Chap 25 - Secure Network Access Control Flashcards
What is Cisco SAFE?
Security Architecture For the Enterprise
What are PINs?
Places In the Network
What are 6 PINs
- Branch
- Campus
- Data Center
- Edge
- Cloud
- WAN
What are the 4 top threats on PIN Branches?
- Endpoint malware (point-of-sale [POS] malware)
- Wireless infrastructure exploits such as rogue APs and man-in-the-middle (MitM) attacks
- Unauthorized/malicious client activity
- Exploitation of trust
What are 5 things that campuses are easy targets for?
- Phishing
- Web-based exploits
- Unauthorized network access
- Malware propagation
- Botnet infestations.
What are 7 popular threats to data centers?
- Data extraction
- Malware propagation
- Unauthorized network access (application compromise)
- Botnet infestation (scrumping)
- Data loss
- Privilege escalation
- Reconnaissance
What is the highest risk PIN
Edge
What are 4 popular threats to the Edge Network?
- Web server vulnerabilities
- Distributed denial-of-service (DDoS) attacks
- Data loss
- MitM attacks.
What are the 4 primary threats in the Cloud?
- Web server vulnerabilities
- Distributed denial-of-service (DDoS) attacks
- Data loss
- MitM attacks.
What are 4 typical threats seen in the WAN?
- Malware propagation
- Unauthorized network access
- WAN sniffing
- MitM attacks.
What are the 6 Security Concepts used to evaluate each PIN?
- Management
- Security Intelligence
- Compliance
- Segmentation
- Threat Defense
- Secure Services
What is the Management security concept?
Centralized device management is critical for consistent policy deployment, change management, and patching systems
What is the Security Intelligence security concept?
What does Security Intelligence provide?
What does it enable the infrastructure to do?
What 2 things does this enable?
- Security intelligence provides detection of emerging malware and cyber threats
- It enables an infrastructure to enforce policy dynamically, as reputations are augmented by the context of new threats.
- This enables accurate and timely security protection.
What are 3 examples of the Compliance security concept?
- PCI
- DSS 3.0
- HIPAA.
What is the Segmentation security concept?
What does it reduce?
How does it reduce that?
- Establishing boundaries for both data and users
- Reduces operational challenges
- By using identity-aware infrastructure to enforce policies in an automated and scalable manner
What does the Threat Defense security concept provide?
What 3 things does it use to provide that?
- Visibility into the most dangerous cyber threats
- Network traffic telemetry
- File reputation
- Contextual information
What 3 technologies does the Secure Services security concept include?
What 3 things does this protect?
- Technologies include
- access control
- VPNs
- Encryption.
- Applications
- Collaboration
- Wireless
What is provided by implementing the Cisco SAFE framework in an organization?
Advanced threat defense protection that spans the full attack continuum before, during, and after an attack for all the PINs.
What 2 things are required in the ‘Before’ phase?
- Full knowledge of all the assets that need to be protected
- Identification of the types of threats that could target those assets
What 3 actions happen during the ‘Before’ phase?
- Control
- Enhance
- Harden
What 5 Cisco solutions are used in the ‘Before’ phase?
- Next-generation firewalls
- Network access control
- Network security analysis
- Identity services
- Advanced Malware Protection (AMP)
What is defined in the ‘During’ phase?
The abilities and actions that are required when an attack gets through.
What 5 activities occur in the ‘During’ phase?
- Threat analysis
- Incident response
- Detect
- Block
- Defend
What 4 things can organizations leverage in the ‘During’ phase?
- Next-gen IPS (NGIPS)
- Next-gen firewalls (NGFW)
- AMP
- Email and web security solutions with AMP