You are on page 1of 18

8/26/2016

Welcome

Cisco Cyber Security Strategy


Seminars

HELLO!
I am Rocky Amos Panggabean

I am here because I love to give presentations.


You can find me at

Call me on +6282164849393

8/26/2016

Introduction

8/26/2016

What is
What is Cyber Security?
Cyber security, also referred to as information technology
security, focuses on protecting computers, networks, programs
and data from unintended or unauthorized access, change or
destruction

Why is Cyber Security Important?


Governments, military, corporations, financial institutions,
hospitals and other businesses collect, process and store a great
deal of confidential information on computers and transmit that
data across networks to other computers. With the growing
and
is it Crucial
toattacks,
Your Organization?
volume
andWhy
sophistication
of cyber
ongoing attention is
required to protect sensitive business and personal information,
as well as safeguard national security.

Cyber Security Mission

Providing Protection, Assurance and


Availability of Information

8/26/2016

If you know the


enemy,
and know
yourself, then you
Cyber
Security
Strategy
may not fear the results of a hundred battles. If you
know yourself but not the enemy, for every victory
gained you will suffer a defeat.

He went on to say, If you know neither the enemy or


yourself you will suffer a hundred defeats.
7

WHAT IS Cisco Cyber Security Strategy?

Cisco Cyber Security | Way of Thinking


For more detail

8/26/2016

People as Targets of Attacks

People as Targets of Attacks


Educate Your Employees.
Make your employees
awarePolicy
of the Document
ways cybercriminals can
Users Security
infiltrate
your
systems,
them
signs of
a

All users
must
have ateach
unique
usertoIDrecognize
and password
that
conforms
to the them
company
password
breach,
and educate
on how
to staystandard.
safe while using the
Users must not share
their
password
with
anyone
companys network.
regardless of title or position.
Passwords must not be stored in written or any readable
form.
If a compromise is suspected, it must be reported to the
help desk and a new password must be requested.

10

8/26/2016

People as Cyber Security Team


Security Team
Network Security
Administrator.
Security
Team Capability

Risk
Analyst.
Plan, design, build, deploy and manage secure IT
infrastructure
VPN Specialist.
and systems compliant with current
information
Penetrationassurance
Tester. policies and regulations;
Network
Perimeter/Firewall
Specialist.
Assess
technical
vulnerabilities;
Securityattack
Response
IDS/IPS Engineer.
Identify
vectors;
Respond to attacks; and monitor and deploy layered
defense mechanisms in complex IT infrastructure.
11

What you'll want to be secured ?


What IsNETWORK
Network Security?
Your IT partner
explain
that to
network
refers to any
Whatshould
are the
Threats
Your security
Network?

activities designed to protect your network. Specifically, these activities


Many network security threats today are spread over the Internet.
protect the usability, reliability, integrity, and safety of your network and
Therefore you must understanding the Risks on Your Network;
data. Effective network security targets a variety of threats and stops
Layer 2 Risk
them from entering or spreading on your network.
Layer 3 Risk
Upper Layer Risk
Physical Risk

12

8/26/2016

Example Layer 2 Risk:

Reconnaissance (Packet Capture).


Denial of Service (CAM Overflow Attack - MAC Flooding Attack).
MAC Address Spoofing.

13

Example Layer 3 Risk:

Man in the Middle Attack (Gratuitous ARP).


Man in the Middle Attack (rogue DHCP server) .
Denial of Service Attack (DHCP Pool Exhaustion).
Denial of Service (Ping Flood).
Denial of service (Ping of Death).

14

8/26/2016

Example Upper Layer Risk:

Password Attacks.
Trust Exploitation Indirect Attack.
Data Diddling.
Worm.
Virus.

15

Example Physical Risk:

Lock Doors (Card reader, pin entry system).


Tested UPS devices on network devices.
Temperature monitoring.
Wireless Sniffing.
Social Engineering.
Proper disposal of equipment and documentation to avoid
dumpster diving
Wiretapping, physical access to cables allowing electronically
retrieving data passed over them. Usually with voice traffic.
16

8/26/2016

Where in network we need security?


Where the network which may or frequently received
threats / disorder ?

Vulnerability Assessment

17

Stop Threats Before They Stop You!!!


Get answers fast about threats on your network and stop
them even faster.

Continuous Network Monitoringthe automated process


used to manage and measure an organizations security,
compliance, and riskcan help you answer these questions.
And it also helps you implement the top priorities for good
18
cyber hygiene.

8/26/2016

How We Build it?

1. How Does Network Security Work?


2. Collaboratively Across an Organization
3. Security Control Implementation
4. Perform Security Audits to Test the Network.
5. Regular Verification of Security Control Performance

19

How Does Network Security Work?


To understand What is network security?, it helps to
understand that no single solution protects you from
a variety of threats. You need multiple layers of
security. If one fails, others still stand.

Network security is accomplished through hardware


and software. The software must be constantly
updated and managed to protect you from emerging
threats.

20

10

8/26/2016

How Does Network Security Work?


A network security system usually consists of many
components. Ideally, all components work together,
which minimizes maintenance and improves security.
Network security components often include:
Anti-virus and anti-spyware.
Firewall, to block unauthorized access to your network.
Intrusion Prevention Systems (IPS), to identify fastspreading threats, such as Zero-day or zero-hour
attacks.
Virtual Private Networks (VPNs), to provide secure
remote access.
21

1. Collaboratively Across an Organization

Cybersecurity management is a complex topic that


requires substantial organizational attention to be
effective.
This is not solely the responsibility of the IT department.
By working collaboratively across an organization, it is
possible to more effectively manage cybersecurity risks in
order to reduce the likelihood of an exposure.
22

11

8/26/2016

2. Security Control Implementation

End Device
Intermediary Device

23

Security Control Implementation on


End Device

Security Policy Document


24

12

8/26/2016

Security Control Implementation on


End Device

Traditional Endpoint Security

25

Security Control Implementation on


End Device

26

13

8/26/2016

Security Control Implementation on


Intermediary Device
1. Good Design Network Topology
2. Securing Device Access
3. Assigning Administrative Roles

4. Monitoring and Managing Devices


5. Using Automated Security Features
6. Securing the Control Plane
27

Security Control Implementation on


Intermediary Device

1. Good Design
Design Network
NetworkTopology
Topology
2. Securing Device
Device Access
Access
3. Assigning
Assigning Administrative
AdministrativeRoles
Roles

28

14

8/26/2016

Security Control Implementation on


Intermediary Device

4. Monitoring and Managing Devices


5. Using Automated Security Features
6. Securing the Control Plane
29

Security Control Implementation on


Intermediary Device

5. Using Automated Security Features


6. Securing the Control Plane
Control Plane functions consist of the protocols and processes
that communicate between network devices to move data
from source to destination. This includes routing protocols
such as the Border Gateway Protocol, as well as protocols like
ICMP and the Resource Reservation Protocol (RSVP).
30

15

8/26/2016

3. Perform Security Audits to Test the Network.

a. Vulnerability Assessment
b. Penetration Test
c. Security Audit

31

4. Regular Verification of Security Control Performance


There are three primary ways we work with organizations to
implement processes to monitor cybersecurity control
performance and effectiveness:
a. Establish and regularly review security metrics.
b. Conduct vulnerability assessments and penetration testing
to validate security configuration.
c. Complete an internal audit to evaluate security control
operation.

You cant manage what you cant measure.


Its no different with cybersecurity. By defining the specific
objectives of your security program, you can develop specific
measures and monitor these measures over time to gauge process
performance.
32

16

8/26/2016

How Attackers Threaten Your Network?

Next-generation cyber attacks target specific


individuals and organizations to steal data.
They use multiple vectors, including web, email, and
malicious files and dynamically adapt to exploit zeroday and other network vulnerabilities.
Most traditional defense-in-depth cyber security
measures, such as AV or next-generation firewalls, fail
to use signature- and pattern-based techniques to
detect threats, and don't monitor malware call backs
to Command & Control Servers.
33

How Attackers Threaten Your Network?


Advanced cyber attacks succeed because they are
carefully planned, methodical and patient.
Malware used in such attacks:
Settles into a system.
Tries to hide.
Searches out network vulnerabilities.
Disables network security measures.
Infects more endpoints and other devices.
Calls back to command-and-control (CnC) servers.
Waits for instructions to start extracting data from
the network.
34

17

8/26/2016

Security Solution By. Cisco

For more detail - Play Video

35

THANK YOU!
FOR YOUR ATTENTION

Phone : +62 82164849393

Email : rocky.amos@wx-d.com

18

You might also like