From the course: CISSP Cert Prep (2021): 4 Communication and Network Security
Unlock the full course today
Join today to access over 22,500 courses taught by industry experts or purchase this course individually.
Maintaining network availability
From the course: CISSP Cert Prep (2021): 4 Communication and Network Security
Maintaining network availability
- [Instructor] Sometimes attackers try to undermine network security by denying legitimate users access to the network. Let's take a look at some techniques that you can implement to defend your network against these attacks. Many denial of service attacks rely upon flooding devices with traffic until they're overwhelmed. One example of this type of attack is the SYN Flood. In a SYN Flood attack, the attacker creates thousands of partially open TCP connections to a device by sending SYN packets, but never answering the SYN-ACK packet to complete the three-way handshake. This was one example of flooding and there were many similar attacks in the hackers' toolkit. Another example, MAC flooding, occurs when attackers send large numbers of different MAC addresses to a switch hoping to overflow the switch's MAC address table and cause it to forget where devices are and then flood traffic out to every switch port, allowing the…
Contents
-
-
-
-
-
-
Restricting network access2m 8s
-
(Locked)
Network access control4m 30s
-
(Locked)
Firewall rule management4m 9s
-
(Locked)
Router configuration security4m 5s
-
(Locked)
Switch configuration security3m 42s
-
(Locked)
Maintaining network availability2m 34s
-
(Locked)
Network monitoring4m 2s
-
(Locked)
SNMP2m 54s
-
(Locked)
Isolating sensitive systems1m 58s
-
(Locked)
Deception technologies2m 51s
-
(Locked)
Network support1m 35s
-
-
-
-
-
-
-