A teleworker computer is any computer that spends at least some of its time outside the confines of your organization's physical security. This definition errs on the side of inclusion because even a system that never connects to your organization's network while away is still susceptible to a variety of attacks, which can present problems when the system is reintroduced to the campus network. In general, there are two main kinds of teleworker computers: portable computers and fixed-location remote systems. Portable computers have unique security requirements because they can connect to many different networks, each of which has a different threat profile. Fixed-location systems are systems such as desktop PCs installed at users' homes for what can be termed full-time teleworkers. These systems typically have lowered security risks but still must deal with the inability for the organization to control the physical and network access in that location.
Part I. Network Security Foundations
Network Security Axioms
Security Policy and Operations Life Cycle
Secure Networking Threats
Network Security Technologies
Part II. Designing Secure Networks
Device Hardening
General Design Considerations
Network Security Platform Options and Best Deployment Practices
Common Application Design Considerations
Identity Design Considerations
IPsec VPN Design Considerations
Supporting-Technology Design Considerations
Designing Your Security System
Part III. Secure Network Designs
Edge Security Design
Campus Security Design
Teleworker Security Design
Part IV. Network Management, Case Studies, and Conclusions
Secure Network Management and Network Security Management
Case Studies
Conclusions
References
Appendix A. Glossary of Terms
Appendix B. Answers to Applied Knowledge Questions
Appendix C. Sample Security Policies
INFOSEC Acceptable Use Policy
Password Policy
Guidelines on Antivirus Process
Index