List of Sidebars


Chapter 1: Do These Six Things Before You Do Anything Else

Content Filtering and Redundant Internet Connection
One Step Further

Chapter 2: Write a Security Policy

One Step Further
Security Policies and Problem Users

Chapter 3: Hardening Your Firewall

Heads Up
Using syslog as a Troubleshooting Tool
Heads Up

Chapter 4: Hardening Your Network with Intrusion Detection and Prevention

One Step Further
Detection Technologies
One Step Further
Heads Up
One Step Further
Heads Up
Heads Up
One Step Further

Chapter 5: Hardening VPN and Dial-in Remote Access

One Step Further

Chapter 6: Hardening Your Routers and Switches

Implement Exec Timeouts for Console Connections
One Step Further
One Step Futher
One Step Futher
One Step Futher
One Step Futher
One Step Futher
One Step Futher
One Step Futher

Chapter 7: Securing the Network with Content Filters

One Step Further
Heads Up
Heads Up
Heads Up
One Step Further

Chapter 8: Hardening Wireless LAN Connections

WLAN Modes of Operation and Components
Rogue WAPs
Detecting WAPs from the Wired Network
Heads Up
Heads Up
Heads Up
Heads Up
Heads Up
One Step Further
One Step Further
802.11i
One Step Further
Heads Up

Chapter 9: Implementing AAA

IAS Installation Procedures
Heads Up
Heads Up
One Step Further
Heads Up
Heads Up
Heads Up
Heads Up
Heads Up
802.1x Authentication Drawbacks

Chapter 10: Hardening Your Network with Network Management

Heads Up
Heads Up

Chapter 11: Implementing a Secure Perimeter

One Step Further
One Step Further
One Step Further
Heads Up

Chapter 12: Implementing a Secure Interior

The Hazard of Connecting the Lab Module to Your Network

Chapter 13: Auditing: Performing a Security Review

Protecting Yourself from Future Exploits
Even Secure Protocols Can Be Insecure
One Step Further
Be Aware of the Legal Liabilities
Heads Up
The Value of a Sniffer
Heads Up
One Step Further

Chapter 14: Managing Changes to Your Environment

One Step Further
One Step Further
One Step Further
One Step Further
One Step Further
Heads Up
Heads Up
Heads Up
The Religious Layer of the OSI Model
Heads Up
Planning Your Patch Response
Heads Up
Heads Up
Heads Up
One Step Further

Chapter 15: Setting Perceptions and Justifying the Cost of Security

Different Communication Methods
Using Lunch and Learns to Earn Trust
Rewarding Champions
One Step Further
Risk Analysis Terms and Definitions

Chapter 16: Addressing Staffing and Training Issues

Keeping the Bar High for Certifications
The Lost Art of the Technical Interview
Limitations of Employer References
Bonding and Background Checks
The Value and Cost of Training
One Step Further

Chapter 17: Incident Response

Heads Up
One Step Further
Heads Up
Differences Between Security Policy and Incident Response Policy
One Step Further



Hardening Network Infrastructure. Bulletproof Your Systems Before You Are Hacked.
Hardening Network Infrastructure. Bulletproof Your Systems Before You Are Hacked.
ISBN: N/A
EAN: N/A
Year: 2004
Pages: 125

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net