- 大約有60~80的網路濫用(misuse)是出自於內部網路
- 三個安全的目標為
- confidentiality (Keep Data Private)
- integrity (Data has not been modified in transmit)
- availability (A measure of the data’s accessibility)
- 政府和軍隊使用的機密等級範例
- Unclassified
- Sensitive but unclassified(SBU)
- Confidential
- Secret
- Top-Secret
- 美國政府的三種機密等級
- Confidential
- Secret
- Top-Secret
- 組織使用的機密等級範例
- Public
- Sensitive
- Private
- Confidential
- 可用於資料分級的特徵
- 價值 (Value)
- 年份 (Age)
- 可用期 (Useful life)
- 相關者 (Personal association)
- 分類原則
- Owner
- Custodian (保管人)
- User
- 安全方案控制
- Administrative Control
- Physical Control
- Technical Control
- 承8. 以上方法又可以分為下列的控制方案
- Preventive
- Deterrent (遏止的)
- Detective
- 描述安全事件需要紀錄的項目
- Motive
- Means
- Opportunity.
- 不同等級的法律規範
- Criminal law
- Civil law
- Administrative law
- 五種概分的攻擊種類
- Passive
- Active
- Close-in
- Insider
- Distribution
- Defense in Depth design philosophy
- Defend multiple attack targets in the network
- Create overlapping defenses
- Let the value of protected resource dictate the strength of the security mechanism
- Use strong encryption technologies
- AES
- PKI
- NIDS, NIPS, HIPS
- NIDS (Network-based Intrusion Detection System)
- NIPS (Network-based Intrusion Prevention System)
- HIPS (Host-based Intrusion Prevention System)
- Types of IP Spoofing Attacks
- NonBlind Spoofing (攻擊者和目標在同一個subnet)
- Blind Spoofing (攻擊者和目標在不同subnet)
- Source Routing 的二種類型
- Loose
- Strict
- 防止IP spoofing Attacking的方法
- ACL
- IPsec tunnel
- cryptographic authentication
- 機密性攻擊方法
- Packet Capture
- Ping sweep and port scan
- Dumpster diving
- EMI interception
- Wiretapping
- Social engineering
- Sending information over overt channels
- Sending information over covert channels
- 完整性攻擊方法
- Salami Attack
- Data diddling
- Trust relationship exploitation
- Password attack
- Trojan horse
- Packet capture
- Keylogger
- Brute force
- Dictionary attack
- Botnet
- Hijacking a session
- 可用性攻擊方法
- Denial of Service (DoS)
- Distributed denial of service (DDoS)
- TCP SYN flood
- ICMP attacks
- Electrical disturbances
- Power Spike
- Electrical surge
- Power fault
- Blackout
- Power sag
- Brownout
- Attacks on a system’s physical environment
- Temperature
- Humidity
- Gas
- Jul 18 Wed 2012 14:35
CCNA Security Chap 1
- Jun 28 Thu 2012 14:31
CCNP TSHOOT Chap 1
- 歸類於Network Maintenance的工作
- Hardware and software installation and configuration
- Troubleshooting problem reports
- Monitoring and tuning network performance
- Planning for network expansion
- Documenting the network and day changes made to the network
- Ensuring compliance with legal regulations and corporate policies
- Securing the network against internal and external threats
- 網路維護工作可被分為二類
- Structured tasks
- Interrupt-driven tasks
- 眾所皆知的網路維護方法
- FCAPS
- Fault Management
- Configuration Management
- Accounting Management
- Performance Management
- Security Management
- ITIL: IT infrastructure Library
- TMN
- Cisco Lifecycle Services
- FCAPS
- 日常維護工作
- Configuration changes
- Replacement of older or failed hardware
- Scheduled backups
- Updating Software
- Monitoring network performance
- 進行網路設定變更應注意事項
- Who is responsible for authorizing various types of network changes
- Which task should only be performed during scheduled maintenance windows
- What procedures should be followed prior to making a change
- What measureable criteria determine the success or failure of a network change
- How will a network change be documented, and who is responsible for the doucmentation
- How will a rollback plan be created, such that a configuration can be restored to its previous state if the changes resulted in unexpected problems
- Under what circumstances can formalized change management policies be overriden, and what (if any) authorization is required for an override
- 通常會紀錄在網路文件中的資訊
- Logical topology diagram
- Physical topology diagram
- Listing of interconnections
- Inventory of network equipment
- IP address assignments
- Configuration Information
- Original Design Document
- 為了快速從設備故障中回復網路,平時應準備好下列材料
- 另一台相同的硬體
- 相同的軟體,以及設定還有授權檔
- 設備的組態檔備份
- 以下指令可以設定每天備份組態檔
archive
path ftp://192.168.1.1/R1-config
write-memory
- Jun 21 Thu 2012 14:32
IPsec
- IPsec offers the following protections for VPN Traffic
- Confidentiality
- Integrity
- Authentication
- IPsec use a collection of protocols to provide its features. One of the primary protocol it use is Internet Key Exchange(IKE).
- Main Mode
- Aggressive Mode
- Quick Mode
- IPsec relies on
- Authentication Header (AH), Protocol 51
- Encapsulating Securit Payload (ESP), Protocol 50
- May 07 Mon 2012 14:21
CISCO IOS 密碼設定要項
- 使用security password min-length 10可以限制密碼的長度至少要10個字元
- 除了第一個字元之外,空白也可以被當作密碼的一部分。
- username username security 5 hash_value,5代表密碼是hash過的
- no service password-recovery 可以讓機器無法再進行ROMMON密碼恢復的程序。
- security authentication failure rate numbers,如果輸入密碼的錯誤次數大於numbers,就暫停15秒。
- May 03 Thu 2012 14:30
SDLC 的五個階段
- 初始(Initiation)
- 需求與開發(Acquisition and development)
- 建置(Implementation)
- 運作和維護(Operations and maintenance)
- 部署(Disposition)
- Apr 19 Thu 2012 23:15
新增VLAN應注意事項
- 使用show vlan確定拓撲內的SWITCH都有正確設定VLAN
- 使用確定trunk links被設定為可以傳送新VLAN。(這裡這Trunk link 應該是指vlan trunk)
- Apr 17 Tue 2012 23:16
CISCO PPDIOO
- P: Prepare, Implementation requirements are determined.
- P: Plan, Current infrastructure is examined.
- D: Design, A detailed implementation plan is created.
- I: Implement, A predefined test plan is executed.
- O: Operate, Routine maintenance is performance.
- O: Optimize, Audits and upgrades are performed.
- Apr 15 Sun 2012 23:17
在網路內新增設定的注意事項
- 每個步驟的描述
- 每個步驟的時間估算
- 萬一失敗的回復方法
- 將過程紀錄下來