Flylib.com
The Practice of Network Security: Deployment Strategies for Production Environments
The Practice of Network Security: Deployment Strategies for Production Environments
ISBN: 0130462233
EAN: 2147483647
Year: 2002
Pages: 131
Authors:
Allan Liska
BUY ON AMAZON
The Practice of Network Security: Deployment Strategies for Production Environments
Table of Contents
Copyright
Prentice Hall PTR Series in Computer Networking and Distributed Systems
About Prentice Hall Professional Technical Reference
Acknowledgements
Introduction
Purpose of This Book
The Complaint Department
Chapter 1. Defining the Scope
1.1 What is Network Security?
1.2 What Types of Network Security Are Important?
1.3 What Is the Cost of Lax Security Policies?
1.4 Where Is the Network Vulnerable?
1.5 The Network
1.6 Summary
Chapter 2. Security Model
2.1 Choosing a Security Model
2.2 OCTAVE
2.3 Build Asset-Based Threat Profiles
2.4 Identify Infrastructure Vulnerabilities
2.5 Evaluate Security Strategy and Plans
2.6 Summary
Chapter 3. Understanding Types of Attacks
3.1 Sniffing and Port Scanning
3.2 Exploits
3.3 Spoofing
3.4 Distributed Denial of Service Attacks
3.5 Viruses and Worms
3.6 Summary
Chapter 4. Routing
4.1 The Router on the Network
4.2 The Basics
4.3 Disabling Unused Services
4.4 Redundancy
4.5 Securing Routing Protocols
4.6 Limit Access to Routers
4.7 Change Default Passwords
4.8 Summary
Chapter 5. Switching
5.1 The Switch on the Network
5.2 Multilayer Switching
5.3 VLANs
5.4 Spanning Tree
5.5 MAC Addressing
5.6 ARP Tables
5.7 Restricting Access to Switches
5.8 Summary
Chapter 6. Authentication, Authorization, and Accounting
6.1 Kerberos
6.2 RADIUS
6.3 TACACS
6.4 Summary
Chapter 7. Remote Access and VPNs
7.1 VPN Solutions
7.2 IP VPN Security
7.3 Dial-In Security Access
7.4 DSL and Cable VPN Security
7.5 Encrypting Remote Sessions
7.6 The VPN on the Network
7.7 Summary
Chapter 8. Wireless Wide Area Networks
8.1 Wireless WAN Security Issues
8.2 Spread Spectrum Technology
8.3 Location
8.4 Summary
Chapter 9. Wireless Local Area Networks
9.1 Access Point Security
9.2 SSID
9.3 WEP
9.4 MAC Address Filtering
9.5 RADIUS Authentication
9.6 WLAN VPN
9.7 802.11i
9.8 Summary
Chapter 10. Firewalls and Intrusion Detection Systems
10.1 The Purpose of the Firewall
10.2 What a Firewall Cannot Do
10.3 Types of Firewalls
10.4 Layer 2 Firewalls
10.5 Intrusion Detection Systems
10.6 Summary
Chapter 11. The DMZ
11.1 DMZ Network Design
11.2 Multiple DMZ Design
11.3 DMZ Rule Sets
11.4 Summary
Chapter 12. Server Security
12.1 General Server Security Guidelines
12.2 Backups
12.3 Web Server Security
12.4 Mail Server Security
12.5 Outsourcing
12.6 Summary
Chapter 13. DNS Security
13.1 Securing Your Domain Name
13.2 A Secure BIND Installation
13.3 Limit Access to Domain Information
13.4 DNS Outsourcing
13.5 djbdns
13.6 Summary
Chapter 14. Workstation Security
14.1 General Workstation Security Guidelines
14.2 Virus and Worm Scanning
14.3 Administrative Access
14.4 Remote Login
14.5 Summary
Chapter 15. Managing Network Security
15.1 Enforcing Security Policies
15.2 Understanding Network Security Risks
15.3 Avoiding Common Mistakes
15.4 Summary
Chapter 16. Monitoring
16.1 What to Monitor
16.2 SNMP
16.3 Centralizing the Monitoring Process
16.4 Summary
Chapter 17. Logging
17.1 Protecting Against Log-Altering Attacks
17.2 Syslog Servers
17.3 Sifting Through Logged Data
17.4 Summary
Chapter 18. Responding to an Attack
18.1 Create a Response Chain of Command
18.2 Take Notes and Gather Evidence
18.3 Contain and Investigate the Problem
18.4 Remove the Problem
18.5 Contact Appropriate Parties
18.6 Prepare a Postmortem
18.7 Summary
The Practice of Network Security: Deployment Strategies for Production Environments
ISBN: 0130462233
EAN: 2147483647
Year: 2002
Pages: 131
Authors:
Allan Liska
BUY ON AMAZON
High-Speed Signal Propagation[c] Advanced Black Magic
Proximity Effect
Differential Signaling
Differential to Common-Mode Conversion
FAQ: Older Cable Types
Appendix E. erf( )
Software Configuration Management
Configuration Status Accounting
Appendix M Problem Report (PR)
Appendix Q Problem Trouble Report (PTR)
Appendix T Software Configuration Management Plan (SCMP)
Appendix X SCM Guidance for Achieving the Repeatable Level on the Software
Information Dashboard Design: The Effective Visual Communication of Data
Supplying Inadequate Context for the Data
Effective Dashboard Display Media
An Ideal Library of Dashboard Display Media
Maintain Consistency for Quick and Accurate Interpretation
Make the Viewing Experience Aesthetically Pleasing
Special Edition Using Crystal Reports 10
Making Presentation-Quality Reports
Publishing to the Web Desktop
Deploying Crystal Enterprise in a Complex Network Environment
Building Reports with the Visual Basic Report Designer
Troubleshooting
What is Lean Six Sigma
Key #2: Improve Your Processes
Key #3: Work Together for Maximum Gain
Key #4: Base Decisions on Data and Facts
Beyond the Basics: The Five Laws of Lean Six Sigma
Six Things Managers Must Do: How to Support Lean Six Sigma
Telecommunications Essentials, Second Edition: The Complete Global Source (2nd Edition)
Coaxial Cable
Microwave
Establishing Connections: Networking Modes and Switching Modes
Internet Addressing and Address Resolution
Multimedia Networking Requirements
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies