Page 203 - CISSO_Prep_ Guide
P. 203
encryption. Using L2TP for remote administration (SNMP -
simple network management protocol) or other such services
requires that the L2TP traffic be routed over IPsec for
confidentiality.
A VPN is a generic term, and all of the encryption and tunneling
products listed above can be described as a VPN. The endpoints
of a VPN tunnel should be located in a place that will allow the
traffic passing over the VPN to be examined once it has been
decrypted. Otherwise, malicious traffic traversing the VPN
could circumvent firewalls or other network defenses.
Network Attacks
Networks are exposed to many attacks every moment. Some of
these attacks are against the network itself, such as a denial of
service, and some are against the devices connected to the
network, such as a virus or logic bomb. The simplest attack on a
network is often damaging the cable or network connection
itself. Other attacks include sniffing the traffic on the network,
jamming wireless signals, intercepting and modifying network
traffic (often through a ‘man-in-the-middle’ attack), and
misconfiguring network devices.
Denial of Service
Denial of service (DoS) attacks is a common method of attack
and very simple to conduct. Many DoS attacks are used as a
revenge attack against a company (or country, the case of
Estonia that suffered a massive DDoS attack that lasted for
several days), while others are used to hide other malicious