Flylib.com
Network Security Architectures
ISBN: 158705115X
EAN: 2147483647
Year: 2006
Pages: 249
Authors:
Sean Convery
BUY ON AMAZON
Part I. Network Security Foundations
Network Security Axioms
Network Security Axioms
Network Security Is a System
Business Priorities Must Come First
Network Security Promotes Good Network Design
Everything Is a Target
Everything Is a Weapon
Strive for Operational Simplicity
Good Network Security Is Predictable
Avoid Security Through Obscurity
Confidentiality and Security Are Not the Same
Applied Knowledge Questions
Security Policy and Operations Life Cycle
Security Policy and Operations Life Cycle
You Cant Buy Network Security
What Is a Security Policy?
Security System Development and Operations Overview
References
Applied Knowledge Questions
Secure Networking Threats
Secure Networking Threats
The Attack Process
Attacker Types
Vulnerability Types
Attack Results
Attack Taxonomy
References
Applied Knowledge Questions
Network Security Technologies
Network Security Technologies
The Difficulties of Secure Networking
Security Technologies
Emerging Security Technologies
References
Applied Knowledge Questions
Part II. Designing Secure Networks
Device Hardening
Device Hardening
Components of a Hardening Strategy
Network Devices
NIDS
Host Operating Systems
Applications
Appliance-Based Network Services
Rogue Device Detection
References
Applied Knowledge Questions
General Design Considerations
General Design Considerations
Physical Security Issues
Layer 2 Security Considerations
IP Addressing Design Considerations
ICMP Design Considerations
Routing Considerations
Transport Protocol Design Considerations
DoS Design Considerations
References
Applied Knowledge Questions
Network Security Platform Options and Best Deployment Practices
Network Security Platform Options
Network Security Device Best Practices
Applied Knowledge Questions
Common Application Design Considerations
Common Application Design Considerations
E-Mail
DNS
HTTP/HTTPS
FTP
Instant Messaging
Application Evaluation
References
Applied Knowledge Questions
Identity Design Considerations
Identity Design Considerations
Basic Foundation Identity Concepts
Types of Identity
Factors in Identity
Role of Identity in Secure Networking
Identity Technology Guidelines
Identity Deployment Recommendations
References
Applied Knowledge Questions
IPsec VPN Design Considerations
IPsec VPN Design Considerations
VPN Basics
Types of IPsec VPNs
IPsec Modes of Operation and Security Options
Topology Considerations
Design Considerations
Site-to-Site Deployment Examples
IPsec Outsourcing
References
Applied Knowledge Questions
Supporting-Technology Design Considerations
Supporting-Technology Design Considerations
Content
Load Balancing
Wireless LANs
IP Telephony
References
Applied Knowledge Questions
Designing Your Security System
Designing Your Security System
Network Design Refresher
Security System Concepts
Impact of Network Security on the Entire Design
Ten Steps to Designing Your Security System
Applied Knowledge Questions
Part III. Secure Network Designs
Edge Security Design
Edge Security Design
What Is the Edge?
Expected Threats
Threat Mitigation
Identity Considerations
Network Design Considerations
Small Network Edge Security Design
Medium Network Edge Security Design
High-End Resilient Edge Security Design
Provisions for E-Commerce and Extranet Design
References
Applied Knowledge Questions
Campus Security Design
Campus Security Design
What Is the Campus?
Campus Trust Model
Expected Threats
Threat Mitigation
Identity Considerations
Network Design Considerations
Small Network Campus Security Design
Medium Network Campus Security Design
High-End Resilient Campus Security Design
References
Applied Knowledge Questions
Teleworker Security Design
Teleworker Security Design
Defining the Teleworker Environment
Expected Threats
Threat Mitigation
Identity Considerations
Network Design Considerations
Software-Based Teleworker Design
Hardware-Based Teleworker Design
Design Evaluations
Applied Knowledge Questions
Part IV. Network Management, Case Studies, and Conclusions
Secure Network Management and Network Security Management
Secure Network Management and Network Security Management
Utopian Management Goals
Organizational Realities
Protocol Capabilities
Tool Capabilities
Secure Management Design Options
Network Security Management Best Practices
References
Applied Knowledge Questions
Case Studies
Case Studies
Introduction
Real-World Applicability
Organization
NetGamesRUs.com
University of Insecurity
Black Helicopter Research Limited
Applied Knowledge Questions
Conclusions
Conclusions
Introduction
Management Problems Will Continue
Security Will Become Computationally Less Expensive
Homogeneous and Heterogeneous Networks
Legislation Should Garner Serious Consideration
IP Version 6 Changes Things
Network Security Is a System
References
References
Appendix A. Glossary of Terms
Appendix A. Glossary of Terms
Appendix B. Answers to Applied Knowledge Questions
Appendix B. Answers to Applied Knowledge Questions
Appendix C. Sample Security Policies
Appendix C. Sample Security Policies
INFOSEC Acceptable Use Policy
INFOSEC Acceptable Use Policy
Password Policy
Password Policy
Guidelines on Antivirus Process
Guidelines on Antivirus Process
Index
Network Security Architectures
ISBN: 158705115X
EAN: 2147483647
Year: 2006
Pages: 249
Authors:
Sean Convery
BUY ON AMAZON
MySQL Stored Procedure Programming
Conditional Execution
Conclusion
Conditional Control
Conclusion
SQL in Stored Programs
Service-Oriented Architecture (SOA): Concepts, Technology, and Design
Case #2 background: Transit Line Systems Inc.
Web Services and Contemporary SOA (Part I: Activity Management and Composition)
Part III: SOA and Service-Orientation
Common principles of service-orientation
Part IV: Building SOA (Planning and Analysis)
Programming Microsoft ASP.NET 3.5
The ADO.NET Object Model
ASP.NET Iterative Controls
Web Forms User Controls
The HTTP Request Context
Design-Time Support for Custom Controls
Special Edition Using Crystal Reports 10
Using Multiple Report Sections
Using Subreports and Multi-Pass Reporting
Delivering Reports with the Windows Forms Viewer
Part VIII. Customized Report Distribution Using Crystal Enterprise Professional
Troubleshooting
Oracle SQL*Plus: The Definitive Guide (Definitive Guides)
Starting iSQL*Plus
Unions
Formatting Object Columns
Oracles Data Dictionary Views
Environment Variables That Affect SQL*Plus
Java All-In-One Desk Reference For Dummies
Welcome to Java
Pulling a Switcheroo
Book IV - Strings, Arrays, and Collections
Using JavaBeans
Animation and Game Programming
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies