Amenazas modernas a la
seguridad de las redes
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 2
Al término de esta sección , usted debería ser capaz de:
• Describir el actual panorama de la seguridad de la red.
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 3
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 4
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 5
Términos de seguridad de red común :
• Amenaza
• Vulnerabilidad
• Mitigación
Cisco Security Intelligence Operations
• Riesgo
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 6
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 7
Vectores de la pérdida de datos:
• Email / Webmail
• Dispositivos no cifrados
• Media removible
• Copia fuerte
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 8
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 9
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 10
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 11
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 12
Seguridad perimetral exterior :
• Oficiales en las instalaciones de seguridad
• Vallas y puertas
• Trampas de seguridad
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 13
Amenazas VM- específicos : Componentes de un centro de datos
seguro :
• Hyperjacking
• Segmentación Segura
• Instante en la activación
• Defensa de amenazas
• Antivirus tormenta
• Visibilidad
• Aplicación PIN
• Borrado de datos
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 15
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 16
Modern hacking titles:
• Script kiddies Brokers de
Vulnerabilidad
• Hacktivistas
• Los Criminales
cibernéticos
• Los hackers Patrocinado
por el Estado
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 17
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 18
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 19
Herramientas de pruebas de • Forense depuradores
penetración:
• Hackear sistemas operativos
• Crackers de contraseñas
• Encriptación
• Piratería informática
inalámbrica • La explotación de la
vulnerabilidad
• Escaneado en red y la
piratería • Escáneres de Vulnerabilidad
• Elaboración de paquetes
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 20
Ataques de hacking Red:
Espionaje
Modificación de datos
Suplantación de dirección IP Basada en contraseña
Negación de servicio
Hombre en el medio
Clave comprometida Oledor
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 21
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 22
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 23
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 24
Clasificaciones:
• Neutralizador de software de seguridad
• Acceso remoto
• De envío de datos
• Destructivo
• Proxy
• FTP
• DoS
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 25
La infección inicial
gusano Code Red
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 26
Componentes:
1.
Propagar
• Habilitación de la durante 19
vulnerabilidad. días
• Mecanismo de
propagación 2.
Código-Red de Lanzar un
• Carga útil 4.
Repita el
Propagación ataque
DoS para
ciclo Gusano los
próximos 7
Informático días|
3.
Pare y
vaya
inactivo
durante
unos días
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 27
Ransomware Scareware
Spyware Phishing
Adware Rootkits
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 28
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 29
Modificación
de datos
Inundar
Syn
Ataque
Smurf
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 30
• Consulta inicial de un objetivo
• Los scanners de
vulnerabilidades
• Herramientas de
explotación
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 31
Algunas razones por las que los hackers utilizan ataques de acceso:
• Para recuperar datos.
• Ganar acceso.
• La explotación de confianza
• Puerto de redirección
• Hombre en el medio
• Desbordamiento de búfer
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 32
• Pretextando
• Suplantación de identidad
• Lanza phishing
• Correo no deseado
• Chupar rueda
• Hostigamiento
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 33
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 34
1. Hacker construye una red de máquinas infectadas
• Una red de ordenadores infectados se llama una botnet.
• Las computadoras comprometidas son llamados zombis.
• Los zombis son controlados por sistemas de controlador.
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 35
• Al término de esta sección, usted debería ser capaz de:
• Describir las técnicas utilizadas para mitigar los ataques de red comunes.
• Explique cómo asegurar las tres áreas funcionales de routers Cisco y switches.
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 36
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 37
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 38
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 39
Confidencialidad:
Utiliza el cifrado
para cifrar y ocultar
datos
Components
of
Cryptography
Disponibilidad: Integridad:
Usa algoritmos de Usa algoritmos de
hash para asegurar hash para asegurar
que los datos no se que los datos no se
altera durante la altera durante la
operación. operación.
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 40
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 41
• Evaluación de riesgos.
• Política de seguridad.
• Control de acceso.
• Conformidad.
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 42
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 43
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 44
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 45
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 46
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 47
Servidor de
borde y
Ramal
Centro de
Seguridad de Email Seguro
Datos y y Web
Virtualización
SecureX
Accseso Movilidad
Seguro Segura
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 48
Cisco Securex Arquitectura:
• Motores de análisis.
• Mecanismos de entrega.
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 49
• Define las políticas de seguridad en base a cinco parámetros:
• La identidad de la persona
• Aplicación en uso
• Localización
• Tiempo de acceso
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 50
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 51
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 52
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 53
Mejores prácticas :
• Desarrollar una política de seguridad por escrito.
• Mantenga los parches de arriba- hasta la fecha mediante la instalación de todas las
semanas o todos los días para evitar desbordamiento de búfer y ataques de escalada de
privilegios.
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 54
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 55
Containment
Inoculation Quarantine
Treatment
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 56
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 57
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 58
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 59
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 60
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 61
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 62
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 63
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 64
Objetivos del capítulo:
• Explique seguridad de la red.
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 65
Thank you.
• Remember, there are
helpful tutorials and user
guides available via your
NetSpace home page. 1
(https://www.netacad.com) 2
• These resources cover a
variety of topics including
navigation, assessments,
and assignments.
• A screenshot has been
provided here highlighting
the tutorials related to
activating exams, managing
assessments, and creating
quizzes.
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 67