Book description
Network and System Security provides focused coverage of network and system security technologies. It explores practical solutions to a wide range of network and systems security issues. Chapters are authored by leading experts in the field and address the immediate and long-term challenges in the authors’ respective areas of expertise. Coverage includes building a secure organization, cryptography, system intrusion, UNIX and Linux security, Internet security, intranet security, LAN security; wireless network security, cellular network security, RFID security, and more.
- Chapters contributed by leaders in the field covering foundational and practical aspects of system and network security, providing a new level of technical expertise not found elsewhere
- Comprehensive and updated coverage of the subject area allows the reader to put current technologies to work
- Presents methods of analysis and problem solving techniques, enhancing the reader’s grasp of the material and ability to implement practical solutions
Table of contents
- Cover image
- Title page
- Table of Contents
- Copyright
- Dedication
- Acknowledgements
- About the Editor
- Contributors
- Introduction
-
Chapter 1. Detecting System Intrusions
- 1 Introduction
- 2 Monitoring Key Files in the System
- 3 Security Objectives
- 4 0day Attacks
- 5 Good Known State
- 6 Rootkits
- 7 Low Hanging Fruit
- 8 Antivirus Software
- 9 Homegrown Intrusion Detection
- 10 Full-Packet Capture Devices
- 11 Out-of-Band Attack Vectors
- 12 Security Awareness Training
- 13 Data Correlation
- 14 SIEM
- 15 Other Weird Stuff on the System
- 16 Detection
- 17 Network-Based Detection of System Intrusions (DSIs)
- 18 Summary
- Chapter Review Questions/Exercises
- Exercise
- References
-
Chapter 2. Preventing System Intrusions
- 1 So, What is an Intrusion?
- 2 Sobering Numbers
- 3 Know Your Enemy: Hackers versus Crackers
- 4 Motives
- 5 The Crackers’ Tools of the Trade
- 6 Bots
- 7 Symptoms of Intrusions
- 8 What Can You Do?
- 9 Security Policies
- 10 Risk Analysis
- 11 Tools of Your Trade
- 12 Controlling User Access
- 13 Intrusion Prevention Capabilities
- 14 Summary
- Chapter Review Questions/Exercises
- Exercise
- Chapter 3. Guarding Against Network Intrusions
-
Chapter 4. Securing Cloud Computing Systems
- 1 Cloud Computing Essentials: Examining the Cloud Layers
- 2 Software as a Service (SaaS): Managing Risks in the Cloud
- 3 Platform as a Service (PaaS): Securing the Platform
- 4 Infrastructure as a Service (IaaS)
- 5 Leveraging Provider-Specific Security Options
- 6 Achieving Security in a Private Cloud
- 7 Meeting Compliance Requirements
- 8 Preparing for Disaster Recovery
- 9 Summary
- Chapter Review Questions/Exercises
- Exercise
- References
-
Chapter 5. Unix and Linux Security
- 1 Unix and Security
- 2 Basic Unix Security Overview
- 3 Achieving Unix Security
- 4 Protecting User Accounts and Strengthening Authentication
- 5 Limiting Superuser Privileges
- 6 Securing Local and Network File Systems
- 7 Network Configuration
- 8 Improving the Security of Linux and Unix Systems
- 9 Additional Resources
- 10 Summary
- Chapter Review Questions/Exercises
- Exercise
- Chapter 6. Eliminating the Security Weakness of Linux and Unix Operating Systems
- Chapter 7. Internet Security
-
Chapter 8. Intranet Security
- 1 Smartphones and Tablets in the Intranet
- 2 Security Considerations
- 3 Plugging the Gaps: NAC and Access Control
- 4 Measuring Risk: Audits
- 5 Guardian at the Gate: Authentication and Encryption
- 6 Wireless Network Security
- 7 Shielding the Wire: Network Protection
- 8 Weakest Link in Security: User Training
- 9 Documenting the Network: Change Management
- 10 Rehearse the Inevitable: Disaster Recovery
- 11 Controlling Hazards: Physical and Environmental Protection
- 12 Know Your Users: Personnel Security
- 13 Protecting Data Flow: Information and System Integrity
- 14 Security Assessments
- 15 Risk Assessments
- 16 Intranet Security Implementation Process Checklist
- 17 Summary
- Chapter Review Questions/Exercises
- Exercise
-
Chapter 9. Local Area Network Security
- 1 Identify Network Threats
- 2 Establish Network Access Controls
- 3 Risk Assessment
- 4 Listing Network Resources
- 5 Threats
- 6 Security Policies
- 7 The Incident-Handling Process
- 8 Secure Design Through Network Access Controls
- 9 IDS Defined
- 10 NIDS: Scope and Limitations
- 11 A Practical Illustration of NIDS
- 12 Firewalls
- 13 Dynamic NAT Configuration
- 14 The Perimeter
- 15 Access List Details
- 16 Types of Firewalls
- 17 Packet Filtering: IP Filtering Routers
- 18 Application-Layer Firewalls: Proxy Servers
- 19 Stateful Inspection Firewalls
- 20 NIDS Complements Firewalls
- 21 Monitor and Analyze System Activities
- 22 Signature Analysis
- 23 Statistical Analysis
- 24 Signature Algorithms
- 25 Local Area Network Security Countermeasures Implementation Checklist
- 26 Summary
- Chapter Review Questions/Exercises
- Exercise
- Chapter 10. Wireless Network Security
- Chapter 11. Cellular Network Security
- Chapter 12. RFID Security
- Chapter 13. Optical Wireless Security
- Index
Product information
- Title: Network and System Security, 2nd Edition
- Author(s):
- Release date: August 2013
- Publisher(s): Syngress
- ISBN: 9780124166950
You might also like
book
Digital Evidence and Computer Crime, 3rd Edition
Digital Evidence and Computer Crime, Third Edition
book
The Official (ISC)2 Guide to the CCSP CBK
Globally recognized and backed by the Cloud Security Alliance (CSA) and the (ISC) 2 the CCSP …
book
Ethical Hacking and Penetration Testing Guide
Requiring no prior hacking experience, Ethical Hacking and Penetration Testing Guide supplies a complete introduction to …
book
Network Defense and Countermeasures: Principles and Practices, Third edition
All you need to know about defending networks, in one book Clearly explains concepts, terminology, challenges, …