Index_N


N

NAT, See Network address translation

Natural disasters, 25, 27, See also Disaster recovery planning

Nessus, 222

NetBEUI, 72, 292

Network address translation (NAT), 91, 92–95, 327

firewall interoperability, 92, 93–94, 200, 245–251

IPSec interoperability, 35, 327–331

port address translation, 94, 328

Network administrator separation of duties, 43

Network interface card, VPN performance and, 334–335

Network layer, See also Internet Protocol; Routers

Network penetration testing, 4, 222, 347–362

DNS tool, 354–355

final report, 348–349

gaining administrative access, 357

information gathering (footprinting), 352–357

information security policy and, 349, 358–359

network scanning tools, 355–357

outsourcing, 359–361

planning, 348

scope and off-limits services, 348

summary, 361–362

understanding hacker motivations, 349–352

using results, 358–359

Network scanning tools, 79, 355–357

tcpdump, 39–40

Network security

access, See Access control

certifications, 4–5

defense in depth, 32, 208

firewalls, See Firewalls

general law of security, 256

incident response, See Incident response

internal threats, 114–115

liability issues, 10–12

policy, See Security policy

security model, 8

technology-based approach, 7–8

testing, 44, See also Network penetration testing

VPNs, See Virtual private networks

Network Time Protocol (NTP), 139–141

Nimda, 226

Nmap, 222

Nonce (pseudo-random number), 322

Nondiscretionary access control, 150–152

Non-repudiation, 125, 126, 169, 172

Notarization, 169, 172

Null interface routing, 234

Null-packet, 107




Network Perimeter Security. Building Defense In-Depth
Network Perimeter Security: Building Defense In-Depth
ISBN: 0849316286
EAN: 2147483647
Year: 2004
Pages: 119
Authors: Cliff Riggs

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net