Ingeniero Telecomunicaciones

Páginas: 446 (111310 palabras) Publicado: 19 de julio de 2012
CCNA Security 1.0
Instructor Lab Manual

This document is exclusive property of Cisco Systems, Inc. Permission is granted to print and copy this document for non-commercial distribution and exclusive use by instructors in the CCNA Security course as part of an official Cisco Networking Academy Program.

CCNA Security

Chapter 1 Lab A: Researching Network Attacks and Security Audit ToolsInstructor Version
Objectives
Part 1: Researching Network Attacks • • Research network attacks that have occurred. Select a network attack and develop a report for presentation to the class.

Part 2: Researching Security Audit Tools • • Research network security audit tools. Select a tool and develop a report for presentation to the class.

Background/Scenario
Network attacks have resultedin the loss of sensitive data and significant network downtime. When a network or the resources in it are inaccessible, worker productivity can suffer, and business income may be lost. Attackers have developed many tools over the years to attack and compromise the networks of organizations. These attacks take many forms, but in most cases, they seek to obtain sensitive information, destroyresources, or deny legitimate users access to resources. To understand how to defend a network against attacks, an administrator must first identify network vulnerabilities. Specialized security audit software developed by equipment and software manufacturers can be used to help identify potential weaknesses. In addition, the same tools used by attackers can be used to test the ability of a network tomitigate an attack. After the vulnerabilities are known, steps can be taken to help mitigate the network attacks. This lab provides a structured research project that is divided into two parts: Researching Network Attacks and Researching Security Audit Tools. You can elect to perform Part 1, Part 2, or both. Let your instructor know what you plan to do so to ensure that a variety of network attacksand vulnerability tools are reported on by the members of the class. In Part 1, you research various network attacks that have actually occurred. You select one of these and describe how the attack was perpetrated and how extensive the network outage or damage was. You also investigate how the attack could have been mitigated or what mitigation techniques might have been implemented to preventfuture attacks. You prepare a report based on a predefined form included in the lab. In Part 2, you research network security audit tools and investigate one that can be used to identify host or network device vulnerabilities. You create a one-page summary of the tool based on a predefined form included in the lab. You prepare a short (5–10 minute) presentation to present to the class. You may work inteams of two with one person reporting on the network attack and the other reporting on the security audit tools. Each team member delivers a short overview (5–10 minutes) of their findings. You can use live demonstrations or PowerPoint to summarize your findings.

All contents are Copyright © 1992–2009 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information.

Page1 of 5

CCNA Security

Required Resources
• • • Computer with Internet access for research. Presentation computer with PowerPoint or other presentation software installed. Video projector and screen for demonstrations and presentations.

Instructor Note: To maintain tighter control over what the students report, you can provide the students a list of recent network attacks and securityaudit tools from which to choose. You might want to ask the students to email you their desired research project by a specific time, or you will assign them a topic. In the email, they should provide some background information (description, links, and so on) to make sure that no one is doing the same thing.

Part 1. Researching Network Attacks
In Part 1 of this lab, you research various network...
Leer documento completo

Regístrate para leer el documento completo.

Estos documentos también te pueden resultar útiles

  • Ingeniero En Telecomunicaciones
  • Ingeniero en Telecomunicaciones
  • Ingeniero De Telecomunicaciones
  • Ingeniero De Telecomunicaciones
  • Ingeniero De Telecomunicaciones
  • ingeniero en telecomunicaciones
  • Ingeniero En Telecomunicaciones
  • Ingeniero En Telecomunicaciones

Conviértase en miembro formal de Buenas Tareas

INSCRÍBETE - ES GRATIS