Index_I


I

IAS server, 283 “286, 304 “308
ICMP, 128, 170
ICMP pings , 314
IDS/IPS (Intrusion Detection/Protection System)
alerts, 98 “102
blocking traffic, 103 “104
components , 77 “78
configuring in Internet access module, 357
deployment options, 82
detection vs. prevention, 84
hardening Cisco IDS, 81 “82
hardening PureSecure on Windows systems, 78 “81
host-based, 75 “76
incident response and, 529
location of, 6
logging, 95 “98
network-based, 76 “77
overview, 74
policy, 34
sensor placement, 85 “87
server module and, 378
technologies for, 74 “75, 77
tuning sensors, 87 “94
IDS/IPS Administrator, 507
IKE
authentication, 146 “150
message integrity, 144
removing unnecessary IKE proposals, 125 “126
ILT (instructor-led training), 511
IM (Instant Messaging), 206
incident response
CIRT members , 519 “521
CIRT mission, 518 “519
CIRT responsibilities, 521 “523
discovering incidents before they occur, 527 “528
discovering incidents within environment, 528 “530
discovery phase, 530
handling phase, 532
organization needs and, 523 “524
overview, 518
planning, 523
policy, 525 “527
practicing for incidents, 527
recovery phase, 534 “535
reporting phase, 533 “534
incident response classification, 526
incident response identification, 526
incident response process flow, 526
Incident Response Team, 509
Incident Response Team Leader, 508
information and assets, assigning value to, 490 “491
Insecure .org, 401
Instant Messaging (IM), 206
instructor-led training (ILT), 511
insurance and bonding, of staff candidates, 505 “506
interfaces
disabling unused, 174
filtering rules for, 127 “128
monitoring, 441 “442
passive interfaces for routers, 180
internal audits
port scanning with Nmap, 406 “410
tools and documentation, 400 “406
vulnerability assessment with Nessus, 410 “422
Internal Security Auditor, 507
International Information Systems Security Certification Consortium (ISC), 502
International Organization for Standardization (ISO)
network management, 313
security policies, 20
Internet access module, 354 “360
content filtering, 360
external router configuration, 356 “357
firewall configuration, 358 “360
IDS/IPS and, 357
traffic flow, 354 “356
Internet connections, 5 “6
Internet content filters
client-based, 207
gateway-based, 210 “211
policy for, 34
server-based, 207 “210
solutions, 212 “213
SurfControl. See SurfControl
threats, 211 “212
Websense. See Websense
Internet Protocol (IP), 128
Internet Scanner 7.0, ISS, 401
Internet Security Association and Key Management Protocol (ISAKMP), 140 “141
Internet Service Providers (ISPs), 354
Intrusion Detection/Protection System. See IDS/IPS (Intrustion Detection/Protection System)
IP (Internet Protocol), 128
IP addresses
NAT Traversal and, 138
network schemes, 6
standards, 330
IP source routing, 169
IPS (Intrusion Protection System). See IDS/IPS (Intrustion Detection/Protection System)
IPsec
assigning policies, 343
CheckPoint firewalls and, 52 “60
Cisco Secure PIX Firewall and, 51 “52
creating policies, 336
disabling when unnecessary, 122
encapsulating insecure traffic in, 51 “60
Ethereal traffic capture and, 345
filter lists, 336 “340
setting coordination between Cisco Secure PIX Firewall and Windows XP, 344
traffic rules, 342
traffic security, 191 “193
traffic security protocols, 136 “140
tunneling rules, 340 “342
VPNs and, 108 “110, 135 “136
Iptables firewalls
BGP and, 70
encapsulating data in IPsec and, 52
OSPF and, 70
redundancy protection, 66
remote administration, 42, 46
RIP and, 69
SNMP and, 60 “61
static routes, 68
syslog and, 64
version 1.2.7, 40
ISA server, 236
ISAKMP (Internet Security Association and Key Management Protocol), 140 “141
ISC (International Information Systems Security Certification Consortium), 502
ISDN policy, 30
ISO (International Organization for Standardization)
network management, 313
security policies, 20
ISPs (Internet Service Providers), 354
IT staff, 520, 524



Hardening Network Infrastructure. Bulletproof Your Systems Before You Are Hacked.
Hardening Network Infrastructure. Bulletproof Your Systems Before You Are Hacked.
ISBN: N/A
EAN: N/A
Year: 2004
Pages: 125

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net