In today’s world, there are a number of potential attackers that can gain access to systems. As a result, the network security specialist must be vigilant in enforcing the Secure Access Control System.
- [Instructor] In the early days of computing security focused on protecting individual systems. As we see in this image, of the ENIAC, Electronic Numerical Integrator and Computer, which began calculating in 1945. And it was so big, it filled a room. At the time it was the only computer. However, in today's world there are a number of potential attackers that include nation states, competitors, hackers, and disgruntled employees that can gain access to our systems.
If we go to African Cyber Risk Institute, we can see examples of how to secure the network. This image lists 10 steps for organizational cyber security. Let's take a look. Network security means we protect our networks against external and internal attacks. On the upper right-hand corner, we see we should develop policies that include home and mobile networking, and train all employees on secure cyber practices while at home and on mobile devices.
Secure configuration. This means patch and configuration management of all systems. We can't overlook the need for policies that provide access control and proper use and disposal of removable media. Manage user privileges. Control access to all activities, and monitor all user activity which include people and processes such as file transfer protocol.
At the bottom we see incident management. All companies should establish an incident response and disaster recovery program, so that you're prepared in case of an incident or disaster. Over in the left-hand corner lists user education and awareness. Which is critical in an infrastructure as people can be our weakest link. Establish monitoring strategy and produce supporting policies to monitor all your systems and analyze your logs for unusual activity that can indicate an attack.
And malware protection against all business areas. Today's networks are very complex, networked, and interconnected, as we see from this graphic of a campus area network. Most organizations have multiple attack vectors that can lead to unauthorized access of your network. In general, there are a lot of moving parts to manage and secure an enterprise network that include technical, physical, and administrative controls.
The network security specialist is responsible for some of the physical aspects, such as ensuring the server room doors are properly locked, along with the technical or logical controls such as access control lists and intrusion detection, intrusion prevention signatures, and implementing password policies. When dealing with the various networking devices as they move data throughout the network, there are three planes. The management plane.
Now this is where the connection between the workstation and the managed devices where the administrator monitors and configures services on the device, that would be possibly a router or a switch. Protocols in this plane include Telnet, File Transfer Protocol, Secure FTP, Simple Network Management Protocol, and Secure Shell. The control plane is responsible for routing protocols and routers that talk with one another.
Protocols in this plane work independently of the network administrator. They work on their own and include routing protocols such as Open Shortest Path First, Intermediary System - Intermediary System, and Enhanced Interior Gateway Routing Protocol, along with other protocols such as IGMP, Protocol Independent Multicast, ICMP and ARP. The data plane processes and moves user traffic.
The data plane influences and controls the flow of data by using access control lists and quality of service. In this graphic, we see all three planes. The management plane is independent, and that's because this is where the administrator gains access to the individual device. In the control and data plane, we see the interaction among the devices. In today's world, there are a number of potential attackers that can gain access to our systems.
As a result, the network security specialist must be vigilant in enforcing secure access control.
- Packet Tracer
- Compare in-band and out-of-band management
- Configuring SNMP
- Securing Copy Protocol
- AAA security: authentication, authorization, and accounting
- RADIUS and TACACS+
- BYOD architecture
- MDM and IoT security