Flylib.com
Network Security Architectures
ISBN: 158705115X
EAN: 2147483647
Year: 2006
Pages: 249
Authors:
Sean Convery
BUY ON AMAZON
Part I. Network Security Foundations
Network Security Axioms
Network Security Axioms
Network Security Is a System
Business Priorities Must Come First
Network Security Promotes Good Network Design
Everything Is a Target
Everything Is a Weapon
Strive for Operational Simplicity
Good Network Security Is Predictable
Avoid Security Through Obscurity
Confidentiality and Security Are Not the Same
Applied Knowledge Questions
Security Policy and Operations Life Cycle
Security Policy and Operations Life Cycle
You Cant Buy Network Security
What Is a Security Policy?
Security System Development and Operations Overview
References
Applied Knowledge Questions
Secure Networking Threats
Secure Networking Threats
The Attack Process
Attacker Types
Vulnerability Types
Attack Results
Attack Taxonomy
References
Applied Knowledge Questions
Network Security Technologies
Network Security Technologies
The Difficulties of Secure Networking
Security Technologies
Emerging Security Technologies
References
Applied Knowledge Questions
Part II. Designing Secure Networks
Device Hardening
Device Hardening
Components of a Hardening Strategy
Network Devices
NIDS
Host Operating Systems
Applications
Appliance-Based Network Services
Rogue Device Detection
References
Applied Knowledge Questions
General Design Considerations
General Design Considerations
Physical Security Issues
Layer 2 Security Considerations
IP Addressing Design Considerations
ICMP Design Considerations
Routing Considerations
Transport Protocol Design Considerations
DoS Design Considerations
References
Applied Knowledge Questions
Network Security Platform Options and Best Deployment Practices
Network Security Platform Options
Network Security Device Best Practices
Applied Knowledge Questions
Common Application Design Considerations
Common Application Design Considerations
E-Mail
DNS
HTTP/HTTPS
FTP
Instant Messaging
Application Evaluation
References
Applied Knowledge Questions
Identity Design Considerations
Identity Design Considerations
Basic Foundation Identity Concepts
Types of Identity
Factors in Identity
Role of Identity in Secure Networking
Identity Technology Guidelines
Identity Deployment Recommendations
References
Applied Knowledge Questions
IPsec VPN Design Considerations
IPsec VPN Design Considerations
VPN Basics
Types of IPsec VPNs
IPsec Modes of Operation and Security Options
Topology Considerations
Design Considerations
Site-to-Site Deployment Examples
IPsec Outsourcing
References
Applied Knowledge Questions
Supporting-Technology Design Considerations
Supporting-Technology Design Considerations
Content
Load Balancing
Wireless LANs
IP Telephony
References
Applied Knowledge Questions
Designing Your Security System
Designing Your Security System
Network Design Refresher
Security System Concepts
Impact of Network Security on the Entire Design
Ten Steps to Designing Your Security System
Applied Knowledge Questions
Part III. Secure Network Designs
Edge Security Design
Edge Security Design
What Is the Edge?
Expected Threats
Threat Mitigation
Identity Considerations
Network Design Considerations
Small Network Edge Security Design
Medium Network Edge Security Design
High-End Resilient Edge Security Design
Provisions for E-Commerce and Extranet Design
References
Applied Knowledge Questions
Campus Security Design
Campus Security Design
What Is the Campus?
Campus Trust Model
Expected Threats
Threat Mitigation
Identity Considerations
Network Design Considerations
Small Network Campus Security Design
Medium Network Campus Security Design
High-End Resilient Campus Security Design
References
Applied Knowledge Questions
Teleworker Security Design
Teleworker Security Design
Defining the Teleworker Environment
Expected Threats
Threat Mitigation
Identity Considerations
Network Design Considerations
Software-Based Teleworker Design
Hardware-Based Teleworker Design
Design Evaluations
Applied Knowledge Questions
Part IV. Network Management, Case Studies, and Conclusions
Secure Network Management and Network Security Management
Secure Network Management and Network Security Management
Utopian Management Goals
Organizational Realities
Protocol Capabilities
Tool Capabilities
Secure Management Design Options
Network Security Management Best Practices
References
Applied Knowledge Questions
Case Studies
Case Studies
Introduction
Real-World Applicability
Organization
NetGamesRUs.com
University of Insecurity
Black Helicopter Research Limited
Applied Knowledge Questions
Conclusions
Conclusions
Introduction
Management Problems Will Continue
Security Will Become Computationally Less Expensive
Homogeneous and Heterogeneous Networks
Legislation Should Garner Serious Consideration
IP Version 6 Changes Things
Network Security Is a System
References
References
Appendix A. Glossary of Terms
Appendix A. Glossary of Terms
Appendix B. Answers to Applied Knowledge Questions
Appendix B. Answers to Applied Knowledge Questions
Appendix C. Sample Security Policies
Appendix C. Sample Security Policies
INFOSEC Acceptable Use Policy
INFOSEC Acceptable Use Policy
Password Policy
Password Policy
Guidelines on Antivirus Process
Guidelines on Antivirus Process
Index
Network Security Architectures
ISBN: 158705115X
EAN: 2147483647
Year: 2006
Pages: 249
Authors:
Sean Convery
BUY ON AMAZON
Microsoft Windows Server 2003(c) TCP/IP Protocols and Services (c) Technical Reference
Local Area Network (LAN) Technologies
Internet Control Message Protocol (ICMP)
Internet Protocol Version 6 (IPv6)
Dynamic Host Configuration Protocol (DHCP) Server Service
File and Printer Sharing
C++ How to Program (5th Edition)
Introduction
Introduction
Fundamentals of Operator Overloading
Conversion to C-Style Pointer-Based char * Strings
Class bitset
Mapping Hacks: Tips & Tools for Electronic Cartography
Hack 2. Route Planning Online
Hack 5. The Road Less Traveled by in MapQuest
Hack 49. Get Your Tracklogs in Windows or Linux
Hack 77. Become a GRASS Ninja
Hack 88. Load Your Waypoints into a Spatial Database
Twisted Network Programming Essentials
Accepting Connections from Clients
Web Clients
Accessing a Password-Protected Page
Providing POP3 Access to Mailboxes
Providing an Administrative Python Shell
Professional Struts Applications: Building Web Sites with Struts ObjectRelational Bridge, Lucene, and Velocity (Experts Voice)
The Challenges of Web Application Development
Form Presentation and Validation with Struts
Building a Data Access Tier with ObjectRelationalBridge
Templates and Velocity
Creating a Search Engine with Lucene
Cultural Imperative: Global Trends in the 21st Century
Culture and Religion
Cognitive Processes
The Pacific Rim: The Fourth Cultural Ecology
Conclusion
Appendix C National Traits
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies