Network Security Fundamentals

by ;
Edition: 1st
Format: Paperback
Pub. Date: 2004-09-08
Publisher(s): Cisco Press
  • Free Shipping Icon

    This Item Qualifies for Free Shipping!*

    *Excludes marketplace orders.

List Price: $68.24

Rent Book

Select for Price
There was a problem. Please try again later.

New Book

We're Sorry
Sold Out

Used Book

We're Sorry
Sold Out

eBook

We're Sorry
Not Available

How Marketplace Works:

  • This item is offered by an independent seller and not shipped from our warehouse
  • Item details like edition and cover design may differ from our description; see seller's comments before ordering.
  • Sellers much confirm and ship within two business days; otherwise, the order will be cancelled and refunded.
  • Marketplace purchases cannot be returned to eCampus.com. Contact the seller directly for inquiries; if no response within two days, contact customer service.
  • Additional shipping costs apply to Marketplace purchases. Review shipping costs at checkout.

Summary

An introduction to the key tools and technologies used to secure network access Examine common security vulnerabilities and the defenses used to protect network resources Learn about cryptography, including modern-day techniques like 3DES, RSA, hashing, and the use of certificates Learn how to design, adopt, and enforce security policies Evaluate the nuances of secure network design Secure HTTP traffic by hardening operating systems, servers, and browsers Protect routers through administrative access policies and services Understand what firewalls do and how to implement them to maximum effect Inspect and monitor network activity with IDS Utilize VPNs for secure remote access Learn about PKI technologies Examine secure wireless design techniques Use logging and auditing tools, such as syslog, SNMP, RMON, and SAA, to manage network traffic Companies have long been struggling with threats from the hacking community. Keeping pace with the rapid evolution of security technology and the growing complexity of threats is a challenge even in the best of times. The increased focus on security has sent IT managers and engineers scrambling to acquire the proper expertise to implement complex, multilayered solutions. Network Security Fundamentals introduces the topic of network security in an easy-to-understand and comprehensive manner. This book is designed to provide a fundamental understanding of the various components of a network security architecture and to demonstrate how each component can be implemented to achieve best results. The book uses straightforward language to introduce topics and to show the features, mechanics, and functionality of various network security devices. A series of case studies helps illuminate concepts and shows how you can apply the concepts to solve real-world problems. Divided into four parts, Network Security Fundamentals takes you on a tour of all the essential technologies and modern defenses at your disposal to help you maintain network uptime and data integrity. Part I covers the basics, introducing terms and concepts and laying the foundation of a solid security structure. The discussion focuses on weaknesses and vulnerabilities along with an overview of the traditional defenses used to thwart attacks. Part II examines two components of security-cryptography and security policies. Part III looks at the various security components. Separate chapters cover web security, router security, firewalls, intrusion detection systems (IDS), remote access security, virtual private networks (VPN), Public Key Infrastructure (PKI), wireless security, and logging and auditing. Each chapter in this section is a self-contained tutorial, allowing you to skip to those topics of greatest interest or primary concern. Part IV includes several reference appendixes, including the Cisco SAFE Blueprint, NSA guidelines, and SANS policies. Whether you are looking for an introduction to network security principles and practices or a security configuration reference, this book provides you with the invaluable insight you need to protect valuable company resources.

Author Biography

Gert De Laet, CCIE No. 2657, is a CCIE in both Routing and Switching and Security Gert Schauwers, CCIE No. 6942, has CCIE certifications in Security, Routing and Switching, and Communication and Services

Table of Contents

Forewordp. xx
Introductionp. xxi
Introductionp. 1
Network Security Overviewp. 3
Defining Trustp. 3
Weaknesses and Vulnerabilitiesp. 5
Responsibilities for Network Securityp. 7
Security Objectivesp. 8
Conclusionp. 9
Q&Ap. 10
Understanding Vulnerabilities-The Need for Securityp. 13
Risk and Vulnerabilityp. 13
TCP/IP Suite Weaknessesp. 14
Buffer Overflowsp. 28
Spoofing Techniquesp. 29
Social Engineeringp. 31
Conclusionp. 32
Q&Ap. 32
Understanding Defensesp. 35
Digital IDsp. 35
Intrusion Detection Systemp. 40
PC Card-Based Solutionsp. 41
Physical Securityp. 44
Encrypted Loginp. 46
Firewallsp. 49
Reusable Passwordsp. 50
Antivirus Softwarep. 51
Encrypted Filesp. 52
Biometricsp. 53
Conclusionp. 55
Q&Ap. 56
Building Blocksp. 59
Cryptographyp. 61
Cryptography versus Cryptanalysisp. 61
Modern-Day Techniquesp. 63
Conclusionp. 74
Q&Ap. 74
Security Policiesp. 79
Defining a Security Policy?p. 81
Importance of a Security Policyp. 81
Development Processp. 82
Incident Handling Processp. 84
Security Wheelp. 84
Sample Security Policyp. 86
Conclusionp. 88
Q&Ap. 88
Secure Designp. 91
Network Design-Principlesp. 92
Network Design-Methodologyp. 97
Return on Investmentp. 99
Physical Security Issuesp. 99
Switches and Hubsp. 101
Conclusionp. 103
Q&Ap. 103
Tools and Techniquesp. 105
Web Securityp. 107
Hardeningp. 107
Case Studyp. 124
Conclusionp. 128
Q&Ap. 128
Router Securityp. 131
Basic Router Securityp. 131
Router Security to Protect the Networkp. 138
CBACp. 148
Case Studyp. 152
Conclusionp. 156
Q&Ap. 157
References in This Chapterp. 157
Firewallsp. 159
Firewall Basicsp. 160
Different Types of Firewallsp. 162
Enhancements for Firewallsp. 175
Case Study: Placing Filtering Routers and Firewallsp. 181
Summaryp. 190
Q&Ap. 191
Intrusion Detection System Conceptsp. 193
Introduction to Intrusion Detectionp. 193
Host-Based IDSsp. 204
Network-Based IDSsp. 207
IDS Management Communications-Monitoring the Networkp. 217
Sensor Maintenancep. 221
Case Study: Deployment of IDS Sensors in the Organization and Their Typical Placementp. 221
Conclusionp. 232
Q&Ap. 232
Remote Accessp. 235
AAA Modelp. 235
AAA Serversp. 241
Lock-and-Key Featurep. 252
Two-Factor Identificationp. 256
Case Study: Configuring Secure Remote Accessp. 256
Summaryp. 265
Q&Ap. 266
Virtual Private Networksp. 269
Generic Routing Encapsulation Tunnelsp. 271
IP Securityp. 272
VPNs with IPSecp. 284
Case Study: Remote Access VPNp. 285
Conclusionp. 298
Q&Ap. 299
Public Key Infrastructurep. 301
Public Key Distributionp. 301
Trusted Third Partyp. 302
PKI Topologyp. 304
Enrollment Procedurep. 306
Revocation Procedurep. 307
Case Study: Creating Your Own CAp. 312
Conclusionp. 323
Q&Ap. 324
Wireless Securityp. 327
Different WLAN Configurationsp. 328
What Is a WLAN?p. 331
How Wireless Worksp. 333
Risks of Open Wireless Portsp. 336
War-Driving and War-Chalkingp. 342
SAFE WLAN Design Techniques and Considerationsp. 342
Case Study: Adding Wireless Solutions to a Secure Networkp. 344
Conclusionp. 349
Q&Ap. 349
Logging and Auditingp. 353
Loggingp. 353
SYSLOGp. 354
Simple Network Management Protocolp. 356
Remote Monitoringp. 361
Service Assurance Agentp. 362
Case Studyp. 366
Conclusionp. 372
Q&Ap. 373
Appendixesp. 375
SAFE Blueprintp. 377
SANS Policiesp. 385
NSA Guidelinesp. 393
Answers to Chapter Q&Ap. 397
Bibliographyp. 427
Booksp. 427
Website Referencesp. 428
Indexp. 433
Table of Contents provided by Ingram. All Rights Reserved.

An electronic version of this book is available through VitalSource.

This book is viewable on PC, Mac, iPhone, iPad, iPod Touch, and most smartphones.

By purchasing, you will be able to view this book online, as well as download it, for the chosen number of days.

Digital License

You are licensing a digital product for a set duration. Durations are set forth in the product description, with "Lifetime" typically meaning five (5) years of online access and permanent download to a supported device. All licenses are non-transferable.

More details can be found here.

A downloadable version of this book is available through the eCampus Reader or compatible Adobe readers.

Applications are available on iOS, Android, PC, Mac, and Windows Mobile platforms.

Please view the compatibility matrix prior to purchase.