SlideShare ist ein Scribd-Unternehmen logo
1 von 15
Common network
vulnerabilities.
Page 2
Instructor, PACE-IT Program – Edmonds Community College
Areas of Expertise Industry Certification
 PC Hardware
 Network Administration
 IT Project Management
 Network Design
 User Training
 IT Troubleshooting
Qualifications Summary
Education
 M.B.A., IT Management, Western Governor’s University
 B.S., IT Security, Western Governor’s University
Entrepreneur, executive leader, and proven manger
with 10+ years of experience turning complex issues
into efficient and effective solutions.
Strengths include developing and mentoring diverse
workforces, improving processes, analyzing
business needs and creating the solutions
required— with a focus on technology.
Page 3
– Vulnerabilities associated with
unsecure protocols.
– Vulnerable network practices.
PACE-IT.
Page 4
Common network vulnerabilities.
Page 5
Network security is never a
completely done deal. It
often seems as if, as soon as
one hole is plugged, another
opens up.
While this is true, there are still steps that
administrators should take to reduce the
vulnerabilities that exist in the systems under their
control.
By reducing known vulnerabilities, administrators
can then spend their time preparing for and
reducing exposure to up and coming threats.
Common network vulnerabilities.
Page 6
– Telnet.
» A protocol that is used to create a virtual terminal connection
that is commonly used in troubleshooting.
» Telnet is very unsecure because all communication occurs in
clear text—telnet doesn’t support encryption.
• Whenever possible, SSH (Secure Shell) should be used in
place of Telnet.
– SNMP (Simple Network Management
Protocol) v.1 and 2.
» Protocols that are used to remotely manage and configure
network devices.
» Due to a lack of encryption support, versions 1 and 2 are
unsecure and are susceptible to packet sniffers.
• SNMP v.3 should be used whenever possible, as it supports
more security.
Common network vulnerabilities.
Page 7
– FTP (File Transfer Protocol).
» A protocol used to transfer files across a network connection.
» While a username and password are required in most cases to
use FTP, it doesn’t support encryption, which creates a
vulnerability in the process.
• SFTP (Secure FTP) should be used in place of FTP, as it
creates an SSH FTP session.
– TFTP (Trivial File Transfer Protocol).
» A simple stripped down version of FTP that doesn’t support
authentication like standard FTP. It is commonly used to
download configuration files to networking equipment.
• TFTP should only be used when a connection to networking
equipment is made through the console port, thus eliminating
the possibility of eavesdropping.
Common network vulnerabilities.
Page 8
– HTTP (Hypertext Transfer Protocol).
» Protocol used to send and receive data over the Internet.
» It is unsecure in its basic format and susceptible to being
intercepted due to its lack of encryption.
• HTTPS (HTTP Secure) should be used when conducting
sensitive business over the Internet, as it will provide
encryption and other security services.
– SLIP (Serial Line IP).
» An early protocol developed for communicating over serial
ports and modem connections that requires a static IP address.
» Very outdated and unsecure, SLIP doesn’t support encryption.
• PPP (Point-to-Point Protocol) should be used in place of
SLIP.
Common network vulnerabilities.
Page 9
Common network vulnerabilities.
Page 10
– Unpatched or legacy systems.
» Unpatched systems are, by their very nature, unsecure.
• Keeping all operating systems and applications up to date will
reduce vulnerabilities in the network.
» In some situations, it is necessary to keep legacy systems
alive. This can create vulnerabilities in the system, as
weaknesses in these systems tend to be well known.
• Special security measures should be taken with legacy
systems in order to reduce the opportunities for exploitation.
– Open ports.
» An open port—either a physical or application port—on the
network is a hole in the security of the network that may be
exploited.
» While not all open ports can be or should be closed, security
should be placed on those ports that need to remain open to
reduce the vulnerability of the network.
• A good practice is to use a port scanner periodically to verify
that only absolutely required application ports are open.
Common network vulnerabilities.
Page 11
– Unnecessary running services.
» Operating system services are used to perform some function
within the system, but it is possible for them to be exploited.
• A periodic review of all running services should be conducted
on all equipment that attaches to the network. All unnecessary
running services should be disabled.
– Clear text credentials.
» Many applications and devices require the use of credentials in
order to be used. In some cases, these credentials are sent in
clear text format, which makes them easily read when
captured.
• A good practice is to periodically review all applications and
systems to determine which ones use clear text credentials;
then, either limit their use or figure out how to encrypt the
transmissions.
Common network vulnerabilities.
Page 12
– Unencrypted channels.
» Any method of communication on the network that is not
encrypted is an unencrypted channel that is subject to being
breached.
» While not all communications channels need to be encrypted, a
good practice is to review all channels and make a decision
about which ones need to be encrypted and which ones do not.
• All wireless network channels should be encrypted—no
exceptions.
– RF (radio frequency) emanation.
» One method of intercepting communication is to analyze signal
leakage (e.g., RF emanations). Many forms of communication
are subject to these signal emanations, but there are steps that
can be taken to reduce them.
• TEMPEST is a set of standards established by the NSA
(National Security Agency) and NATO (North Atlantic Treaty
Organization) that outlines steps that can be used to reduce
the opportunity for interception and analysis of
communication.
Common network vulnerabilities.
Page 13
Common network vulnerabilities.
Security is never a completed task. It is always an ongoing concern.
Administrators can take steps to reduce their exposure to known
vulnerabilities. Some known vulnerable protocols include: Telnet, SNMP v.1
and v.2, FTP, TFTP, HTTP, and SLIP.
Topic
Vulnerabilities associated
with unsecure protocols.
Summary
Unpatched and legacy systems are vulnerable to exploitation. An open port
is a hole in the security of the system. All unused ports should be closed. It
is possible to exploit running services, so all unnecessary services should
be disabled. Administrators should know which applications send
credentials in clear text and take steps to reduce the security risk posed by
them. Unencrypted communication channels are subject to interception; a
review of all channels should be conducted to reduce this vulnerability. All
wireless communications channels should be encrypted. It is possible to
intercept communication by capturing and analyzing RF emanations;
TEMPEST is a set of specifications that reduces this vulnerability.
Vulnerable network practices.
Page 14
THANK YOU!
This workforce solution was 100 percent funded by a $3 million grant awarded by the
U.S. Department of Labor's Employment and Training Administration. The solution was
created by the grantee and does not necessarily reflect the official position of the U.S.
Department of Labor. The Department of Labor makes no guarantees, warranties, or
assurances of any kind, express or implied, with respect to such information, including
any information on linked sites and including, but not limited to, accuracy of the
information or its completeness, timeliness, usefulness, adequacy, continued availability
or ownership. Funded by the Department of Labor, Employment and Training
Administration, Grant #TC-23745-12-60-A-53.
PACE-IT is an equal opportunity employer/program and auxiliary aids and services are
available upon request to individuals with disabilities. For those that are hearing
impaired, a video phone is available at the Services for Students with Disabilities (SSD)
office in Mountlake Terrace Hall 159. Check www.edcc.edu/ssd for office hours. Call
425.354.3113 on a video phone for more information about the PACE-IT program. For
any additional special accommodations needed, call the SSD office at 425.640.1814.
Edmonds Community College does not discriminate on the basis of race; color; religion;
national origin; sex; disability; sexual orientation; age; citizenship, marital, or veteran
status; or genetic information in its programs and activities.

Weitere ähnliche Inhalte

Was ist angesagt?

Was ist angesagt? (20)

PACE-IT: Basic Forensic Concepts
PACE-IT: Basic Forensic ConceptsPACE-IT: Basic Forensic Concepts
PACE-IT: Basic Forensic Concepts
 
PACE-IT: Common Threats (part 2)
PACE-IT: Common Threats (part 2)PACE-IT: Common Threats (part 2)
PACE-IT: Common Threats (part 2)
 
PACE-IT, Security+1.2: Secure Network Administration Concepts
PACE-IT, Security+1.2: Secure Network Administration ConceptsPACE-IT, Security+1.2: Secure Network Administration Concepts
PACE-IT, Security+1.2: Secure Network Administration Concepts
 
PACE-IT, Security+1.1: Introduction to Network Devices (part 2)
PACE-IT, Security+1.1: Introduction to Network Devices (part 2)PACE-IT, Security+1.1: Introduction to Network Devices (part 2)
PACE-IT, Security+1.1: Introduction to Network Devices (part 2)
 
PACE-IT, Security+1.1: Introduction to Network Devices (part 3)
PACE-IT, Security+1.1: Introduction to Network Devices (part 3)PACE-IT, Security+1.1: Introduction to Network Devices (part 3)
PACE-IT, Security+1.1: Introduction to Network Devices (part 3)
 
PACE-IT: Common WAN Components and Issues
PACE-IT: Common WAN Components and IssuesPACE-IT: Common WAN Components and Issues
PACE-IT: Common WAN Components and Issues
 
PACE-IT, Security+1.5: Wireless Security Considerations
PACE-IT, Security+1.5: Wireless Security ConsiderationsPACE-IT, Security+1.5: Wireless Security Considerations
PACE-IT, Security+1.5: Wireless Security Considerations
 
PACE-IT, Security+1.3: Secure Network Design Elements and Components
PACE-IT, Security+1.3: Secure Network Design Elements and ComponentsPACE-IT, Security+1.3: Secure Network Design Elements and Components
PACE-IT, Security+1.3: Secure Network Design Elements and Components
 
PACE-IT, Security+2.6: Security Related Awareness and Training
PACE-IT, Security+2.6: Security Related Awareness and TrainingPACE-IT, Security+2.6: Security Related Awareness and Training
PACE-IT, Security+2.6: Security Related Awareness and Training
 
PACE-IT, Security+1.4: Common Network Protocols (part 3)
PACE-IT, Security+1.4: Common Network Protocols (part 3)PACE-IT, Security+1.4: Common Network Protocols (part 3)
PACE-IT, Security+1.4: Common Network Protocols (part 3)
 
PACE-IT, Security+1.1: Introduction to Network Devices (part 1)
PACE-IT, Security+1.1: Introduction to Network Devices (part 1)PACE-IT, Security+1.1: Introduction to Network Devices (part 1)
PACE-IT, Security+1.1: Introduction to Network Devices (part 1)
 
PACE-IT: Network Access Control
PACE-IT: Network Access ControlPACE-IT: Network Access Control
PACE-IT: Network Access Control
 
Pace IT - Common Security Threats
Pace IT - Common Security ThreatsPace IT - Common Security Threats
Pace IT - Common Security Threats
 
PACE-IT, Security+3.4: Summary of Wireless Attacks
PACE-IT, Security+3.4: Summary of Wireless AttacksPACE-IT, Security+3.4: Summary of Wireless Attacks
PACE-IT, Security+3.4: Summary of Wireless Attacks
 
PACE-IT: Troubleshooting Wireless Networks (part 1)
PACE-IT: Troubleshooting Wireless Networks (part 1)PACE-IT: Troubleshooting Wireless Networks (part 1)
PACE-IT: Troubleshooting Wireless Networks (part 1)
 
PACE-IT, Security+1.4: Common Network Protocols (part 1)
PACE-IT, Security+1.4: Common Network Protocols (part 1)PACE-IT, Security+1.4: Common Network Protocols (part 1)
PACE-IT, Security+1.4: Common Network Protocols (part 1)
 
Pace it troubleshooting-common_network_issues_bf
Pace it troubleshooting-common_network_issues_bfPace it troubleshooting-common_network_issues_bf
Pace it troubleshooting-common_network_issues_bf
 
PACE-IT, Security+ 4.3: Solutions to Establish Host Security
PACE-IT, Security+ 4.3: Solutions to Establish Host SecurityPACE-IT, Security+ 4.3: Solutions to Establish Host Security
PACE-IT, Security+ 4.3: Solutions to Establish Host Security
 
PACE-IT, Security+1.3: Cloud Concepts
PACE-IT, Security+1.3: Cloud ConceptsPACE-IT, Security+1.3: Cloud Concepts
PACE-IT, Security+1.3: Cloud Concepts
 
PACE-IT, Security+2.7: Physical Security and Enviornmental Controls
PACE-IT, Security+2.7: Physical Security and Enviornmental ControlsPACE-IT, Security+2.7: Physical Security and Enviornmental Controls
PACE-IT, Security+2.7: Physical Security and Enviornmental Controls
 

Andere mochten auch (9)

Benefici Del Project Management
Benefici Del Project ManagementBenefici Del Project Management
Benefici Del Project Management
 
Præsentation crm thoms munk rasmussen
Præsentation crm thoms munk rasmussenPræsentation crm thoms munk rasmussen
Præsentation crm thoms munk rasmussen
 
Spring Seminar Series
Spring Seminar SeriesSpring Seminar Series
Spring Seminar Series
 
100832
100832100832
100832
 
0111
01110111
0111
 
WQ Interculturalidad
WQ InterculturalidadWQ Interculturalidad
WQ Interculturalidad
 
Change yourself as leader
Change yourself as leaderChange yourself as leader
Change yourself as leader
 
Virus informaticos
Virus informaticosVirus informaticos
Virus informaticos
 
Conversations and Conversions- Eshant Mishra- Business Leader IBM Customer En...
Conversations and Conversions- Eshant Mishra- Business Leader IBM Customer En...Conversations and Conversions- Eshant Mishra- Business Leader IBM Customer En...
Conversations and Conversions- Eshant Mishra- Business Leader IBM Customer En...
 

Ähnlich wie PACE-IT: Common Network Vulnerabilities

Presentation, Firewalls
Presentation, FirewallsPresentation, Firewalls
Presentation, Firewalls
kkkseld
 

Ähnlich wie PACE-IT: Common Network Vulnerabilities (20)

Pace IT - Threats & Vulnerabilities Mitigation
Pace IT - Threats & Vulnerabilities MitigationPace IT - Threats & Vulnerabilities Mitigation
Pace IT - Threats & Vulnerabilities Mitigation
 
PACE-IT: Network Monitoring (part 1) - N10 006
PACE-IT: Network Monitoring (part 1) - N10 006 PACE-IT: Network Monitoring (part 1) - N10 006
PACE-IT: Network Monitoring (part 1) - N10 006
 
PACE-IT: Network Monitoring (part 2) - N10 006
PACE-IT: Network Monitoring (part 2) - N10 006 PACE-IT: Network Monitoring (part 2) - N10 006
PACE-IT: Network Monitoring (part 2) - N10 006
 
PACE-IT: Analyzing Monitoring Reports
PACE-IT: Analyzing Monitoring ReportsPACE-IT: Analyzing Monitoring Reports
PACE-IT: Analyzing Monitoring Reports
 
Pace IT - Network Devices (part 2)
Pace IT - Network Devices (part 2)Pace IT - Network Devices (part 2)
Pace IT - Network Devices (part 2)
 
PACE-IT: Introduction_to Network Devices (part 2) - N10 006
PACE-IT: Introduction_to Network Devices (part 2) - N10 006 PACE-IT: Introduction_to Network Devices (part 2) - N10 006
PACE-IT: Introduction_to Network Devices (part 2) - N10 006
 
PACE-IT: Networking Services and Applications (part 1) - N10 006
PACE-IT: Networking Services and Applications (part 1) - N10 006PACE-IT: Networking Services and Applications (part 1) - N10 006
PACE-IT: Networking Services and Applications (part 1) - N10 006
 
PACE-IT: Configuring Switches (part 1)
PACE-IT: Configuring Switches (part 1)PACE-IT: Configuring Switches (part 1)
PACE-IT: Configuring Switches (part 1)
 
Presentation, Firewalls
Presentation, FirewallsPresentation, Firewalls
Presentation, Firewalls
 
Pace IT - Troubleshooting Networks Wired
Pace IT - Troubleshooting Networks WiredPace IT - Troubleshooting Networks Wired
Pace IT - Troubleshooting Networks Wired
 
PACE-IT: Troubleshooting Connectivity With Utilities
PACE-IT: Troubleshooting Connectivity With UtilitiesPACE-IT: Troubleshooting Connectivity With Utilities
PACE-IT: Troubleshooting Connectivity With Utilities
 
PACE-IT: Introduction_to Routing Concepts (part 1) - N10 006
PACE-IT: Introduction_to Routing Concepts (part 1) - N10 006PACE-IT: Introduction_to Routing Concepts (part 1) - N10 006
PACE-IT: Introduction_to Routing Concepts (part 1) - N10 006
 
PACE-IT, Security+1.4: Common Network Protocols (part 2)
PACE-IT, Security+1.4: Common Network Protocols (part 2)PACE-IT, Security+1.4: Common Network Protocols (part 2)
PACE-IT, Security+1.4: Common Network Protocols (part 2)
 
Pace IT - Command Line Networking
Pace IT - Command Line NetworkingPace IT - Command Line Networking
Pace IT - Command Line Networking
 
PACE-IT, Security+3.6: Security Enhancement Techniques
PACE-IT, Security+3.6: Security Enhancement TechniquesPACE-IT, Security+3.6: Security Enhancement Techniques
PACE-IT, Security+3.6: Security Enhancement Techniques
 
PACE-IT: Troubleshooting Common Network Issues
PACE-IT: Troubleshooting Common Network IssuesPACE-IT: Troubleshooting Common Network Issues
PACE-IT: Troubleshooting Common Network Issues
 
PACE-IT: Network Infrastructure Implementations - N10 006
PACE-IT: Network Infrastructure Implementations - N10 006 PACE-IT: Network Infrastructure Implementations - N10 006
PACE-IT: Network Infrastructure Implementations - N10 006
 
Pace IT - Basic Mobile Network
Pace IT - Basic Mobile NetworkPace IT - Basic Mobile Network
Pace IT - Basic Mobile Network
 
Deploying Network Taps for Improved Security
Deploying Network Taps for Improved SecurityDeploying Network Taps for Improved Security
Deploying Network Taps for Improved Security
 
Pace IT - Tools for Working on Networks
Pace IT - Tools for Working on NetworksPace IT - Tools for Working on Networks
Pace IT - Tools for Working on Networks
 

Mehr von Pace IT at Edmonds Community College

Mehr von Pace IT at Edmonds Community College (20)

PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)
 
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)
 
PACE-IT, Security+ 6.2: Cryptographic Methods (part 2)
PACE-IT, Security+ 6.2: Cryptographic Methods (part 2)PACE-IT, Security+ 6.2: Cryptographic Methods (part 2)
PACE-IT, Security+ 6.2: Cryptographic Methods (part 2)
 
PACE-IT, Security+ 6.2: Cryptographic Methods (part 1)
PACE-IT, Security+ 6.2: Cryptographic Methods (part 1)PACE-IT, Security+ 6.2: Cryptographic Methods (part 1)
PACE-IT, Security+ 6.2: Cryptographic Methods (part 1)
 
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 1)
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 1)PACE-IT, Security+ 6.1: Introduction to Cryptography (part 1)
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 1)
 
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 2)
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 2)PACE-IT, Security+ 6.1: Introduction to Cryptography (part 2)
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 2)
 
PACE-IT, Security + 5.3: Security Controls for Account Management
PACE-IT, Security + 5.3: Security Controls for Account ManagementPACE-IT, Security + 5.3: Security Controls for Account Management
PACE-IT, Security + 5.3: Security Controls for Account Management
 
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 2)
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 2)PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 2)
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 2)
 
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 1)
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 1)PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 1)
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 1)
 
PACE-IT, Security + 5.1: Summary of Authentication Services
PACE-IT, Security + 5.1: Summary of Authentication ServicesPACE-IT, Security + 5.1: Summary of Authentication Services
PACE-IT, Security + 5.1: Summary of Authentication Services
 
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)
 
PACE-IT, Security+ 4.1: Application Security Controls and Techniques
PACE-IT, Security+ 4.1: Application Security Controls and TechniquesPACE-IT, Security+ 4.1: Application Security Controls and Techniques
PACE-IT, Security+ 4.1: Application Security Controls and Techniques
 
PACE-IT, Security+ 4.5: Mitigating Risks in Alternative Environments
PACE-IT, Security+ 4.5: Mitigating Risks in Alternative EnvironmentsPACE-IT, Security+ 4.5: Mitigating Risks in Alternative Environments
PACE-IT, Security+ 4.5: Mitigating Risks in Alternative Environments
 
PACE-IT, Security+ 4.4: Controls to Ensure Data Security
PACE-IT, Security+ 4.4: Controls to Ensure Data SecurityPACE-IT, Security+ 4.4: Controls to Ensure Data Security
PACE-IT, Security+ 4.4: Controls to Ensure Data Security
 
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
 
PACE-IT, Security+3.7: Overview of Security Assessment Tools
PACE-IT, Security+3.7: Overview of Security Assessment ToolsPACE-IT, Security+3.7: Overview of Security Assessment Tools
PACE-IT, Security+3.7: Overview of Security Assessment Tools
 
PACE-IT, Security+3.5: Types of Application Attacks (part 2)
PACE-IT, Security+3.5: Types of Application Attacks (part 2)PACE-IT, Security+3.5: Types of Application Attacks (part 2)
PACE-IT, Security+3.5: Types of Application Attacks (part 2)
 
PACE-IT, Security+3.5: Types of Application Attacks (part 1)
PACE-IT, Security+3.5: Types of Application Attacks (part 1)PACE-IT, Security+3.5: Types of Application Attacks (part 1)
PACE-IT, Security+3.5: Types of Application Attacks (part 1)
 
PACE-IT, Security+3.3: Summary of Social Engineering Attacks
PACE-IT, Security+3.3: Summary of Social Engineering AttacksPACE-IT, Security+3.3: Summary of Social Engineering Attacks
PACE-IT, Security+3.3: Summary of Social Engineering Attacks
 
PACE-IT, Security+3.2: Summary of Types of Attacks (part 2)
PACE-IT, Security+3.2: Summary of Types of Attacks (part 2)PACE-IT, Security+3.2: Summary of Types of Attacks (part 2)
PACE-IT, Security+3.2: Summary of Types of Attacks (part 2)
 

Kürzlich hochgeladen

Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
kauryashika82
 

Kürzlich hochgeladen (20)

Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
Dyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxDyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptx
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
Third Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptxThird Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptx
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 

PACE-IT: Common Network Vulnerabilities

  • 2. Page 2 Instructor, PACE-IT Program – Edmonds Community College Areas of Expertise Industry Certification  PC Hardware  Network Administration  IT Project Management  Network Design  User Training  IT Troubleshooting Qualifications Summary Education  M.B.A., IT Management, Western Governor’s University  B.S., IT Security, Western Governor’s University Entrepreneur, executive leader, and proven manger with 10+ years of experience turning complex issues into efficient and effective solutions. Strengths include developing and mentoring diverse workforces, improving processes, analyzing business needs and creating the solutions required— with a focus on technology.
  • 3. Page 3 – Vulnerabilities associated with unsecure protocols. – Vulnerable network practices. PACE-IT.
  • 4. Page 4 Common network vulnerabilities.
  • 5. Page 5 Network security is never a completely done deal. It often seems as if, as soon as one hole is plugged, another opens up. While this is true, there are still steps that administrators should take to reduce the vulnerabilities that exist in the systems under their control. By reducing known vulnerabilities, administrators can then spend their time preparing for and reducing exposure to up and coming threats. Common network vulnerabilities.
  • 6. Page 6 – Telnet. » A protocol that is used to create a virtual terminal connection that is commonly used in troubleshooting. » Telnet is very unsecure because all communication occurs in clear text—telnet doesn’t support encryption. • Whenever possible, SSH (Secure Shell) should be used in place of Telnet. – SNMP (Simple Network Management Protocol) v.1 and 2. » Protocols that are used to remotely manage and configure network devices. » Due to a lack of encryption support, versions 1 and 2 are unsecure and are susceptible to packet sniffers. • SNMP v.3 should be used whenever possible, as it supports more security. Common network vulnerabilities.
  • 7. Page 7 – FTP (File Transfer Protocol). » A protocol used to transfer files across a network connection. » While a username and password are required in most cases to use FTP, it doesn’t support encryption, which creates a vulnerability in the process. • SFTP (Secure FTP) should be used in place of FTP, as it creates an SSH FTP session. – TFTP (Trivial File Transfer Protocol). » A simple stripped down version of FTP that doesn’t support authentication like standard FTP. It is commonly used to download configuration files to networking equipment. • TFTP should only be used when a connection to networking equipment is made through the console port, thus eliminating the possibility of eavesdropping. Common network vulnerabilities.
  • 8. Page 8 – HTTP (Hypertext Transfer Protocol). » Protocol used to send and receive data over the Internet. » It is unsecure in its basic format and susceptible to being intercepted due to its lack of encryption. • HTTPS (HTTP Secure) should be used when conducting sensitive business over the Internet, as it will provide encryption and other security services. – SLIP (Serial Line IP). » An early protocol developed for communicating over serial ports and modem connections that requires a static IP address. » Very outdated and unsecure, SLIP doesn’t support encryption. • PPP (Point-to-Point Protocol) should be used in place of SLIP. Common network vulnerabilities.
  • 9. Page 9 Common network vulnerabilities.
  • 10. Page 10 – Unpatched or legacy systems. » Unpatched systems are, by their very nature, unsecure. • Keeping all operating systems and applications up to date will reduce vulnerabilities in the network. » In some situations, it is necessary to keep legacy systems alive. This can create vulnerabilities in the system, as weaknesses in these systems tend to be well known. • Special security measures should be taken with legacy systems in order to reduce the opportunities for exploitation. – Open ports. » An open port—either a physical or application port—on the network is a hole in the security of the network that may be exploited. » While not all open ports can be or should be closed, security should be placed on those ports that need to remain open to reduce the vulnerability of the network. • A good practice is to use a port scanner periodically to verify that only absolutely required application ports are open. Common network vulnerabilities.
  • 11. Page 11 – Unnecessary running services. » Operating system services are used to perform some function within the system, but it is possible for them to be exploited. • A periodic review of all running services should be conducted on all equipment that attaches to the network. All unnecessary running services should be disabled. – Clear text credentials. » Many applications and devices require the use of credentials in order to be used. In some cases, these credentials are sent in clear text format, which makes them easily read when captured. • A good practice is to periodically review all applications and systems to determine which ones use clear text credentials; then, either limit their use or figure out how to encrypt the transmissions. Common network vulnerabilities.
  • 12. Page 12 – Unencrypted channels. » Any method of communication on the network that is not encrypted is an unencrypted channel that is subject to being breached. » While not all communications channels need to be encrypted, a good practice is to review all channels and make a decision about which ones need to be encrypted and which ones do not. • All wireless network channels should be encrypted—no exceptions. – RF (radio frequency) emanation. » One method of intercepting communication is to analyze signal leakage (e.g., RF emanations). Many forms of communication are subject to these signal emanations, but there are steps that can be taken to reduce them. • TEMPEST is a set of standards established by the NSA (National Security Agency) and NATO (North Atlantic Treaty Organization) that outlines steps that can be used to reduce the opportunity for interception and analysis of communication. Common network vulnerabilities.
  • 13. Page 13 Common network vulnerabilities. Security is never a completed task. It is always an ongoing concern. Administrators can take steps to reduce their exposure to known vulnerabilities. Some known vulnerable protocols include: Telnet, SNMP v.1 and v.2, FTP, TFTP, HTTP, and SLIP. Topic Vulnerabilities associated with unsecure protocols. Summary Unpatched and legacy systems are vulnerable to exploitation. An open port is a hole in the security of the system. All unused ports should be closed. It is possible to exploit running services, so all unnecessary services should be disabled. Administrators should know which applications send credentials in clear text and take steps to reduce the security risk posed by them. Unencrypted communication channels are subject to interception; a review of all channels should be conducted to reduce this vulnerability. All wireless communications channels should be encrypted. It is possible to intercept communication by capturing and analyzing RF emanations; TEMPEST is a set of specifications that reduces this vulnerability. Vulnerable network practices.
  • 15. This workforce solution was 100 percent funded by a $3 million grant awarded by the U.S. Department of Labor's Employment and Training Administration. The solution was created by the grantee and does not necessarily reflect the official position of the U.S. Department of Labor. The Department of Labor makes no guarantees, warranties, or assurances of any kind, express or implied, with respect to such information, including any information on linked sites and including, but not limited to, accuracy of the information or its completeness, timeliness, usefulness, adequacy, continued availability or ownership. Funded by the Department of Labor, Employment and Training Administration, Grant #TC-23745-12-60-A-53. PACE-IT is an equal opportunity employer/program and auxiliary aids and services are available upon request to individuals with disabilities. For those that are hearing impaired, a video phone is available at the Services for Students with Disabilities (SSD) office in Mountlake Terrace Hall 159. Check www.edcc.edu/ssd for office hours. Call 425.354.3113 on a video phone for more information about the PACE-IT program. For any additional special accommodations needed, call the SSD office at 425.640.1814. Edmonds Community College does not discriminate on the basis of race; color; religion; national origin; sex; disability; sexual orientation; age; citizenship, marital, or veteran status; or genetic information in its programs and activities.