Page 203 - CISSO_Prep_ Guide
P. 203

encryption. Using L2TP for remote administration (SNMP -
            simple network management protocol) or other such services
            requires that the L2TP traffic be routed over IPsec for
            confidentiality.

            A VPN is a generic term, and all of the encryption and tunneling
            products listed above can be described as a VPN. The endpoints
            of a VPN tunnel should be located in a place that will allow the
            traffic passing over the VPN to be examined once it has been
            decrypted. Otherwise, malicious traffic traversing the VPN
            could circumvent firewalls or other network defenses.




            Network Attacks
            Networks are exposed to many attacks every moment. Some of
            these attacks are against the network itself, such as a denial of
            service, and some are against the devices connected to the
            network, such as a virus or logic bomb. The simplest attack on a
            network is often damaging the cable or network connection
            itself. Other attacks include sniffing the traffic on the network,
            jamming wireless signals, intercepting and modifying network
            traffic (often through a ‘man-in-the-middle’ attack), and
            misconfiguring network devices.



            Denial of Service
            Denial of service (DoS) attacks is a common method of attack
            and very simple to conduct. Many DoS attacks are used as a
            revenge attack against a company (or country, the case of
            Estonia that suffered a massive DDoS attack that lasted for
            several days), while others are used to hide other malicious
   198   199   200   201   202   203   204   205   206   207   208