Flylib.com
Network Security Architectures
ISBN: 158705115X
EAN: 2147483647
Year: 2006
Pages: 249
Authors:
Sean Convery
BUY ON AMAZON
Part I. Network Security Foundations
Network Security Axioms
Network Security Axioms
Network Security Is a System
Business Priorities Must Come First
Network Security Promotes Good Network Design
Everything Is a Target
Everything Is a Weapon
Strive for Operational Simplicity
Good Network Security Is Predictable
Avoid Security Through Obscurity
Confidentiality and Security Are Not the Same
Applied Knowledge Questions
Security Policy and Operations Life Cycle
Security Policy and Operations Life Cycle
You Cant Buy Network Security
What Is a Security Policy?
Security System Development and Operations Overview
References
Applied Knowledge Questions
Secure Networking Threats
Secure Networking Threats
The Attack Process
Attacker Types
Vulnerability Types
Attack Results
Attack Taxonomy
References
Applied Knowledge Questions
Network Security Technologies
Network Security Technologies
The Difficulties of Secure Networking
Security Technologies
Emerging Security Technologies
References
Applied Knowledge Questions
Part II. Designing Secure Networks
Device Hardening
Device Hardening
Components of a Hardening Strategy
Network Devices
NIDS
Host Operating Systems
Applications
Appliance-Based Network Services
Rogue Device Detection
References
Applied Knowledge Questions
General Design Considerations
General Design Considerations
Physical Security Issues
Layer 2 Security Considerations
IP Addressing Design Considerations
ICMP Design Considerations
Routing Considerations
Transport Protocol Design Considerations
DoS Design Considerations
References
Applied Knowledge Questions
Network Security Platform Options and Best Deployment Practices
Network Security Platform Options
Network Security Device Best Practices
Applied Knowledge Questions
Common Application Design Considerations
Common Application Design Considerations
E-Mail
DNS
HTTP/HTTPS
FTP
Instant Messaging
Application Evaluation
References
Applied Knowledge Questions
Identity Design Considerations
Identity Design Considerations
Basic Foundation Identity Concepts
Types of Identity
Factors in Identity
Role of Identity in Secure Networking
Identity Technology Guidelines
Identity Deployment Recommendations
References
Applied Knowledge Questions
IPsec VPN Design Considerations
IPsec VPN Design Considerations
VPN Basics
Types of IPsec VPNs
IPsec Modes of Operation and Security Options
Topology Considerations
Design Considerations
Site-to-Site Deployment Examples
IPsec Outsourcing
References
Applied Knowledge Questions
Supporting-Technology Design Considerations
Supporting-Technology Design Considerations
Content
Load Balancing
Wireless LANs
IP Telephony
References
Applied Knowledge Questions
Designing Your Security System
Designing Your Security System
Network Design Refresher
Security System Concepts
Impact of Network Security on the Entire Design
Ten Steps to Designing Your Security System
Applied Knowledge Questions
Part III. Secure Network Designs
Edge Security Design
Edge Security Design
What Is the Edge?
Expected Threats
Threat Mitigation
Identity Considerations
Network Design Considerations
Small Network Edge Security Design
Medium Network Edge Security Design
High-End Resilient Edge Security Design
Provisions for E-Commerce and Extranet Design
References
Applied Knowledge Questions
Campus Security Design
Campus Security Design
What Is the Campus?
Campus Trust Model
Expected Threats
Threat Mitigation
Identity Considerations
Network Design Considerations
Small Network Campus Security Design
Medium Network Campus Security Design
High-End Resilient Campus Security Design
References
Applied Knowledge Questions
Teleworker Security Design
Teleworker Security Design
Defining the Teleworker Environment
Expected Threats
Threat Mitigation
Identity Considerations
Network Design Considerations
Software-Based Teleworker Design
Hardware-Based Teleworker Design
Design Evaluations
Applied Knowledge Questions
Part IV. Network Management, Case Studies, and Conclusions
Secure Network Management and Network Security Management
Secure Network Management and Network Security Management
Utopian Management Goals
Organizational Realities
Protocol Capabilities
Tool Capabilities
Secure Management Design Options
Network Security Management Best Practices
References
Applied Knowledge Questions
Case Studies
Case Studies
Introduction
Real-World Applicability
Organization
NetGamesRUs.com
University of Insecurity
Black Helicopter Research Limited
Applied Knowledge Questions
Conclusions
Conclusions
Introduction
Management Problems Will Continue
Security Will Become Computationally Less Expensive
Homogeneous and Heterogeneous Networks
Legislation Should Garner Serious Consideration
IP Version 6 Changes Things
Network Security Is a System
References
References
Appendix A. Glossary of Terms
Appendix A. Glossary of Terms
Appendix B. Answers to Applied Knowledge Questions
Appendix B. Answers to Applied Knowledge Questions
Appendix C. Sample Security Policies
Appendix C. Sample Security Policies
INFOSEC Acceptable Use Policy
INFOSEC Acceptable Use Policy
Password Policy
Password Policy
Guidelines on Antivirus Process
Guidelines on Antivirus Process
Index
Network Security Architectures
ISBN: 158705115X
EAN: 2147483647
Year: 2006
Pages: 249
Authors:
Sean Convery
BUY ON AMAZON
Adobe After Effects 7.0 Studio Techniques
Making the Most of the UI
Transform Offsets
Selections: The Key to Compositing
32 Bits per Channel
In a Blaze of Glory
Excel Scientific and Engineering Cookbook (Cookbooks (OReilly))
Entering Data
Creating Simple Charts
Using Summation Functions
Manipulating Matrices
Calculating the Second Moment of an Area
The Complete Cisco VPN Configuration Guide
Chassis Redundancy
Concentrator Tools
VPN Client GUI Options
Administrative Tasks
L2L Connection Examples
Visual C# 2005 How to Program (2nd Edition)
Examples Using the for Statement
Structured Programming Summary
Self-Review Exercises
Argument Promotion and Casting
Microsoft Agent
Lotus Notes Developers Toolbox: Tips for Rapid and Successful Deployment
Compiling LotusScript Code
Links to developerWorks
Managing Recurring Events Using Multiple Documents
Importing Data
Developer-Specific Enhancements
Oracle SQL*Plus: The Definitive Guide (Definitive Guides)
What Is SQL*Plus?
Transactions
To Learn More
An Excel-Specific HTML Hack
Table Constraints
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies