Flylib.com
The Practice of Network Security: Deployment Strategies for Production Environments
The Practice of Network Security: Deployment Strategies for Production Environments
ISBN: 0130462233
EAN: 2147483647
Year: 2002
Pages: 131
Authors:
Allan Liska
BUY ON AMAZON
The Practice of Network Security: Deployment Strategies for Production Environments
Table of Contents
Copyright
Prentice Hall PTR Series in Computer Networking and Distributed Systems
About Prentice Hall Professional Technical Reference
Acknowledgements
Introduction
Purpose of This Book
The Complaint Department
Chapter 1. Defining the Scope
1.1 What is Network Security?
1.2 What Types of Network Security Are Important?
1.3 What Is the Cost of Lax Security Policies?
1.4 Where Is the Network Vulnerable?
1.5 The Network
1.6 Summary
Chapter 2. Security Model
2.1 Choosing a Security Model
2.2 OCTAVE
2.3 Build Asset-Based Threat Profiles
2.4 Identify Infrastructure Vulnerabilities
2.5 Evaluate Security Strategy and Plans
2.6 Summary
Chapter 3. Understanding Types of Attacks
3.1 Sniffing and Port Scanning
3.2 Exploits
3.3 Spoofing
3.4 Distributed Denial of Service Attacks
3.5 Viruses and Worms
3.6 Summary
Chapter 4. Routing
4.1 The Router on the Network
4.2 The Basics
4.3 Disabling Unused Services
4.4 Redundancy
4.5 Securing Routing Protocols
4.6 Limit Access to Routers
4.7 Change Default Passwords
4.8 Summary
Chapter 5. Switching
5.1 The Switch on the Network
5.2 Multilayer Switching
5.3 VLANs
5.4 Spanning Tree
5.5 MAC Addressing
5.6 ARP Tables
5.7 Restricting Access to Switches
5.8 Summary
Chapter 6. Authentication, Authorization, and Accounting
6.1 Kerberos
6.2 RADIUS
6.3 TACACS
6.4 Summary
Chapter 7. Remote Access and VPNs
7.1 VPN Solutions
7.2 IP VPN Security
7.3 Dial-In Security Access
7.4 DSL and Cable VPN Security
7.5 Encrypting Remote Sessions
7.6 The VPN on the Network
7.7 Summary
Chapter 8. Wireless Wide Area Networks
8.1 Wireless WAN Security Issues
8.2 Spread Spectrum Technology
8.3 Location
8.4 Summary
Chapter 9. Wireless Local Area Networks
9.1 Access Point Security
9.2 SSID
9.3 WEP
9.4 MAC Address Filtering
9.5 RADIUS Authentication
9.6 WLAN VPN
9.7 802.11i
9.8 Summary
Chapter 10. Firewalls and Intrusion Detection Systems
10.1 The Purpose of the Firewall
10.2 What a Firewall Cannot Do
10.3 Types of Firewalls
10.4 Layer 2 Firewalls
10.5 Intrusion Detection Systems
10.6 Summary
Chapter 11. The DMZ
11.1 DMZ Network Design
11.2 Multiple DMZ Design
11.3 DMZ Rule Sets
11.4 Summary
Chapter 12. Server Security
12.1 General Server Security Guidelines
12.2 Backups
12.3 Web Server Security
12.4 Mail Server Security
12.5 Outsourcing
12.6 Summary
Chapter 13. DNS Security
13.1 Securing Your Domain Name
13.2 A Secure BIND Installation
13.3 Limit Access to Domain Information
13.4 DNS Outsourcing
13.5 djbdns
13.6 Summary
Chapter 14. Workstation Security
14.1 General Workstation Security Guidelines
14.2 Virus and Worm Scanning
14.3 Administrative Access
14.4 Remote Login
14.5 Summary
Chapter 15. Managing Network Security
15.1 Enforcing Security Policies
15.2 Understanding Network Security Risks
15.3 Avoiding Common Mistakes
15.4 Summary
Chapter 16. Monitoring
16.1 What to Monitor
16.2 SNMP
16.3 Centralizing the Monitoring Process
16.4 Summary
Chapter 17. Logging
17.1 Protecting Against Log-Altering Attacks
17.2 Syslog Servers
17.3 Sifting Through Logged Data
17.4 Summary
Chapter 18. Responding to an Attack
18.1 Create a Response Chain of Command
18.2 Take Notes and Gather Evidence
18.3 Contain and Investigate the Problem
18.4 Remove the Problem
18.5 Contact Appropriate Parties
18.6 Prepare a Postmortem
18.7 Summary
The Practice of Network Security: Deployment Strategies for Production Environments
ISBN: 0130462233
EAN: 2147483647
Year: 2002
Pages: 131
Authors:
Allan Liska
BUY ON AMAZON
CompTIA Project+ Study Guide: Exam PK0-003
Answers to Assessment Test
Scope Planning
Project Execution
Project Control
Appendix A Systems Development Life Cycle
Agile Project Management: Creating Innovative Products (2nd Edition)
Herman and Maya
Principles to Practices
Envision Summary
Practice: Feature Cards
Practice: Daily Interaction with the Customer Team
MySQL Clustering
Storage Nodes
MySQL Clusters Native Backup Tool
Security for MySQL Cluster
Performance Metrics
What to Look for When Something Goes Wrong
PostgreSQL(c) The comprehensive guide to building, programming, and administering PostgreSQL databases
The ARC Buffer Manager
Client-Side APIs
Client 1Connecting to the Server
Summary
Overview
Pocket Guide to the National Electrical Code(R), 2005 Edition (8th Edition)
Article 312 Cabinets, Cutout Boxes, and Meter Socket Enclosures
Article 404: Switches
Article 503 Class III Locations
Notes for Tables 12(A) and 12(B)
Example No. D5(b) Optional Calculation for Multifamily Dwelling Served at 208Y/120 Volts, Three Phase
Java All-In-One Desk Reference For Dummies
Welcome to Java
Working with TextPad
Going Around in Circles (Or, Using Loops)
Understanding Object-Oriented Programming
Getting Input from the User
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies