Wednesday, 21 February 2018

India To Spend More On AI-Based Tools To Secure Cyberspace: Cisco

The "Cisco 2018 Annual Cybersecurity Report" showed that more than half of the organizations surveyed in India depend on automation, ML and AI.

As the scope of cyber-violations continues to expand with the increase in the volume of encrypted web traffic and attacks on the supply chain, security professionals in India will spend more on tools that use Artificial Intelligence (AI) and Machine Learning. (ML) to combat malware attacks, said a Cisco report on Wednesday.

Applying these tools can help improve network security defenses and, over time, "learn" to automatically detect unusual patterns in encrypted web traffic, the cloud and Internet of Things (IoT) environments .

The "Cisco 2018 Annual Cybersecurity Report" showed that more than half of the organizations surveyed in India depend on automation, ML and AI.

"Attackers are exploiting defenseless gaps in security, many caused by the expansion of the Internet of Things (IoT) and the use of cloud services, and advocates often pay little attention to the security of these systems. Unpatched IoT devices and unmonitored attackers have opportunities to infiltrate networks, "IANS Vishak Raman, Director of Commercial Security at Cisco India & Saarc, told IANS.

"AI, ML and automation are increasingly desired and expected by CISOs (Chief Information Security Officers) and other security leaders, and they are investing in these technologies to mitigate attacks," Raman added.

According to the report, 30 percent of security professionals said they used products from 25-50 vendors in 2017.

Raman said that the use of products from multiple vendors can make security complex in case of supply chain attacks, making artificial intelligence-based tools that can quickly detect violations constitute a promising weapon to find vulnerabilities and frustrate future threats.

The report showed that while encryption is intended to improve security, the expanded volume of encrypted web traffic (50% as of October 2017), both legitimate and malicious, has created more challenges for defenders trying to identify and monitor possible threats. .

Cisco threat researchers observed a more than threefold increase in encrypted network communications used by inspected malware samples over a 12-month period worldwide.

"Adversaries are increasingly adept at escaping through cloud services and other technologies used for legitimate purposes, and threat actors use encryption tools and legitimate web services such as Google and GitHub to hide their malicious activity." said Raman. now reaching unprecedented levels of sophistication and impact.

While still in its infancy, LD and AI technologies will eventually mature and learn what "normal" activity is in the network environments they are monitoring, the report says.

"The evolution of last year's malware shows that adversaries are increasingly wise in exploiting defenseless breaches in security," said John N. Stewart, Senior Vice President and Director of Security and Trust at Cisco.

"As never before, advocates must make strategic security improvements, investments in technology and incorporate best practices to reduce exposure to emerging risks," Stewart added.

The Cisco report highlighted the findings and perceptions derived from threat intelligence and cybersecurity trends observed in the past 12 to 18 months from threat investigations and six technology partners: Anomali, Lumeta, Qualys, Radware, SAINT and TrapX.

Also included in the report are the results of the Security Capabilities Reference Study 2018 that surveyed 3,600 CISO and security operations managers (SecOps) from 26 countries, including India, on the state of cybersecurity in their organizations.

Wednesday, 20 December 2017

Cisco 300-101 Question Answer

A network engineer executes the show crypto ipsec sa command. Which three pieces of
information are displayed in the output? (Choose three.)

A. inbound crypto map
B. remaining key lifetime
C. path MTU
D. tagged packets
E. untagged packets
F. invalid identity packets

Answer: ABC

Refer to the following output: via, Tunnel1 created 00:00:12, expire 01:59:47
TypE. Dynamic, Flags: authoritative unique nat registered used
NBMA address:
What does the authoritative flag mean in regards to the NHRP information?

A. It was obtained directly from the next-hop server.
B. Data packets are process switches for this mapping entry.
C. NHRP mapping is for networks that are local to this router.
D. The mapping entry was created in response to an NHRP registration request.
E. The NHRP mapping entry cannot be overwritten.

Answer: A

Monday, 6 November 2017

Cisco 300-101 Question Answer

A company has just opened two remote branch offices that need to be connected to the corporate network. Which interface configuration output can be applied to the corporate router to allow communication to the remote sites?

A. interface Tunnel0
bandwidth 1536
ip address
tunnel source Serial0/0
tunnel mode gre multipoint
B. interface fa0/0
bandwidth 1536
ip address
tunnel mode gre multipoint
C. interface Tunnel0
bandwidth 1536
ip address
tunnel source
tunnel-mode dynamic
D. interface fa 0/0
bandwidth 1536
ip address
tunnel source
tunnel destination
tunnel-mode dynamic

Answer: A

Monday, 11 September 2017

Cisco 300-101 Question Answer

After you review the output of the command show ipv6 interface brief, you see that several IPv6 addresses have the 16-bit hexadecimal value of "fFFE" inserted into the address. Based on this information, what do you conclude about these IPv6 addresses?

A. IEEE EUI-64 was implemented when assigning IPv6 addresses on the device.
B. The addresses were misconfigured and will not function as intended.
C. IPv6 addresses containing "FFFE" indicate that the address is reserved for multicast.
D. The IPv6 universal/local flag (bit 7) was flipped.
E. IPv6 unicast forwarding was enabled, but IPv6 Cisco Express Forwarding was disabled.

Answer: A

A packet capture log indicates that several router solicitation messages were sent from a local host on the Ipv6 segment. What is the expected acknowledgment and its usage?

A. Router acknowledgment messages will be forwarded upstream, where the DHCP server will
allocate addresses to the local host.
B. Routers on the Ipv6 segment will respond with an advertisement that provides an external path
from the local subnet, as well as certain data, such as prefix discovery.
C. Duplicate Address Detection will determine if any other local host is using the same Ipv6
address for communication with the Ipv6 routers on the segment.
D. All local host traffic will be redirected to the router with the lowest ICMPv6 signature, which is
statically defined by the network administrator.

Answer: B

Sunday, 11 June 2017

Cisco Says Jump In India Business Aftert Demonetisation, Opens 1st Digital Centre

Cisco opens digital experience center for banking, insurance and financial services in Mumbai after seeing a leap in business after demonetization

Cisco has nine innovation centers worldwide in places like San Jose, London, Tokyo and Berlin. Photo: Bloomberg

US network hardware maker Cisco said Friday it is experiencing a jump in demand from Indian banks since the demonetization move, allowing it to open its first digital experience center in Mumbai.

"Overall we see a significant increase in requirements ... coming in from them, especially since November of last year. That's where we've also seen growth," Cisco India president Dinesh Malkani told reporters.

He said digital solutions are "top of mind" even for state lenders, who are looking for solutions in a variety of ways. The company has nine innovation centers worldwide in places such as San Jose, London, Tokyo and Berlin, but this is a first worldwide where it has launched a center dedicated to the digital experience aimed at the banking, insurance and financial services sectors.

A spokesman for the company said the center located within a company office in the business district of the Bandra Kurla complex extends over 400 square feet.

Company officials declined to give the exact details of the investment in the center, but said that this is part of a $ 100 million commitment made as part of the previously announced Country Digitization Acceleration (CDA) program.

Malkani said that Indian banks before had to travel to their innovation centers, mainly to the US, to understand the technologies, and added the presence of financial companies in the BKC will help. Apart from looking for available solutions, customers will be able to co-create solutions together with the Cisco staff.