Network Security Fundamentals

€ 62,99
Besorgung - Lieferbarkeit unbestimmt
September 2004



Any IT professional's introduction to the world of network security
  • Understand network security terms, concepts, and technologies
  • Learn the basics of network security, including cryptography, security policies, and secure network design
  • Solve real-world problems with case-study explanations of all the security concepts, vulnerabilities, and solutions
Network Security Fundamentals introduces the topic of network security in an easy to understand and comprehensive manner. The newest in the series of Fundamentals titles from Cisco Press, it is designed to provide a baseline understanding of the various components of a network security architecture and to show readers how each component can be implemented to maximum effect. The book is written for those IT professionals who have some networking background but are new to the security field. It is also appropriate for IT managers seeking an overview of key network security technologies in order to understand what current technologies are capable of and what components are appropriate for their environment. Network Security Fundamentals is divided into three parts. Part I covers the basics, presenting terms and concepts and introducing the foundations of a solid security structure. Part II examines two components of security, cryptography and security policies. Part III looks at the various security components, including Web security, router security, firewalls, IDS, remote access security, VPNs, Public Key Infrastructure (PKI), wireless security, and logging and auditing. Gert De Laet, CCIE No. 2657, is a Product Manager for the CCIE team at Cisco Systems. Gert was a contributing author to CCIE Security Exam Certification Guide and CCDA Exam Certification Guide from Cisco Press. Gert Schauwers, CCIE No. 6924 is currently a CCIE Content Engineer with the CCIE team. Gert has been a technical reviewer for numerous Cisco Press titles.


I. INTRODUCTION. 1. Network Security Overview. Defining Trust. Most Trusted. Less Trusted. Least Trusted. Weaknesses and Vulnerabilities. Responsibilities for Network Security. Security Objectives. Conclusion. Q&A. 2. Understanding Vulnerabilities-The Need for Security. Risk and Vulnerability. TCP/IP Suite Weaknesses. IP. TCP. TCP/IP Security Issues. Countermeasures. Buffer Overflows. Buffer Overflow Mechanisms. Buffer Overflow Protection. Countermeasures. Spoofing Techniques. Address Resolution Protocol Spoofing. Domain Name Service Spoofing. Countermeasures. Social Engineering. Techniques. Countermeasures. Conclusion. Q&A. 3. Understanding Defenses. Digital IDs. Intrusion Detection System. PC Card-Based Solutions. Security Cards. Hardware Keys. PC Encryption Cards. Physical Security. Outside and External Security. Internal Security. Disaster-Recovery Plans. Personnel Awareness. Encrypted Login. Secure Shell Protocol. Kerberos Encrypted Login Sessions. Secure Socket Layer (HTTP versus HTTPS). Firewalls. Reusable Passwords. Weaknesses. Sample Password Policy. Antivirus Software. Encrypted Files. Biometrics. Fingerprint Scanning. Voice Recognition. Typing Biometrics. Face Recognition. Signature Recognition. Conclusion. Q&A. II. BUILDING BLOCKS. 4. Cryptography. Cryptography versus Cryptanalysis. Manual Systems. Crypto Machines. Computers. Modern-Day Techniques. Symmetric Key Algorithms. Asymmetric Key Algorithms. Hashing Algorithms. Secure Socket Layer and Transport Layer Security. Digital Certificates. Conclusion. Q&A. 5. Security Policies. Defining a Security Policy? Importance of a Security Policy. Development Process. Incident Handling Process. Security Wheel. Sample Security Policy. Purpose. Scope. Policy. Enforcement. Definitions. Conclusion. Q&A. 6. Secure Design. Network Design-Principles. Top-Down Design Practices. Requirements and Constraints. Design Activities, Tools, and Techniques. Defense in Depth. Network Design-Methodology. Stages of the Network. Return on Investment. Physical Security Issues. Securing the Perimeter. Internal Security. Personnel Training. Survivability and Recovery. Switches and Hubs. Conclusion. Q&A. III. TOOLS AND TECHNIQUES. 7. Web Security. Hardening. File Systems. Web Servers. Browsers. Case Study. Conclusion. Q&A. 8. Router Security. Basic Router Security. Administrative Access. Services. Router Security to Protect the Network. Access Lists. Enhanced Access Lists. CBAC. Case Study. Conclusion. Q&A. References in This Chapter. 9. Firewalls. Firewall Basics. Different Types of Firewalls. Hardware Firewalls: PIX and NetScreen. Check Point Software Firewalls. Enhancements for Firewalls. NAT. Proxy Services. Content Filters. Antivirus Software. Case Study: Placing Filtering Routers and Firewalls. Summary. Q&A. 10. Intrusion Detection System Concepts. Introduction to Intrusion Detection. IDS Fundamentals. Evasion and Antievasion Techniques. Organizational Issues and Complications. Host-Based IDSs. Host Sensor Components and Architecture. Deploying Host-Based Intrusion Detection in the Network. Network-Based IDSs. Network Sensor Components and Architecture. Deploying Network-Based Intrusion Detection in the Network. Notification and Reporting. IDS Management Communications-MonitoringtheNetwork. Communication Syntax-RDEP. Out-of-Band Management. In-Band Management. Sensor Maintenance. Case Study: Deployment of IDS Sensors intheOrganization and Their Typical Placement. IDS Placement on the Network Blueprint. IDS Sensor Initialization and Configuration. IDS Tuning. Network Under Attack-IDS Event Viewer. IDS Active Responses in Action-Blocking a Host. Conclusion. Q&A. 11. Remote Access. AAA Model. Authentication. Authorization. Accounting. AAA Servers. TACACS+ Overview. RADIUS Overview. TACACS+ versus RADIUS. Kerberos. Lock-and-Key Feature. Two-Factor Identification. Case Study: Configuring Secure Remote Access. TACACS+ Configuration Task List. Router COMMSROOM1 Setup and Configuration for This Scenario. Test and Troubleshoot Configuration for This Scenario. Summary. Q&A. 12. Virtual Private Networks. Generic Routing Encapsulation Tunnels. IP Security. Encryption. Data Integrity. Origin Authentication. Antireplay Protection. Protocol Framework. Tunnel or Transport Mode. Transform Sets. VPNs with IPSec. Case Study: Remote Access VPN. Conclusion. Q&A. 13. Public Key Infrastructure. Public Key Distribution. Trusted Third Party. PKI Topology. Enrollment Procedure. Revocation Procedure. Case Study: Creating Your Own CA. Conclusion. Q&A. 14. Wireless Security. Different WLAN Configurations. What Is a WLAN? How Wireless Works. WLAN Architecture. Setting Up the WLAN Connection. Risks of Open Wireless Ports. SSID Vulnerabilities. Open Authentication Vulnerabilities. Shared Key Authentication Vulnerabilities. EAP Protocol and the 802.11i Standard. War-Driving and War-Chalking. SAFE WLAN Design Techniques and Considerations. Case Study: Adding Wireless Solutions to a Secure Network. Conclusion. Q&A. 15. Logging and Auditing. Logging. SYSLOG. Simple Network Management Protocol. SNMP Notifications. SNMP Versions. SNMP Configuration. Remote Monitoring. Service Assurance Agent. Case Study. Conclusion. Q&A. IV. APPENDIXES. Appendix A: SAFE Blueprint. Appendix B: SANS Policies. Appendix C: NSA Guidelines. Appendix D: Answers to Chapter Q&A. Bibliography. Books. Website References.


Gert De Laet, CCIE No. 2657, is a CCIE in both Routing and Switching and Security. Gert has more than 10 years of experience in internetworking and works in Brussels, Belgium, for the worldwide CCIE team as a product manager at Cisco Systems. Gert Schauwers, CCIE No. 6942, has CCIE certifications in Security, Routing and Switching, and Communication and Services. He has six years of experience in internetworking. He is currently working for the CCIE team at Cisco in Brussels, Belgium, as a CCIE content engineer.

EAN: 9781587051678
ISBN: 1587051672
Untertitel: 'Cisco Press Fundamentals Serie'. Sprache: Englisch.
Verlag: CISCO
Erscheinungsdatum: September 2004
Seitenanzahl: 454 Seiten
Format: kartoniert
Es gibt zu diesem Artikel noch keine Bewertungen.Kundenbewertung schreiben