Network and System Security, 2nd Edition

Book description

Network and System Security provides focused coverage of network and system security technologies. It explores practical solutions to a wide range of network and systems security issues. Chapters are authored by leading experts in the field and address the immediate and long-term challenges in the authors’ respective areas of expertise. Coverage includes building a secure organization, cryptography, system intrusion, UNIX and Linux security, Internet security, intranet security, LAN security; wireless network security, cellular network security, RFID security, and more.

  • Chapters contributed by leaders in the field covering foundational and practical aspects of system and network security, providing a new level of technical expertise not found elsewhere
  • Comprehensive and updated coverage of the subject area allows the reader to put current technologies to work
  • Presents methods of analysis and problem solving techniques, enhancing the reader’s grasp of the material and ability to implement practical solutions

Table of contents

  1. Cover image
  2. Title page
  3. Table of Contents
  4. Copyright
  5. Dedication
  6. Acknowledgements
  7. About the Editor
  8. Contributors
  9. Introduction
    1. Organization of this Book
  10. Chapter 1. Detecting System Intrusions
    1. 1 Introduction
    2. 2 Monitoring Key Files in the System
    3. 3 Security Objectives
    4. 4 0day Attacks
    5. 5 Good Known State
    6. 6 Rootkits
    7. 7 Low Hanging Fruit
    8. 8 Antivirus Software
    9. 9 Homegrown Intrusion Detection
    10. 10 Full-Packet Capture Devices
    11. 11 Out-of-Band Attack Vectors
    12. 12 Security Awareness Training
    13. 13 Data Correlation
    14. 14 SIEM
    15. 15 Other Weird Stuff on the System
    16. 16 Detection
    17. 17 Network-Based Detection of System Intrusions (DSIs)
    18. 18 Summary
    19. Chapter Review Questions/Exercises
    20. Exercise
    21. References
  11. Chapter 2. Preventing System Intrusions
    1. 1 So, What is an Intrusion?
    2. 2 Sobering Numbers
    3. 3 Know Your Enemy: Hackers versus Crackers
    4. 4 Motives
    5. 5 The Crackers’ Tools of the Trade
    6. 6 Bots
    7. 7 Symptoms of Intrusions
    8. 8 What Can You Do?
    9. 9 Security Policies
    10. 10 Risk Analysis
    11. 11 Tools of Your Trade
    12. 12 Controlling User Access
    13. 13 Intrusion Prevention Capabilities
    14. 14 Summary
    15. Chapter Review Questions/Exercises
    16. Exercise
  12. Chapter 3. Guarding Against Network Intrusions
    1. 1 Traditional Reconnaissance and Attacks
    2. 2 Malicious Software
    3. 3 Defense in Depth
    4. 4 Preventive Measures
    5. 5 Intrusion Monitoring and Detection
    6. 6 Reactive Measures
    7. 7 Network-Based Intrusion Protection
    8. 8 Summary
    9. Chapter Review Questions/Exercises
    10. Exercise
  13. Chapter 4. Securing Cloud Computing Systems
    1. 1 Cloud Computing Essentials: Examining the Cloud Layers
    2. 2 Software as a Service (SaaS): Managing Risks in the Cloud
    3. 3 Platform as a Service (PaaS): Securing the Platform
    4. 4 Infrastructure as a Service (IaaS)
    5. 5 Leveraging Provider-Specific Security Options
    6. 6 Achieving Security in a Private Cloud
    7. 7 Meeting Compliance Requirements
    8. 8 Preparing for Disaster Recovery
    9. 9 Summary
    10. Chapter Review Questions/Exercises
    11. Exercise
    12. References
  14. Chapter 5. Unix and Linux Security
    1. 1 Unix and Security
    2. 2 Basic Unix Security Overview
    3. 3 Achieving Unix Security
    4. 4 Protecting User Accounts and Strengthening Authentication
    5. 5 Limiting Superuser Privileges
    6. 6 Securing Local and Network File Systems
    7. 7 Network Configuration
    8. 8 Improving the Security of Linux and Unix Systems
    9. 9 Additional Resources
    10. 10 Summary
    11. Chapter Review Questions/Exercises
    12. Exercise
  15. Chapter 6. Eliminating the Security Weakness of Linux and Unix Operating Systems
    1. 1 Introduction to Linux and Unix
    2. 2 Hardening Linux and Unix
    3. 3 Proactive Defense for Linux and Unix
    4. 4 Summary
    5. Chapter Review Questions/Exercises
    6. Exercise
  16. Chapter 7. Internet Security
    1. 1 Internet Protocol Architecture
    2. 2 An Internet Threat Model
    3. 3 Defending against Attacks on the internet
    4. 4 Internet Security Checklist
    5. 5 Summary
    6. Chapter Review Questions/Exercises
    7. Exercise
  17. Chapter 8. Intranet Security
    1. 1 Smartphones and Tablets in the Intranet
    2. 2 Security Considerations
    3. 3 Plugging the Gaps: NAC and Access Control
    4. 4 Measuring Risk: Audits
    5. 5 Guardian at the Gate: Authentication and Encryption
    6. 6 Wireless Network Security
    7. 7 Shielding the Wire: Network Protection
    8. 8 Weakest Link in Security: User Training
    9. 9 Documenting the Network: Change Management
    10. 10 Rehearse the Inevitable: Disaster Recovery
    11. 11 Controlling Hazards: Physical and Environmental Protection
    12. 12 Know Your Users: Personnel Security
    13. 13 Protecting Data Flow: Information and System Integrity
    14. 14 Security Assessments
    15. 15 Risk Assessments
    16. 16 Intranet Security Implementation Process Checklist
    17. 17 Summary
    18. Chapter Review Questions/Exercises
    19. Exercise
  18. Chapter 9. Local Area Network Security
    1. 1 Identify Network Threats
    2. 2 Establish Network Access Controls
    3. 3 Risk Assessment
    4. 4 Listing Network Resources
    5. 5 Threats
    6. 6 Security Policies
    7. 7 The Incident-Handling Process
    8. 8 Secure Design Through Network Access Controls
    9. 9 IDS Defined
    10. 10 NIDS: Scope and Limitations
    11. 11 A Practical Illustration of NIDS
    12. 12 Firewalls
    13. 13 Dynamic NAT Configuration
    14. 14 The Perimeter
    15. 15 Access List Details
    16. 16 Types of Firewalls
    17. 17 Packet Filtering: IP Filtering Routers
    18. 18 Application-Layer Firewalls: Proxy Servers
    19. 19 Stateful Inspection Firewalls
    20. 20 NIDS Complements Firewalls
    21. 21 Monitor and Analyze System Activities
    22. 22 Signature Analysis
    23. 23 Statistical Analysis
    24. 24 Signature Algorithms
    25. 25 Local Area Network Security Countermeasures Implementation Checklist
    26. 26 Summary
    27. Chapter Review Questions/Exercises
    28. Exercise
  19. Chapter 10. Wireless Network Security
    1. 1 Cellular Networks
    2. 2 Wireless Ad Hoc Networks
    3. 3 Security Protocols
    4. 4 WEP
    5. 5 Secure Routing
    6. 6 ARAN
    7. 7 SLSP
    8. 8 Key Establishment
    9. 9 ING
    10. 10 Management Countermeasures
    11. 11 Summary
    12. Chapter Review Questions/Exercises
    13. Exercise
    14. References
  20. Chapter 11. Cellular Network Security
    1. 1 Introduction
    2. 2 Overview of Cellular Networks
    3. 3 The State of the Art of Cellular Network Security
    4. 4 Cellular Network Attack Taxonomy
    5. 5 Cellular Network Vulnerability Analysis
    6. 6 Summary
    7. Chapter Review Questions/Exercises
    8. Exercise
    9. References
  21. Chapter 12. RFID Security
    1. 1 RFID Introduction
    2. 2 RFID Challenges
    3. 3 RFID Protections
    4. 4 Summary
    5. Chapter Review Questions/Exercises
    6. Exercise
    7. References
  22. Chapter 13. Optical Wireless Security
    1. 1 Optical Wireless Systems Overview
    2. 2 Deployment Architectures
    3. 3 High Bandwidth
    4. 4 Low Cost
    5. 5 Implementation
    6. 6 Surface Area
    7. 7 Summary
    8. Chapter Review Questions/Exercises
    9. Exercise
  23. Index

Product information

  • Title: Network and System Security, 2nd Edition
  • Author(s): John R. Vacca
  • Release date: August 2013
  • Publisher(s): Syngress
  • ISBN: 9780124166950