Académique Documents
Professionnel Documents
Culture Documents
!art ": Researching Security Audit Tools Research network security audit tools. Select a tool and develop a report for presentation to the class.
#ackground$Scenario
Network attacks have resulted in the loss of sensitive data and significant network downtime. When a network or the resources within it are inaccessible, worker productivity can suffer, and business income may be lost. Attackers have developed many tools over the years to attack and compromise the networks of organizations. hese attacks take many forms, but in most cases, they seek to obtain sensitive information, destroy resources, or deny legitimate users access to resources. o understand how to defend a network against attacks, an administrator must first identify network vulnerabilities. Specialized security audit software developed by e!uipment and software manufacturers can be used to help identify potential weaknesses. "n addition, the same tools used by attackers can be used to test the ability of a network to mitigate an attack. After the vulnerabilities are known, steps can be taken to help mitigate the network attacks. his lab provides a structured research pro#ect that is divided into two parts$ Researching Network Attacks and Researching Security Audit ools. %ou can elect to perform &art ', &art (, or both. )et your instructor know what you plan to do so to ensure that a variety of network attacks and vulnerability tools are reported on by the members of the class. "n &art ', you research various network attacks that have actually occurred. %ou select one of these and describe how the attack was perpetrated and how e*tensive the network outage or damage was. %ou also investigate how the attack could have been mitigated or what mitigation techni!ues might have been implemented to prevent future attacks. %ou prepare a report based on a predefined form included in the lab. "n &art (, you research network security audit tools and investigate one that can be used to identify host or network device vulnerabilities. %ou create a one+page summary of the tool based on a predefined form included in the lab. %ou prepare a short ,-.'/ minute0 presentation to present to the class. %ou may work in teams of two with one person reporting on the network attack and the other reporting on the security audit tools. All team members deliver a short overview of their findings. %ou can use live demonstrations or &ower&oint to summarize your findings.
All contents are 1opyright 2 '33(.(/'( 1isco Systems, "nc. All rights reserved. his document is 1isco &ublic "nformation.
&age ' of -
CCNA Security
Re%uired Resources
1omputer with "nternet access for research. &resentation computer with &ower&oint or other presentation software installed. 4ideo pro#ector and screen for demonstrations and presentations.
Step ": 'ill in the (ollowing (or) (or the network attack selected&
Na)e o( attack: Type o( attack: *ates o( attacks: Co)puters $ Organi+ations a((ected: ,ow it works and what it did:
-itigation options:
All contents are 1opyright 2 '33(.(/'( 1isco Systems, "nc. All rights reserved. his document is 1isco &ublic "nformation.
&age ( of -
CCNA Security
All contents are 1opyright 2 '33(.(/'( 1isco Systems, "nc. All rights reserved. his document is 1isco &ublic "nformation.
&age 6 of -
CCNA Security
Step ": 'ill in the (ollowing (or) (or the security audit or network attack tool selected&
Na)e o( tool: *e eloper: Type o( tool .character0based or 123/: 2sed on .network de ice or co)puter host/: Cost: *escription o( key (eatures and capabilities o( product or tool:
Step 4: Re(lection
a. What is the prevalence of network attacks and what is their impact on the operation of an organization7 What are some key steps organizations can take to help protect their networks and resources7
All contents are 1opyright 2 '33(.(/'( 1isco Systems, "nc. All rights reserved. his document is 1isco &ublic "nformation.
&age 8 of -
CCNA Security b. 9ave you actually worked for an organization or know of one where the network was compromised7 "f so, what was the impact to the organization and what did it do about it7
c.
What steps can you take to protect your own &1 or laptop computer7
All contents are 1opyright 2 '33(.(/'( 1isco Systems, "nc. All rights reserved. his document is 1isco &ublic "nformation.
&age - of -