Flylib.com
Network Security Architectures
ISBN: 158705115X
EAN: 2147483647
Year: 2006
Pages: 249
Authors:
Sean Convery
BUY ON AMAZON
Part I. Network Security Foundations
Network Security Axioms
Network Security Axioms
Network Security Is a System
Business Priorities Must Come First
Network Security Promotes Good Network Design
Everything Is a Target
Everything Is a Weapon
Strive for Operational Simplicity
Good Network Security Is Predictable
Avoid Security Through Obscurity
Confidentiality and Security Are Not the Same
Applied Knowledge Questions
Security Policy and Operations Life Cycle
Security Policy and Operations Life Cycle
You Cant Buy Network Security
What Is a Security Policy?
Security System Development and Operations Overview
References
Applied Knowledge Questions
Secure Networking Threats
Secure Networking Threats
The Attack Process
Attacker Types
Vulnerability Types
Attack Results
Attack Taxonomy
References
Applied Knowledge Questions
Network Security Technologies
Network Security Technologies
The Difficulties of Secure Networking
Security Technologies
Emerging Security Technologies
References
Applied Knowledge Questions
Part II. Designing Secure Networks
Device Hardening
Device Hardening
Components of a Hardening Strategy
Network Devices
NIDS
Host Operating Systems
Applications
Appliance-Based Network Services
Rogue Device Detection
References
Applied Knowledge Questions
General Design Considerations
General Design Considerations
Physical Security Issues
Layer 2 Security Considerations
IP Addressing Design Considerations
ICMP Design Considerations
Routing Considerations
Transport Protocol Design Considerations
DoS Design Considerations
References
Applied Knowledge Questions
Network Security Platform Options and Best Deployment Practices
Network Security Platform Options
Network Security Device Best Practices
Applied Knowledge Questions
Common Application Design Considerations
Common Application Design Considerations
E-Mail
DNS
HTTP/HTTPS
FTP
Instant Messaging
Application Evaluation
References
Applied Knowledge Questions
Identity Design Considerations
Identity Design Considerations
Basic Foundation Identity Concepts
Types of Identity
Factors in Identity
Role of Identity in Secure Networking
Identity Technology Guidelines
Identity Deployment Recommendations
References
Applied Knowledge Questions
IPsec VPN Design Considerations
IPsec VPN Design Considerations
VPN Basics
Types of IPsec VPNs
IPsec Modes of Operation and Security Options
Topology Considerations
Design Considerations
Site-to-Site Deployment Examples
IPsec Outsourcing
References
Applied Knowledge Questions
Supporting-Technology Design Considerations
Supporting-Technology Design Considerations
Content
Load Balancing
Wireless LANs
IP Telephony
References
Applied Knowledge Questions
Designing Your Security System
Designing Your Security System
Network Design Refresher
Security System Concepts
Impact of Network Security on the Entire Design
Ten Steps to Designing Your Security System
Applied Knowledge Questions
Part III. Secure Network Designs
Edge Security Design
Edge Security Design
What Is the Edge?
Expected Threats
Threat Mitigation
Identity Considerations
Network Design Considerations
Small Network Edge Security Design
Medium Network Edge Security Design
High-End Resilient Edge Security Design
Provisions for E-Commerce and Extranet Design
References
Applied Knowledge Questions
Campus Security Design
Campus Security Design
What Is the Campus?
Campus Trust Model
Expected Threats
Threat Mitigation
Identity Considerations
Network Design Considerations
Small Network Campus Security Design
Medium Network Campus Security Design
High-End Resilient Campus Security Design
References
Applied Knowledge Questions
Teleworker Security Design
Teleworker Security Design
Defining the Teleworker Environment
Expected Threats
Threat Mitigation
Identity Considerations
Network Design Considerations
Software-Based Teleworker Design
Hardware-Based Teleworker Design
Design Evaluations
Applied Knowledge Questions
Part IV. Network Management, Case Studies, and Conclusions
Secure Network Management and Network Security Management
Secure Network Management and Network Security Management
Utopian Management Goals
Organizational Realities
Protocol Capabilities
Tool Capabilities
Secure Management Design Options
Network Security Management Best Practices
References
Applied Knowledge Questions
Case Studies
Case Studies
Introduction
Real-World Applicability
Organization
NetGamesRUs.com
University of Insecurity
Black Helicopter Research Limited
Applied Knowledge Questions
Conclusions
Conclusions
Introduction
Management Problems Will Continue
Security Will Become Computationally Less Expensive
Homogeneous and Heterogeneous Networks
Legislation Should Garner Serious Consideration
IP Version 6 Changes Things
Network Security Is a System
References
References
Appendix A. Glossary of Terms
Appendix A. Glossary of Terms
Appendix B. Answers to Applied Knowledge Questions
Appendix B. Answers to Applied Knowledge Questions
Appendix C. Sample Security Policies
Appendix C. Sample Security Policies
INFOSEC Acceptable Use Policy
INFOSEC Acceptable Use Policy
Password Policy
Password Policy
Guidelines on Antivirus Process
Guidelines on Antivirus Process
Index
Network Security Architectures
ISBN: 158705115X
EAN: 2147483647
Year: 2006
Pages: 249
Authors:
Sean Convery
BUY ON AMAZON
Inside Network Security Assessment: Guarding Your IT Infrastructure
Risk Terminology
Level II Assessments
Post-Assessment Activities
Statement of Work
Procurement Best Practices
The .NET Developers Guide to Directory Services Programming
Administrative Limits Governing Active Directory and ADAM
Optimizing Search Performance
Searching the Global Catalog
Error 0x8007052E: "Login Failure: unknown user name or bad password."
Error 0x8007202F: A constraint violation occurred.
Adobe After Effects 7.0 Studio Techniques
Color Correction
Conclusion
Conditionals and Triggers
Floating Point
Conclusion
SQL Hacks
Hack 33. Get Values and Subtotals in One Shot
Hack 44. Tunnel into MySQL from Microsoft Access
Hack 76. Compress to Avoid LOBs
Hack 85. Traverse a Simple Tree
Hack 93. Auto-Create Database Users
File System Forensic Analysis
Introduction
File Name Category
FAT Data Structures
The Big Picture
UFS2 Group Descriptor
DNS & BIND Cookbook
Configuring a Name Server as the Primary Master for a Zone
Finding Out Whos Querying a Name Server
Delegating a Subdomain of a Reverse-Mapping Zone
Setting Up a Hidden Primary Master Name Server
Securing Zone Transfers
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies