naming conventions, 125-126
NAT (network address translation), 117
National Security Agency Infosec Assessment Methodology (NSA IAM), 323-325
concepts, 323
on-site activities phase, 324-325
overview, 323
post-assessment phase, 325
pre-assessment phase, 324
National Vulnerability Database (NVD), 119
NDAs (nondisclosure agreements), 74
neighborhood, where data centers located, 88
Nessus plugin, 201, 217
Nessus Scanner, 161
NetMeeting Remote Desktop Sharing, 145 .netrc files, 194-195
Netsh tool, 139
Netstat utility, 139, 144
netstumbler, 272
network
connectivity, 86
encryption, 239-241
remote access into, 75
network address translation (NAT), 117
network auditing, 113-134
background, 113-114
firewalls, 116-117
additional firewall controls, 130-131, 134
application proxies, 117
application-level firewalls, 117
overview, 116-117
packet-filtering firewalls, 117
stateful packet inspection (SPI) firewalls, 117
general steps, 118-126, 132-133
knowledge base, 132
overview, 21, 113
routers, 116, 129-130, 133
switches, 114-116, 126-128, 133
tools and technologies, 131-132
Network File System (NFS), 193-194
network scanners, 160
network security and controls
Unix and Linux operating systems auditing
master checklist, 205
test steps, 188-195
Windows Server, 151-156
host-based vulnerability scanning, 155-156
intrusion detection, 154
intrusion prevention, 154
network vulnerability scanning, 154-155
overview, 151-154
Network Time Protocol (NTP), 124
network vulnerability scanning, 154-155, 189-190, 199
NFS (Network File System), 193-194
Nikto tool, 217
NIS, 171-172
NIS+, 171-172
Nitko, 221
*nix systems. See Unix and Linux operating systems
NMAP, 201
nondisclosure agreements (NDAs), 74
nonemployee logical access, 73-74
NSA IAM (National Security Agency Infosec Assessment Methodology), 323-325
concepts, 323
on-site activities phase, 324-325
overview, 323
post-assessment phase, 325
pre-assessment phase, 324
NTP (Network Time Protocol), 124
NVD (National Vulnerability Database), 119