Network Security Fundamentals
by DeLaet, Gert; Schauwers, Gert-
This Item Qualifies for Free Shipping!*
*Excludes marketplace orders.
Rent Book
New Book
We're Sorry
Sold Out
Used Book
We're Sorry
Sold Out
eBook
We're Sorry
Not Available
How Marketplace Works:
- This item is offered by an independent seller and not shipped from our warehouse
- Item details like edition and cover design may differ from our description; see seller's comments before ordering.
- Sellers much confirm and ship within two business days; otherwise, the order will be cancelled and refunded.
- Marketplace purchases cannot be returned to eCampus.com. Contact the seller directly for inquiries; if no response within two days, contact customer service.
- Additional shipping costs apply to Marketplace purchases. Review shipping costs at checkout.
Summary
Author Biography
Table of Contents
| Foreword | p. xx |
| Introduction | p. xxi |
| Introduction | p. 1 |
| Network Security Overview | p. 3 |
| Defining Trust | p. 3 |
| Weaknesses and Vulnerabilities | p. 5 |
| Responsibilities for Network Security | p. 7 |
| Security Objectives | p. 8 |
| Conclusion | p. 9 |
| Q&A | p. 10 |
| Understanding Vulnerabilities-The Need for Security | p. 13 |
| Risk and Vulnerability | p. 13 |
| TCP/IP Suite Weaknesses | p. 14 |
| Buffer Overflows | p. 28 |
| Spoofing Techniques | p. 29 |
| Social Engineering | p. 31 |
| Conclusion | p. 32 |
| Q&A | p. 32 |
| Understanding Defenses | p. 35 |
| Digital IDs | p. 35 |
| Intrusion Detection System | p. 40 |
| PC Card-Based Solutions | p. 41 |
| Physical Security | p. 44 |
| Encrypted Login | p. 46 |
| Firewalls | p. 49 |
| Reusable Passwords | p. 50 |
| Antivirus Software | p. 51 |
| Encrypted Files | p. 52 |
| Biometrics | p. 53 |
| Conclusion | p. 55 |
| Q&A | p. 56 |
| Building Blocks | p. 59 |
| Cryptography | p. 61 |
| Cryptography versus Cryptanalysis | p. 61 |
| Modern-Day Techniques | p. 63 |
| Conclusion | p. 74 |
| Q&A | p. 74 |
| Security Policies | p. 79 |
| Defining a Security Policy? | p. 81 |
| Importance of a Security Policy | p. 81 |
| Development Process | p. 82 |
| Incident Handling Process | p. 84 |
| Security Wheel | p. 84 |
| Sample Security Policy | p. 86 |
| Conclusion | p. 88 |
| Q&A | p. 88 |
| Secure Design | p. 91 |
| Network Design-Principles | p. 92 |
| Network Design-Methodology | p. 97 |
| Return on Investment | p. 99 |
| Physical Security Issues | p. 99 |
| Switches and Hubs | p. 101 |
| Conclusion | p. 103 |
| Q&A | p. 103 |
| Tools and Techniques | p. 105 |
| Web Security | p. 107 |
| Hardening | p. 107 |
| Case Study | p. 124 |
| Conclusion | p. 128 |
| Q&A | p. 128 |
| Router Security | p. 131 |
| Basic Router Security | p. 131 |
| Router Security to Protect the Network | p. 138 |
| CBAC | p. 148 |
| Case Study | p. 152 |
| Conclusion | p. 156 |
| Q&A | p. 157 |
| References in This Chapter | p. 157 |
| Firewalls | p. 159 |
| Firewall Basics | p. 160 |
| Different Types of Firewalls | p. 162 |
| Enhancements for Firewalls | p. 175 |
| Case Study: Placing Filtering Routers and Firewalls | p. 181 |
| Summary | p. 190 |
| Q&A | p. 191 |
| Intrusion Detection System Concepts | p. 193 |
| Introduction to Intrusion Detection | p. 193 |
| Host-Based IDSs | p. 204 |
| Network-Based IDSs | p. 207 |
| IDS Management Communications-Monitoring the Network | p. 217 |
| Sensor Maintenance | p. 221 |
| Case Study: Deployment of IDS Sensors in the Organization and Their Typical Placement | p. 221 |
| Conclusion | p. 232 |
| Q&A | p. 232 |
| Remote Access | p. 235 |
| AAA Model | p. 235 |
| AAA Servers | p. 241 |
| Lock-and-Key Feature | p. 252 |
| Two-Factor Identification | p. 256 |
| Case Study: Configuring Secure Remote Access | p. 256 |
| Summary | p. 265 |
| Q&A | p. 266 |
| Virtual Private Networks | p. 269 |
| Generic Routing Encapsulation Tunnels | p. 271 |
| IP Security | p. 272 |
| VPNs with IPSec | p. 284 |
| Case Study: Remote Access VPN | p. 285 |
| Conclusion | p. 298 |
| Q&A | p. 299 |
| Public Key Infrastructure | p. 301 |
| Public Key Distribution | p. 301 |
| Trusted Third Party | p. 302 |
| PKI Topology | p. 304 |
| Enrollment Procedure | p. 306 |
| Revocation Procedure | p. 307 |
| Case Study: Creating Your Own CA | p. 312 |
| Conclusion | p. 323 |
| Q&A | p. 324 |
| Wireless Security | p. 327 |
| Different WLAN Configurations | p. 328 |
| What Is a WLAN? | p. 331 |
| How Wireless Works | p. 333 |
| Risks of Open Wireless Ports | p. 336 |
| War-Driving and War-Chalking | p. 342 |
| SAFE WLAN Design Techniques and Considerations | p. 342 |
| Case Study: Adding Wireless Solutions to a Secure Network | p. 344 |
| Conclusion | p. 349 |
| Q&A | p. 349 |
| Logging and Auditing | p. 353 |
| Logging | p. 353 |
| SYSLOG | p. 354 |
| Simple Network Management Protocol | p. 356 |
| Remote Monitoring | p. 361 |
| Service Assurance Agent | p. 362 |
| Case Study | p. 366 |
| Conclusion | p. 372 |
| Q&A | p. 373 |
| Appendixes | p. 375 |
| SAFE Blueprint | p. 377 |
| SANS Policies | p. 385 |
| NSA Guidelines | p. 393 |
| Answers to Chapter Q&A | p. 397 |
| Bibliography | p. 427 |
| Books | p. 427 |
| Website References | p. 428 |
| Index | p. 433 |
| Table of Contents provided by Ingram. All Rights Reserved. |
An electronic version of this book is available through VitalSource.
This book is viewable on PC, Mac, iPhone, iPad, iPod Touch, and most smartphones.
By purchasing, you will be able to view this book online, as well as download it, for the chosen number of days.
Digital License
You are licensing a digital product for a set duration. Durations are set forth in the product description, with "Lifetime" typically meaning five (5) years of online access and permanent download to a supported device. All licenses are non-transferable.
More details can be found here.
A downloadable version of this book is available through the eCampus Reader or compatible Adobe readers.
Applications are available on iOS, Android, PC, Mac, and Windows Mobile platforms.
Please view the compatibility matrix prior to purchase.