In: Computer Science
Background / Scenario
Attackers have developed many tools over the years to attack and
compromise networks. These attacks take many forms, but in most
cases, they seek to obtain sensitive information, destroy
resources, or deny legitimate users access to resources. When
network resources are inaccessible, worker productivity can suffer,
and business income may be lost.
To understand how to defend a network against attacks, an
administrator must identify network vulnerabilities. Specialized
security audit software, developed by equipment and software
manufacturers, can be used to help identify potential weaknesses.
These same tools used by individuals to attack networks can also be
used by network professionals to test the ability of a network to
mitigate an attack. After the vulnerabilities are discovered, steps
can be taken to help protect the network.
This assignment provides a structured research project that is
divided into two parts: Researching Network Attacks and Researching
Security Audit Tools. Inform your instructor about which network
attack(s) and network security audit tool(s) you have chosen to
research. This will ensure that a variety of network attacks and
vulnerability tools are reported on by the members of the c
In Part 2, research network security audit tools and attack tools. Investigate one that can be used to identify host or network device vulnerabilities. Create a one-page summary of the tool based on the form included within this lab.
Part 2: Researching Network Security Audit Tools and Attack
Tools Step 1: Research various network security audit tools and
attack tools.
Step 2: Fill in the following form for the network security audit
tool/attack tool selected.
Name of tool:
Developer:
Type of tool (character-based or GUI):
Used on (network device or computer host):
Cost:
Description of key features and capabilities of product or
tool:
References and info links:
Part 2: Research Network Security Audit Tools and Attack Tools
In this part we have to investigate one that can be used to identify host or network device vulnerabilities.
Step 1: Research various network security audit tools and attack tools.
Some of the tools that can be identified are:
Attacker tool can investigate:
Step 2: Fill in the following form for the network security
audit tool/attack tool selected.
Name of tool: Cisco IOS AutoSecure
Developer: Cisco systems
Type of tool (character-based or GUI): Character
based security analysis
Used on (network device or computer host): Router
and Switch
Cost: Free
Description of key features and capabilities of product or
tool:
Disable common IP services that can be exploited for network attacks
Enable IP services that can support in the defence of network when under attack.
Automates configuration of security characters on the router or switch and also disables definite features that are enabled by default and could be exploited as security holes.
References and info links:
https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/sec_usr_cfg/configuration/xe-3s/sec-usr-cfg-xe-3s-book/sec-autosecure.html
http://etutorials.org/Networking/Router+firewall+security/Part+II+Managing+Access+to+Routers/Chapter+4.+Disabling+Unnecessary+Services/AutoSecure/