UNIT 3 SEC I PART 1 aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa

sahishpandav 8 views 98 slides Sep 08, 2024
Slide 1
Slide 1 of 98
Slide 1
1
Slide 2
2
Slide 3
3
Slide 4
4
Slide 5
5
Slide 6
6
Slide 7
7
Slide 8
8
Slide 9
9
Slide 10
10
Slide 11
11
Slide 12
12
Slide 13
13
Slide 14
14
Slide 15
15
Slide 16
16
Slide 17
17
Slide 18
18
Slide 19
19
Slide 20
20
Slide 21
21
Slide 22
22
Slide 23
23
Slide 24
24
Slide 25
25
Slide 26
26
Slide 27
27
Slide 28
28
Slide 29
29
Slide 30
30
Slide 31
31
Slide 32
32
Slide 33
33
Slide 34
34
Slide 35
35
Slide 36
36
Slide 37
37
Slide 38
38
Slide 39
39
Slide 40
40
Slide 41
41
Slide 42
42
Slide 43
43
Slide 44
44
Slide 45
45
Slide 46
46
Slide 47
47
Slide 48
48
Slide 49
49
Slide 50
50
Slide 51
51
Slide 52
52
Slide 53
53
Slide 54
54
Slide 55
55
Slide 56
56
Slide 57
57
Slide 58
58
Slide 59
59
Slide 60
60
Slide 61
61
Slide 62
62
Slide 63
63
Slide 64
64
Slide 65
65
Slide 66
66
Slide 67
67
Slide 68
68
Slide 69
69
Slide 70
70
Slide 71
71
Slide 72
72
Slide 73
73
Slide 74
74
Slide 75
75
Slide 76
76
Slide 77
77
Slide 78
78
Slide 79
79
Slide 80
80
Slide 81
81
Slide 82
82
Slide 83
83
Slide 84
84
Slide 85
85
Slide 86
86
Slide 87
87
Slide 88
88
Slide 89
89
Slide 90
90
Slide 91
91
Slide 92
92
Slide 93
93
Slide 94
94
Slide 95
95
Slide 96
96
Slide 97
97
Slide 98
98

About This Presentation

TC HEADER


Slide Content

III. Network Security Fundamentals

The process of overloading CAM table of switch by sending huge amount of ARP replies to it is known as MAC flooding. When the switch gets overloaded, it enters into hub mode . In hub mode, switch forwards the traffic to all the computers connected on the network. As a result, attacker could able to capture all the traffic using sniffing software. MAC Flooding Attack Content Addressable Memory

How to detect MAC flooding attack No single sign can confirm that your network is being targeted with a MAC flooding attack. The best option for detecting MAC flooding attacks is to monitor your network traffic for anomalous behavior. S udden surge in network traffic or a dramatic reduction in speed , that could be the result of the switch’s MAC address table being overloaded. In the event of a successful flooding attack, you may notice data being sent to your device that should have been passed to another device on your network.

MAC Spoofing Attack T hrough software, a fake MAC address can be inserted into outgoing communications.  Sending the same MAC Address like the actual user and spoof the network is called as  MAC spoofing . The destination will think that, the request is genuine but the  request is from the attacker . He used the same MAC address as the original user.

MAC Spoofing Attack

ARP Spoofing (ARP Poisoning) ARP Poisoning (also known as ARP Spoofing) is a type of cyber attack carried out over a Local Area Network (LAN) that involves sending malicious ARP packets to a default gateway on a LAN in order to change the pairings in its IP to MAC address table. 

ARP POISOING AND PORT MIRRORING

FIREWALL

A  proxy server  is a system or router that provides a gateway between users and the internet. Therefore, it helps prevent cyber attackers from entering a private network. It is a server, referred to as an “intermediary” because it goes between end-users and the web pages they visit online.

Proxies come with several benefits : Enhanced security : Can act like a firewall between your systems and the internet. Without them, hackers have easy access to your IP address, which they can use to infiltrate your computer or network. Private browsing, watching, listening, and shopping : Use different proxies to help you avoid getting inundated with unwanted ads or the collection of IP-specific data. With a proxy, site browsing is well-protected and impossible to track. Access to location-specific content : You can designate a proxy server with an address associated with another country. You can, in effect, make it look like you are in that country and gain full access to all the content computers in that country are allowed to interact with. For example, the technology can allow you to open location-restricted websites by using local IP addresses of the location you want to appear to be in.  Prevent employees from browsing inappropriate or distracting sites : You can use it to block access to websites that run contrary to your organization’s principles. Also, you can block sites that typically end up distracting employees from important tasks.

PROXY SERVER

Spam Filtering Spam filters are designed to identify incoming dangerous emails from attackers or marketers. Attackers often use emails that claim to offer a beneficial service or protect you from imminent danger, but they are really just clickbait, designed to get you to click on a link that downloads malicious software onto your computer or sends you to a dangerous site. Spam refers to any type of unwanted bulk communication. It is sent via email, text messages, social media, or phone calls. 

There are different types of spam filters for different criteria: Content filters – parse the content of messages, scanning for words that are commonly used in spam emails. Header filters – examine the email header source to look for suspicious information (such as spammer email addresses). Blocklist filters – stop emails that come from a blocklist of suspicious IP addresses. Some filters go further and check the IP reputation of the IP address. Rules-based filters – apply customized rules designed by the organization to exclude emails from specific senders, or emails containing specific words in their subject line or body.

Web content filtering is a technique that blocks and screens access to inappropriate or unsafe web content. Uses include a company keeping employees from visiting known spam sites or school systems restricting students from adult content. 

Intrusion detection and prevention systems (IDPS ) monitor networks for possible incidents and threats, alert administrators, and prevent potential attacks.

1. Signature-based detection A signature is a pattern that corresponds to a known threat comparing signatures against observed events to identify possible incidents. Advantage: Very effective at detecting known threats. Disadvantage: Ineffective at detecting previously unknown threats.

2. Anomaly-based detection The process of comparing definitions of what activity is considered normal against observed events to identify significant deviations. Capable of detecting previously unknown threats. Uses host or network-specific profiles. Anomaly detection is better than signature-based detection when considering new attacks that aren’t in the signature database.  

3. Stateful protocol analysis The process of comparing predetermined profiles of generally accepted definitions of benign protocol activity for each protocol state against observed events to identify deviations. Relies on vendor-developed universal profiles that specify how particular protocols should and should not be used.   Stateful protocol analysis goes one step further and uses the predefined standards of each protocol state to check for deviations.

A web security gateway, also known as a secure web gateway, is a device, cloud service, or application that is deployed at the boundaries of a network to monitor and stop malicious traffic from entering the organization, and to block users from accessing malicious or suspicious web resources. Standard features of a web security gateway may include URL filtering, virus and malware code detection, data leak prevention, and other application level control.
Tags