Flylib.com
The Practice of Network Security: Deployment Strategies for Production Environments
The Practice of Network Security: Deployment Strategies for Production Environments
ISBN: 0130462233
EAN: 2147483647
Year: 2002
Pages: 131
Authors:
Allan Liska
BUY ON AMAZON
The Practice of Network Security: Deployment Strategies for Production Environments
Table of Contents
Copyright
Prentice Hall PTR Series in Computer Networking and Distributed Systems
About Prentice Hall Professional Technical Reference
Acknowledgements
Introduction
Purpose of This Book
The Complaint Department
Chapter 1. Defining the Scope
1.1 What is Network Security?
1.2 What Types of Network Security Are Important?
1.3 What Is the Cost of Lax Security Policies?
1.4 Where Is the Network Vulnerable?
1.5 The Network
1.6 Summary
Chapter 2. Security Model
2.1 Choosing a Security Model
2.2 OCTAVE
2.3 Build Asset-Based Threat Profiles
2.4 Identify Infrastructure Vulnerabilities
2.5 Evaluate Security Strategy and Plans
2.6 Summary
Chapter 3. Understanding Types of Attacks
3.1 Sniffing and Port Scanning
3.2 Exploits
3.3 Spoofing
3.4 Distributed Denial of Service Attacks
3.5 Viruses and Worms
3.6 Summary
Chapter 4. Routing
4.1 The Router on the Network
4.2 The Basics
4.3 Disabling Unused Services
4.4 Redundancy
4.5 Securing Routing Protocols
4.6 Limit Access to Routers
4.7 Change Default Passwords
4.8 Summary
Chapter 5. Switching
5.1 The Switch on the Network
5.2 Multilayer Switching
5.3 VLANs
5.4 Spanning Tree
5.5 MAC Addressing
5.6 ARP Tables
5.7 Restricting Access to Switches
5.8 Summary
Chapter 6. Authentication, Authorization, and Accounting
6.1 Kerberos
6.2 RADIUS
6.3 TACACS
6.4 Summary
Chapter 7. Remote Access and VPNs
7.1 VPN Solutions
7.2 IP VPN Security
7.3 Dial-In Security Access
7.4 DSL and Cable VPN Security
7.5 Encrypting Remote Sessions
7.6 The VPN on the Network
7.7 Summary
Chapter 8. Wireless Wide Area Networks
8.1 Wireless WAN Security Issues
8.2 Spread Spectrum Technology
8.3 Location
8.4 Summary
Chapter 9. Wireless Local Area Networks
9.1 Access Point Security
9.2 SSID
9.3 WEP
9.4 MAC Address Filtering
9.5 RADIUS Authentication
9.6 WLAN VPN
9.7 802.11i
9.8 Summary
Chapter 10. Firewalls and Intrusion Detection Systems
10.1 The Purpose of the Firewall
10.2 What a Firewall Cannot Do
10.3 Types of Firewalls
10.4 Layer 2 Firewalls
10.5 Intrusion Detection Systems
10.6 Summary
Chapter 11. The DMZ
11.1 DMZ Network Design
11.2 Multiple DMZ Design
11.3 DMZ Rule Sets
11.4 Summary
Chapter 12. Server Security
12.1 General Server Security Guidelines
12.2 Backups
12.3 Web Server Security
12.4 Mail Server Security
12.5 Outsourcing
12.6 Summary
Chapter 13. DNS Security
13.1 Securing Your Domain Name
13.2 A Secure BIND Installation
13.3 Limit Access to Domain Information
13.4 DNS Outsourcing
13.5 djbdns
13.6 Summary
Chapter 14. Workstation Security
14.1 General Workstation Security Guidelines
14.2 Virus and Worm Scanning
14.3 Administrative Access
14.4 Remote Login
14.5 Summary
Chapter 15. Managing Network Security
15.1 Enforcing Security Policies
15.2 Understanding Network Security Risks
15.3 Avoiding Common Mistakes
15.4 Summary
Chapter 16. Monitoring
16.1 What to Monitor
16.2 SNMP
16.3 Centralizing the Monitoring Process
16.4 Summary
Chapter 17. Logging
17.1 Protecting Against Log-Altering Attacks
17.2 Syslog Servers
17.3 Sifting Through Logged Data
17.4 Summary
Chapter 18. Responding to an Attack
18.1 Create a Response Chain of Command
18.2 Take Notes and Gather Evidence
18.3 Contain and Investigate the Problem
18.4 Remove the Problem
18.5 Contact Appropriate Parties
18.6 Prepare a Postmortem
18.7 Summary
The Practice of Network Security: Deployment Strategies for Production Environments
ISBN: 0130462233
EAN: 2147483647
Year: 2002
Pages: 131
Authors:
Allan Liska
BUY ON AMAZON
ERP and Data Warehousing in Organizations: Issues and Challenges
Challenging the Unpredictable: Changeable Order Management Systems
The Second Wave ERP Market: An Australian Viewpoint
Distributed Data Warehouse for Geo-spatial Services
A Hybrid Clustering Technique to Improve Patient Data Quality
Development of Interactive Web Sites to Enhance Police/Community Relations
Absolute Beginner[ap]s Guide to Project Management
One Title, Many Roles
The Process of Building a WBS
Leading a Project
The Importance of Project Communications
Value of Reviewing Stakeholder Expectation Management
FileMaker Pro 8: The Missing Manual
Setting up Field Controls
Understanding Calculations
Custom Functions
Putting a Complex Script Together
File Maintenance
Mastering Delphi 7
Delphi 7 and Its IDE
The Run-Time Library
Building the User Interface
Delphis Database Architecture
Appendix A Extra Delphi Tools by the Author
Twisted Network Programming Essentials
Finding Answers to Your Questions
Web Servers
Web Services and RPC
Sharing Web Services with SOAP
Setting Up a Custom SSH Server
File System Forensic Analysis
Summary
Content Category
Bibliography
Bibliography
Cylinder Group Summary
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies