16.2.6 Lab - Research Network Security Threats
16.2.6 Lab - Research Network Security Threats
Objectives
Part 1: Explore the SANS Website
Part 2: Identify Recent Network Security Threats
Part 3: Detail a Specific Network Security Threat
Background / Scenario
To defend a network against attacks, an administrator must identify external threats that pose a danger
to the network. Security websites can be used to identify emerging threats and provide mitigation
options for defending a network.
One of the most popular and trusted sites for defending against computer and network security threats
is SysAdmin, Audit, Network, Security (SANS). The SANS site provides multiple resources, including a
list of the top 20 Critical Security Controls for Effective Cyber Defense and the weekly @Risk: The
Consensus Security Alert newsletter. This newsletter details new network attacks and vulnerabilities.
In this lab, you will navigate to and explore the SANS site, use the SANS site to identify recent network
security threats, research other websites that identify threats, and research and present the details
about a specific network attack.
Required Resources
Instructions
© 2013 - 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public Page 1 of 4 www.netacad.com
Lab - Research Network Security Threats
© 2013 - 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public Page 2 of 4 www.netacad.com
Lab - Research Network Security Threats
Step 1: Complete the following form for the selected network attack.
WannaCry ransomware
Name of attack:
CryptoWormDates
Type of attack:
July 2001 May 2017
Dates of attacks:
Estimated 200,000 computers in 150 countries
Computers / Organizations affected:
Mitigation options:
Issued by Microsoft for the Windows operating system
© 2013 - 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public Page 3 of 4 www.netacad.com
Lab - Research Network Security Threats
Reflection Questions
1. What steps can you take to protect your own computer?
Include keeping the operating system and applications up to date with patches and service packs,
using a personal firewall, configuring passwords to access the system and bios, configuring
screensavers to timeout and requiring a password, protecting important files by making them read-
only, and encrypting confidential files and backup files for safe keeping.
2. What are some important steps that organizations can take to protect their resources?
Include the use of firewalls, intrusion detection and prevention, hardening ofnetwork devices,
endpoint protection, network vulnerability tools, user education, and security policy development.
End of Document
© 2013 - 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public Page 4 of 4 www.netacad.com