5 Cisco
5 Cisco
Ricky Elias Business Development Manager Advanced Technology Cisco Systems (USA) Pte Ltd [email protected]
NGC Security
2003 Cisco Systems, Inc. All rights reserved.
The need to quickly patch vulnerabilities is becoming a major security pain point Customers are considering using hyper-patching and mass roll-out systems (push technology) to start solving hyper-patching problems
NGC Security Exec
2003 Cisco Systems, Inc. All rights reserved.
Seconds
Next Gen
Infrastructure hacking Flash threats Massive worm driven DDoS Damaging payload worms Wide-spread data theft
3rd Gen
Network DoS Blended threat (worm + virus+ trojan) Turbo worms Widespread system hacking
2nd Gen
Macro viruses Email DoS Limited hacking
1980s
NGC Security Exec
2003 Cisco Systems, Inc. All rights reserved.
1990s
Today
Future
3
Phishing
HQ
WAN
Airports, Hotels, WLAN Hotspots, etc. Branches Teleworker
Even the most effective perimeter defense will not stop piggy-back infections It is not cost effective to manually check each laptop and device as it comes in from the outside
NGC Security Exec
2003 Cisco Systems, Inc. All rights reserved.
ettercap 0.6.3.1 2001 AloR & NaGA Your IP: 192.168.0.70 with MAC: 00:03:FF:BE:F0:52: eth0 Loading plugins Done. Resolving 1 hostnames Press h for help Sniffing (IP based): ANY:0 < -- > ANY:0 TCP packets o nly (Default) Collecting passwords 00:22:10 192.168.0.70:1107 < -- > 192.168.0.42:80 www
Man-in-the-Middle Attack
Record Data
USER: root PASS: hamhocks4#age http://mail.victim.com/root.asp <password was e ntered] [ the site where username a nd
Works for traffic within or outside of a building Attacker only needs to be attached on same subnet as one victim Tools easily downloadable and is simpler than most video games (GUI or CLI, your choice)
NGC Security Exec
2003 Cisco Systems, Inc. All rights reserved.
AV HIPS
Personal FW
NetworkNetworkBased Security
IDS AD IDS IPS DDOS
An integrated system
Endpoint security solutions know security context and posture Policy servers know compliance/access rules Network infrastructure provides enforcement mechanisms
2003 Cisco Systems, Inc. All rights reserved.
Easy VPN
ACL
DMVPN
CPP
Open Network
Medium
NAC
Moderate
8 02 .1 x
V 3P N
Innocent User
No Your Not!
Email Server
Im The User
Catalyst Integrated Security Features help administrators prevent and track man-in-themiddle attacks Prevents DHCP starvation attacks Prevents IP Spoofed DoS Attacks Hardens the Ethernet standard
10
Based upon users credentials via 802.1x (user identity) Guest users or those without 802.1x running on their laptop can be denied or placed into a guest VLAN
Multip le W
Eng VLA N=9 9
NGC Security Exec
LAN V
LANs
Co r VL p W AN LA =3 N 3
802.11b WLAN
t es Gu =99 AN
11
VL
Remediation
Quarantine Area
ACS
Distributed Firewall O/S Hardening Host IDS/IPS File Monitoring System Policy Control Patch Management Malicious Code Protection
13
SYSTEM-LEVEL SOLUTIONS
Endpoints + Networks + Policies Services Partnerships
14
Questions?
15
Ricky Elias Business Development Manager Advanced Technology Cisco Systems (USA) Pte Ltd [email protected]
NGC Security
2003 Cisco Systems, Inc. All rights reserved.
16