual orientation; age; citizenship, marital, or veteran
status; or genetic information in its programs and activities.

More Related Content

PPTX
PACE-IT: Common Threats (part 2)
Pace IT at Edmonds Community College
 
PPTX
PACE-IT: Common Network Security Issues
Pace IT at Edmonds Community College
 
PPTX
PACE-IT: Basic Forensic Concepts
Pace IT at Edmonds Community College
 
PPTX
PACE-IT: Risk and Security Related Concepts
Pace IT at Edmonds Community College
 
PPTX
PACE-IT: Physical Network Security Control
Pace IT at Edmonds Community College
 
PPTX
PACE-IT: Common Network Vulnerabilities
Pace IT at Edmonds Community College
 
PPTX
PACE-IT: Network Hardening Techniques (part 1)
Pace IT at Edmonds Community College
 
PPTX
PACE-IT: Network Hardening Techniques (part 3)
Pace IT at Edmonds Community College
 
PACE-IT: Common Threats (part 2)
Pace IT at Edmonds Community College
 
PACE-IT: Common Network Security Issues
Pace IT at Edmonds Community College
 
PACE-IT: Basic Forensic Concepts
Pace IT at Edmonds Community College
 
PACE-IT: Risk and Security Related Concepts
Pace IT at Edmonds Community College
 
PACE-IT: Physical Network Security Control
Pace IT at Edmonds Community College
 
PACE-IT: Common Network Vulnerabilities
Pace IT at Edmonds Community College
 
PACE-IT: Network Hardening Techniques (part 1)
Pace IT at Edmonds Community College
 
PACE-IT: Network Hardening Techniques (part 3)
Pace IT at Edmonds Community College
 

What's hot (20)

PPTX
PACE-IT: Network Hardening Techniques (part 2)
Pace IT at Edmonds Community College
 
PPTX
PACE-IT, Security+1.1: Introduction to Network Devices (part 2)
Pace IT at Edmonds Community College
 
PPTX
PACE-IT, Security+3.4: Summary of Wireless Attacks
Pace IT at Edmonds Community College
 
PPTX
PACE-IT: Firewall Basics
Pace IT at Edmonds Community College
 
PPTX
PACE-IT, Security+1.1: Introduction to Network Devices (part 3)
Pace IT at Edmonds Community College
 
PPTX
PACE-IT, Security+3.8: Vulnerability Scanning vs Pen Testing
Pace IT at Edmonds Community College
 
PPTX
PACE-IT, Security+1.4: Common Network Protocols (part 3)
Pace IT at Edmonds Community College
 
PPTX
PACE-IT, Security+ 2.4: Basic Forensic Procedures
Pace IT at Edmonds Community College
 
PPTX
PACE-IT, Security+1.3: Secure Network Design Elements and Components
Pace IT at Edmonds Community College
 
PPTX
PACE-IT, Security+3.5: Types of Application Attacks (part 1)
Pace IT at Edmonds Community College
 
PPTX
PACE-IT, Security+ 4.3: Solutions to Establish Host Security
Pace IT at Edmonds Community College
 
PPTX
PACE-IT: Network Access Control
Pace IT at Edmonds Community College
 
PPTX
PACE-IT, Security+3.2: Summary of Types of Attacks (part 1)
Pace IT at Edmonds Community College
 
PPTX
PACE-IT, Security+2.8: Risk Management Best Practices
Pace IT at Edmonds Community College
 
PPTX
PACE-IT, Security+1.5: Wireless Security Considerations
Pace IT at Edmonds Community College
 
PPTX
PACE-IT, Security+1.2: Secure Network Administration Concepts
Pace IT at Edmonds Community College
 
PPTX
Pace IT - Common Security Threats
Pace IT at Edmonds Community College
 
PPTX
PACE-IT, Security+2.6: Security Related Awareness and Training
Pace IT at Edmonds Community College
 
PPTX
PACE-IT, Security+2.7: Physical Security and Enviornmental Controls
Pace IT at Edmonds Community College
 
PPTX
PACE-IT, Security+1.3: Cloud Concepts
Pace IT at Edmonds Community College
 
PACE-IT: Network Hardening Techniques (part 2)
Pace IT at Edmonds Community College
 
PACE-IT, Security+1.1: Introduction to Network Devices (part 2)
Pace IT at Edmonds Community College
 
PACE-IT, Security+3.4: Summary of Wireless Attacks
Pace IT at Edmonds Community College
 
PACE-IT: Firewall Basics
Pace IT at Edmonds Community College
 
PACE-IT, Security+1.1: Introduction to Network Devices (part 3)
Pace IT at Edmonds Community College
 
PACE-IT, Security+3.8: Vulnerability Scanning vs Pen Testing
Pace IT at Edmonds Community College
 
PACE-IT, Security+1.4: Common Network Protocols (part 3)
Pace IT at Edmonds Community College
 
PACE-IT, Security+ 2.4: Basic Forensic Procedures
Pace IT at Edmonds Community College
 
PACE-IT, Security+1.3: Secure Network Design Elements and Components
Pace IT at Edmonds Community College
 
PACE-IT, Security+3.5: Types of Application Attacks (part 1)
Pace IT at Edmonds Community College
 
PACE-IT, Security+ 4.3: Solutions to Establish Host Security
Pace IT at Edmonds Community College
 
PACE-IT: Network Access Control
Pace IT at Edmonds Community College
 
PACE-IT, Security+3.2: Summary of Types of Attacks (part 1)
Pace IT at Edmonds Community College
 
PACE-IT, Security+2.8: Risk Management Best Practices
Pace IT at Edmonds Community College
 
PACE-IT, Security+1.5: Wireless Security Considerations
Pace IT at Edmonds Community College
 
PACE-IT, Security+1.2: Secure Network Administration Concepts
Pace IT at Edmonds Community College
 
Pace IT - Common Security Threats
Pace IT at Edmonds Community College
 
PACE-IT, Security+2.6: Security Related Awareness and Training
Pace IT at Edmonds Community College
 
PACE-IT, Security+2.7: Physical Security and Enviornmental Controls
Pace IT at Edmonds Community College
 
PACE-IT, Security+1.3: Cloud Concepts
Pace IT at Edmonds Community College
 
Ad

Similar to PACE-IT: Common Threats (part 1) (20)

PPTX
Pace IT - Threats & Vulnerabilities Mitigation
Pace IT at Edmonds Community College
 
PDF
Risk Analysis Report review
Larry Yurdin
 
PPTX
PACE-IT: Introduction_to Network Devices (part 2) - N10 006
Pace IT at Edmonds Community College
 
PPTX
PACE-IT, Security+3.1: Types of Malware
Pace IT at Edmonds Community College
 
PDF
network security.pdf
JeganathanJayaran
 
PDF
Cyber Defense - How to be prepared to APT
Simone Onofri
 
PDF
Network Security Research Paper
Pankaj Jha
 
PDF
Chapter-I introduction
Dr.Florence Dayana
 
PPTX
Chapter- I introduction
Dr.Florence Dayana
 
PPT
Network Security Tools and applications
webhostingguy
 
PPTX
PACE-IT, Security+1.1: Introduction to Network Devices (part 1)
Pace IT at Edmonds Community College
 
PPTX
First line of defense for cybersecurity : AI
Ahmed Banafa
 
PDF
Prevention based mechanism for attacks in Network Security
Editor IJMTER
 
PPTX
presentation_security_1510578971_320573.pptx
AadityaRauniyar1
 
PDF
Toward Continuous Cybersecurity With Network Automation
Ken Flott
 
PDF
Toward Continuous Cybersecurity with Network Automation
E.S.G. JR. Consulting, Inc.
 
PPTX
Information and Communication technology
JamesRoyBacolinaDuga
 
PPTX
PACE-IT, Security+3.5: Types of Application Attacks (part 2)
Pace IT at Edmonds Community College
 
PPTX
Cyber terrorism
Nihal Jani
 
DOCX
Part 3 ApplicationEnd-User Security Recommendations.docx
danhaley45372
 
Pace IT - Threats & Vulnerabilities Mitigation
Pace IT at Edmonds Community College
 
Risk Analysis Report review
Larry Yurdin
 
PACE-IT: Introduction_to Network Devices (part 2) - N10 006
Pace IT at Edmonds Community College
 
PACE-IT, Security+3.1: Types of Malware
Pace IT at Edmonds Community College
 
network security.pdf
JeganathanJayaran
 
Cyber Defense - How to be prepared to APT
Simone Onofri
 
Network Security Research Paper
Pankaj Jha
 
Chapter-I introduction
Dr.Florence Dayana
 
Chapter- I introduction
Dr.Florence Dayana
 
Network Security Tools and applications
webhostingguy
 
PACE-IT, Security+1.1: Introduction to Network Devices (part 1)
Pace IT at Edmonds Community College
 
First line of defense for cybersecurity : AI
Ahmed Banafa
 
Prevention based mechanism for attacks in Network Security
Editor IJMTER
 
presentation_security_1510578971_320573.pptx
AadityaRauniyar1
 
Toward Continuous Cybersecurity With Network Automation
Ken Flott
 
Toward Continuous Cybersecurity with Network Automation
E.S.G. JR. Consulting, Inc.
 
Information and Communication technology
JamesRoyBacolinaDuga
 
PACE-IT, Security+3.5: Types of Application Attacks (part 2)
Pace IT at Edmonds Community College
 
Cyber terrorism
Nihal Jani
 
Part 3 ApplicationEnd-User Security Recommendations.docx
danhaley45372
 
Ad

More from Pace IT at Edmonds Community College (20)

PPTX
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)
Pace IT at Edmonds Community College
 
PPTX
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)
Pace IT at Edmonds Community College
 
PPTX
PACE-IT, Security+ 6.2: Cryptographic Methods (part 2)
Pace IT at Edmonds Community College
 
PPTX
PACE-IT, Security+ 6.2: Cryptographic Methods (part 1)
Pace IT at Edmonds Community College
 
PPTX
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 1)
Pace IT at Edmonds Community College
 
PPTX
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 2)
Pace IT at Edmonds Community College
 
PPTX
PACE-IT, Security + 5.3: Security Controls for Account Management
Pace IT at Edmonds Community College
 
PPTX
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 2)
Pace IT at Edmonds Community College
 
PPTX
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 1)
Pace IT at Edmonds Community College
 
PPTX
PACE-IT, Security + 5.1: Summary of Authentication Services
Pace IT at Edmonds Community College
 
PPTX
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)
Pace IT at Edmonds Community College
 
PPTX
PACE-IT, Security+ 4.1: Application Security Controls and Techniques
Pace IT at Edmonds Community College
 
PPTX
PACE-IT, Security+ 4.5: Mitigating Risks in Alternative Environments
Pace IT at Edmonds Community College
 
PPTX
PACE-IT, Security+ 4.4: Controls to Ensure Data Security
Pace IT at Edmonds Community College
 
PPTX
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
Pace IT at Edmonds Community College
 
PPTX
PACE-IT, Security+3.7: Overview of Security Assessment Tools
Pace IT at Edmonds Community College
 
PPTX
PACE-IT, Security+3.6: Security Enhancement Techniques
Pace IT at Edmonds Community College
 
PPTX
PACE-IT, Security+3.3: Summary of Social Engineering Attacks
Pace IT at Edmonds Community College
 
PPTX
PACE-IT, Security+3.2: Summary of Types of Attacks (part 2)
Pace IT at Edmonds Community College
 
PPTX
PACE-IT, Security+2.8: Disaster Recovery Concepts
Pace IT at Edmonds Community College
 
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)
Pace IT at Edmonds Community College
 
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)
Pace IT at Edmonds Community College
 
PACE-IT, Security+ 6.2: Cryptographic Methods (part 2)
Pace IT at Edmonds Community College
 
PACE-IT, Security+ 6.2: Cryptographic Methods (part 1)
Pace IT at Edmonds Community College
 
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 1)
Pace IT at Edmonds Community College
 
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 2)
Pace IT at Edmonds Community College
 
PACE-IT, Security + 5.3: Security Controls for Account Management
Pace IT at Edmonds Community College
 
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 2)
Pace IT at Edmonds Community College
 
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 1)
Pace IT at Edmonds Community College
 
PACE-IT, Security + 5.1: Summary of Authentication Services
Pace IT at Edmonds Community College
 
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)
Pace IT at Edmonds Community College
 
PACE-IT, Security+ 4.1: Application Security Controls and Techniques
Pace IT at Edmonds Community College
 
PACE-IT, Security+ 4.5: Mitigating Risks in Alternative Environments
Pace IT at Edmonds Community College
 
PACE-IT, Security+ 4.4: Controls to Ensure Data Security
Pace IT at Edmonds Community College
 
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
Pace IT at Edmonds Community College
 
PACE-IT, Security+3.7: Overview of Security Assessment Tools
Pace IT at Edmonds Community College
 
PACE-IT, Security+3.6: Security Enhancement Techniques
Pace IT at Edmonds Community College
 
PACE-IT, Security+3.3: Summary of Social Engineering Attacks
Pace IT at Edmonds Community College
 
PACE-IT, Security+3.2: Summary of Types of Attacks (part 2)
Pace IT at Edmonds Community College
 
PACE-IT, Security+2.8: Disaster Recovery Concepts
Pace IT at Edmonds Community College
 

Recently uploaded (20)

PDF
Module 2: Public Health History [Tutorial Slides]
JonathanHallett4
 
PPTX
20250924 Navigating the Future: How to tell the difference between an emergen...
McGuinness Institute
 
PPTX
INTESTINALPARASITES OR WORM INFESTATIONS.pptx
PRADEEP ABOTHU
 
PPTX
CARE OF UNCONSCIOUS PATIENTS .pptx
AneetaSharma15
 
PPTX
family health care settings home visit - unit 6 - chn 1 - gnm 1st year.pptx
Priyanshu Anand
 
PPTX
Basics and rules of probability with real-life uses
ravatkaran694
 
PPTX
BASICS IN COMPUTER APPLICATIONS - UNIT I
suganthim28
 
PPTX
Python-Application-in-Drug-Design by R D Jawarkar.pptx
Rahul Jawarkar
 
PDF
2.Reshaping-Indias-Political-Map.ppt/pdf/8th class social science Exploring S...
Sandeep Swamy
 
PPTX
Measures_of_location_-_Averages_and__percentiles_by_DR SURYA K.pptx
Surya Ganesh
 
PPTX
Artificial-Intelligence-in-Drug-Discovery by R D Jawarkar.pptx
Rahul Jawarkar
 
PDF
What is CFA?? Complete Guide to the Chartered Financial Analyst Program
sp4989653
 
PPTX
Kanban Cards _ Mass Action in Odoo 18.2 - Odoo Slides
Celine George
 
PPTX
Dakar Framework Education For All- 2000(Act)
santoshmohalik1
 
PPTX
Artificial Intelligence in Gastroentrology: Advancements and Future Presprec...
AyanHossain
 
PPTX
Software Engineering BSC DS UNIT 1 .pptx
Dr. Pallawi Bulakh
 
PPTX
HEALTH CARE DELIVERY SYSTEM - UNIT 2 - GNM 3RD YEAR.pptx
Priyanshu Anand
 
PPTX
An introduction to Dialogue writing.pptx
drsiddhantnagine
 
PPTX
A Smarter Way to Think About Choosing a College
Cyndy McDonald
 
PDF
Review of Related Literature & Studies.pdf
Thelma Villaflores
 
Module 2: Public Health History [Tutorial Slides]
JonathanHallett4
 
20250924 Navigating the Future: How to tell the difference between an emergen...
McGuinness Institute
 
INTESTINALPARASITES OR WORM INFESTATIONS.pptx
PRADEEP ABOTHU
 
CARE OF UNCONSCIOUS PATIENTS .pptx
AneetaSharma15
 
family health care settings home visit - unit 6 - chn 1 - gnm 1st year.pptx
Priyanshu Anand
 
Basics and rules of probability with real-life uses
ravatkaran694
 
BASICS IN COMPUTER APPLICATIONS - UNIT I
suganthim28
 
Python-Application-in-Drug-Design by R D Jawarkar.pptx
Rahul Jawarkar
 
2.Reshaping-Indias-Political-Map.ppt/pdf/8th class social science Exploring S...
Sandeep Swamy
 
Measures_of_location_-_Averages_and__percentiles_by_DR SURYA K.pptx
Surya Ganesh
 
Artificial-Intelligence-in-Drug-Discovery by R D Jawarkar.pptx
Rahul Jawarkar
 
What is CFA?? Complete Guide to the Chartered Financial Analyst Program
sp4989653
 
Kanban Cards _ Mass Action in Odoo 18.2 - Odoo Slides
Celine George
 
Dakar Framework Education For All- 2000(Act)
santoshmohalik1
 
Artificial Intelligence in Gastroentrology: Advancements and Future Presprec...
AyanHossain
 
Software Engineering BSC DS UNIT 1 .pptx
Dr. Pallawi Bulakh
 
HEALTH CARE DELIVERY SYSTEM - UNIT 2 - GNM 3RD YEAR.pptx
Priyanshu Anand
 
An introduction to Dialogue writing.pptx
drsiddhantnagine
 
A Smarter Way to Think About Choosing a College
Cyndy McDonald
 
Review of Related Literature & Studies.pdf
Thelma Villaflores
 

PACE-IT: Common Threats (part 1)

  • 2. Page 2 Instructor, PACE-IT Program – Edmonds Community College Areas of Expertise Industry Certifications  PC Hardware  Network Administration  IT Project Management  Network Design  User Training  IT Troubleshooting Qualifications Summary Education  M.B.A., IT Management, Western Governor’s University  B.S., IT Security, Western Governor’s University Entrepreneur, executive leader, and proven manger with 10+ years of experience turning complex issues into efficient and effective solutions. Strengths include developing and mentoring diverse workforces, improving processes, analyzing business needs and creating the solutions required— with a focus on technology.
  • 3. Page 3 – Inside jobs or threats. – Outside threats. PACE-IT.
  • 5. Page 5 – Malicious employee. » This is difficult to defend against, as the threat is already inside the network. • Resources must be granted in order for employees to do their jobs. » One of the best defenses is using the principle of least privilege. • Only granting the least amount of authorization that is required for a person to get their work done. – Compromised system. » Once a PC or network device has been compromised, it is vitally important to isolate it from the system as a whole. • A compromised PC or network device could lead to a completely compromised network, as malware may be able to spread across connections. • Once malware gains access to network resources, it can be extremely difficult to root out and remove. Malware may also degrade the network’s performance. Common network threats I.
  • 6. Page 6 – Social engineering. » The process of using social pressure to cause somebody to compromise a system from inside the defenses of the network. • The pressure can be applied in multiple forms: by phone, in person, via email, through a rogue website, or by other methods. – ARP (Address Resolution Protocol) cache poisoning. » The ARP cache, which maps IP addresses to MAC addresses, is corrupted by an attacker with the end result being that the attacker has control of which IP addresses are associated with MAC addresses. • Commonly used in man-in-the-middle attacks. – Protocol or packet abuse. » The process of taking a specific protocol and repurposing it to perform a different function. • Commonly used to bypass a router’s access control list (ACL) from inside a network (e.g., encapsulating a not allowed protocol within a DNS (an allowed) protocol). Common network threats I.
  • 7. Page 7 – Man-in-the-middle attack. » The attacker is not necessarily inside the network per se, but is in between two end points that are communicating on a network. • In most cases, man-in-the-middle attacks involve disrupting the ARP process between the two end points. » The attack allows a malicious user to be able to view all network packets that are flowing between the communicating hosts. – VLAN hopping. » Circumventing the security that is inherent when virtual local area networks (VLANs) are created. Normally, traffic that is tagged for one VLAN is not allowed onto another VLAN without the intervention of a router. • VLAN hopping occurs when the attacker adds an additional fake VLAN tag to the network packets. Once the packet gets to the switch, the switch strips one of the VLAN tags off the packet and passes it through. Once through the switch, the packet is considered as belonging to the new VLAN. Common network threats I.
  • 9. Page 9 One of the largest threats that faces network security personnel is the unknown vulnerability. Network and systems administrators expend a fair amount of effort protecting the assets under their control and they can do a good job of hardening their systems, but not a perfect job. The problem lies with zero day attacks. Zero day attacks take advantage of either new or very recently discovered vulnerabilities, which means that networks and systems probably haven’t yet been hardened against them. The unfortunate reality is that attacks keep changing and security experts must also be willing to adapt in order to keep pace. Common network threats I.
  • 10. Page 10 – Brute force attacks. » Using computing power and time to compromise passwords. • The attacker uses a program that continually tries different password combinations (often in the form of a special dictionary application) in an effort to crack a password. – Spoofing. » A category of threats where either the MAC address or IP address of the attacker has been modified to look like a friendly address in order to bypass network security. • A common use in the past was to spoof the IP address, so that an outside attacker was actually viewed as an inside host. – Session hijacking. » An attacker attempts to take over a communication session after a user has been authenticated. • The hijacking can occur through various methods (e.g., using a packet sniffer to steal a session cookie or installing malware on a user’s computer that is activated after the user is authenticated). Common network threats I.
  • 11. Page 11 Common network threats I. Given the nature and purpose of networks, it can be difficult to make them secure. Common threats that come from within the network itself are: malicious employees, compromised systems, social engineering, ARP cache poisoning, protocol or packet abuse, man-in-the-middle attacks, and VLAN hopping. Topic Inside jobs or threats. Summary Of major concern to network security personnel are zero day attacks (the exploitation of previously unknown vulnerabilities) and it is imperative that they keep current with what is being developed. Other outside threats include: brute force attacks, spoofing attacks, and session hijacking. Outside threats.
  • 13. This workforce solution was 100 percent funded by a $3 million grant awarded by the U.S. Department of Labor's Employment and Training Administration. The solution was created by the grantee and does not necessarily reflect the official position of the U.S. Department of Labor. The Department of Labor makes no guarantees, warranties, or assurances of any kind, express or implied, with respect to such information, including any information on linked sites and including, but not limited to, accuracy of the information or its completeness, timeliness, usefulness, adequacy, continued availability or ownership. Funded by the Department of Labor, Employment and Training Administration, Grant #TC-23745-12-60-A-53. PACE-IT is an equal opportunity employer/program and auxiliary aids and services are available upon request to individuals with disabilities. For those that are hearing impaired, a video phone is available at the Services for Students with Disabilities (SSD) office in Mountlake Terrace Hall 159. Check www.edcc.edu/ssd for office hours. Call 425.354.3113 on a video phone for more information about the PACE-IT program. For any additional special accommodations needed, call the SSD office at 425.640.1814. Edmonds Community College does not discriminate on the basis of race; color; religion; national origin; sex; disability; sexual orientation; age; citizenship, marital, or veteran status; or genetic information in its programs and activities.