Book description
The comprehensive A-to-Z guide on network security, fully revised and updated
Network security is constantly evolving, and this comprehensive guide has been thoroughly updated to cover the newest developments. If you are responsible for network security, this is the reference you need at your side.
Covering new techniques, technology, and methods for approaching security, it also examines new trends and best practices being used by many organizations. The revised Network Security Bible complements the Cisco Academy course instruction in networking security.
Covers all core areas of network security and how they interrelate
Fully revised to address new techniques, technology, and methods for securing an enterprise worldwide
Examines new trends and best practices in use by organizations to secure their enterprises
Features additional chapters on areas related to data protection/correlation and forensics
Includes cutting-edge topics such as integrated cybersecurity and sections on Security Landscape, with chapters on validating security, data protection, forensics, and attacks and threats
If you need to get up to date or stay current on network security, Network Security Bible, 2nd Edition covers everything you need to know.
Table of contents
- Copyright
- About the Author
- About the Technical Editor
- Credits
- Acknowledgments
-
Introduction
- The Goal of This Book
- How to Use This Book
- Who Should Read This Book
- How This Book Is Organized
- Where To Go From Here
-
I. Network Security Landscape
- 1. State of Network Security
- 2. New Approaches to Cyber Security
- 3. Interfacing with the Organization
-
II. Security Principles and Practices
-
4. Information System Security Principles
- 4.1. Key Principles of Network Security
- 4.2. Formal Processes
- 4.3. Risk Management
- 4.4. Calculating and Managing Risk
- 4.5. Summary
-
5. Information System Security Management
- 5.1. Security Policies
- 5.2. Security Awareness
- 5.3. Managing the Technical Effort
- 5.4. Configuration Management
- 5.5. Business Continuity and Disaster Recovery Planning
- 5.6. Physical Security
- 5.7. Legal and Liability Issues
- 5.8. Summary
- 6. Access Control
-
7. Attacks and Threats
- 7.1. Malicious Code
-
7.2. Review of Common Attacks
- 7.2.1. Denial-of-service (DoS)
- 7.2.2. Back door
- 7.2.3. Spoofing
- 7.2.4. Man in the middle
- 7.2.5. Replay
- 7.2.6. TCP/Hijacking
- 7.2.7. Fragmentation attacks
- 7.2.8. Weak keys
- 7.2.9. Mathematical attacks
- 7.2.10. Social engineering
- 7.2.11. Port scanning
- 7.2.12. Dumpster diving
- 7.2.13. Birthday attacks
- 7.2.14. Password guessing
- 7.2.15. Software exploitation
- 7.2.16. Inappropriate system use
- 7.2.17. Eavesdropping
- 7.2.18. War driving
- 7.2.19. TCP sequence number attacks
- 7.2.20. War-dialing/demon-dialing attacks
- 7.3. External Attack Methodologies Overview
- 7.4. Internal Threat Overview
- 7.5. Summary
-
4. Information System Security Principles
-
III. Operating Systems and Applications
-
8. Windows Security
- 8.1. Windows Security at the Heart of the Defense
-
8.2. Out-of-the-Box Operating System Hardening
- 8.2.1. Prior to system hardening
- 8.2.2. The general process of system hardening
- 8.2.3. Windows vulnerability protection
- 8.2.4. Windows 2003 New Installation Example
- 8.2.5. Windows Quick-start Hardening Tips
- 8.2.6. Specifics of system hardening
- 8.2.7. Securing the Typical Windows Business Workstation
- 8.2.8. Securing the Typical Windows Home System
- 8.3. Installing Applications
- 8.4. Putting the Workstation on the Network
- 8.5. Operating Windows Safely
- 8.6. Upgrades and Patches
-
8.7. Maintain and Test the Security
- 8.7.1. Scan for vulnerabilities
- 8.7.2. Test questionable applications
- 8.7.3. Be sensitive to the performance of the system
- 8.7.4. Replace old Windows systems
- 8.7.5. Periodically re-evaluate and rebuild
- 8.7.6. Monitoring
- 8.7.7. Logging and auditing
- 8.7.8. Clean up the system
- 8.7.9. Prepare for the eventual attack
-
8.8. Attacks Against the Windows Workstation
- 8.8.1. Viruses
- 8.8.2. Worms
- 8.8.3. Trojan horses
- 8.8.4. Spyware and ad support
- 8.8.5. Spyware and 'Big Brother'
- 8.8.6. Physical attacks
- 8.8.7. TEMPEST attacks
- 8.8.8. Back Doors
- 8.8.9. Denial-of-service attacks
- 8.8.10. File extensions
- 8.8.11. Packet sniffing
- 8.8.12. Hijacking and session replay
- 8.8.13. Social engineering
- 8.9. Summary
-
9. UNIX and Linux Security
- 9.1. The Focus of UNIX/Linux Security
- 9.2. Physical Security
- 9.3. Controlling the Configuration
- 9.4. Operating UNIX Safely
- 9.5. Hardening UNIX
- 9.6. Summary
- 10. Web Browser and Client Security
-
11. Web Security
- 11.1. What Is HTTP?
- 11.2. How Does HTTP Work?
- 11.3. Server Content
- 11.4. Client Content
- 11.5. State
- 11.6. Attacking Web Servers
- 11.7. Web Services
- 11.8. Summary
-
12. Electronic mail (E-mail) Security
- 12.1. The E-mail Risk
- 12.2. The E-mail Protocols
- 12.3. E-mail Authentication
- 12.4. Operating Safely When Using E-mail
- 12.5. Summary
- 13. Domain Name System
-
14. Server Security
- 14.1. General Server Risks
-
14.2. Security by Design
- 14.2.1. Maintain a security mindset
- 14.2.2. Establishing a secure development environment
- 14.2.3. Secure development practices
- 14.2.4. Test, test, test
- 14.3. Operating Servers Safely
- 14.4. Server Applications
- 14.5. Multi-Level Security and Digital Rights Management
- 14.6. Summary
-
8. Windows Security
-
IV. Network Security Fundamentals
-
15. Network Protocols
- 15.1. Protocols
- 15.2. The Open Systems Interconnect Model
- 15.3. The OSI Layers
- 15.4. The TCP/IP Model
- 15.5. TCP/IP Model Layers
- 15.6. Internet Protocol
-
15.7. VoIP
- 15.7.1. Using VoIP
- 15.7.2. The standard phone system: Circuit switching
- 15.7.3. VoIP uses packet switching
- 15.7.4. Deciding to use VoIP
- 15.7.5. Security issues
- 15.7.6. Risk factors
- 15.7.7. Network design
- 15.7.8. Use of softphones vs. hardware phones
- 15.7.9. Voice and data crossover requirements
- 15.7.10. VoIP server environments
- 15.7.11. VoIP protocols
- 15.8. Summary
-
16. Wireless Security
- 16.1. Electromagnetic Spectrum
- 16.2. The Cellular Phone Network
- 16.3. Placing a Cellular Telephone Call
- 16.4. Wireless Transmission Systems
- 16.5. Pervasive Wireless Data Network Technologies
- 16.6. IEEE Wireless LAN Specifications
- 16.7. IEEE 802.11
- 16.8. IEEE 802.11 Wireless Security
- 16.9. Bluetooth
- 16.10. Wireless Application Protocol
- 16.11. Future of Wireless
- 16.12. Summary
-
17. Network Architecture Fundamentals
- 17.1. Network Segments
- 17.2. Perimeter Defense
- 17.3. Network Address Translation
- 17.4. Basic Architecture Issues
- 17.5. Subnetting, Switching, and VLANs
- 17.6. Address Resolution Protocol and Media Access Control
- 17.7. Dynamic Host Configuration Protocol and Addressing Control
-
17.8. Zero Configuration Networks
- 17.8.1. Details of zero configuration networks
- 17.8.2. What is required for zero configuration networks?
- 17.8.3. When should zero configuration networks be used?
- 17.8.4. When should zero configuration networks not be used?
- 17.8.5. Security issues with zero configuration networks
- 17.8.6. Ways to exploit zero configuration networks
- 17.9. System Design and Architecture Against Insider Threats
- 17.10. Common Attacks
- 17.11. Summary
- 18. Firewalls
-
19. Intrusion Detection/Prevention
- 19.1. Intrusion Detection Systems
- 19.2. Responses to Intrusion Detection
- 19.3. Emerging Technologies in Intrusion Detection Systems
- 19.4. Summary
-
15. Network Protocols
-
V. Communication
-
20. Secret Communication
- 20.1. What is Cryptography?
- 20.2. General Terms
-
20.3. Principles of Cryptography
- 20.3.1. You can't prove something is secure, only that it's not secure
- 20.3.2. Algorithms and implementations aren't the same
- 20.3.3. Never trust proprietary algorithms
- 20.3.4. Strength of algorithm is based on secrecy of the key, not the algorithm
- 20.3.5. Cryptography is more than SSL
- 20.3.6. Cryptography must be built in – like electricity
- 20.3.7. All cryptography is crackable; it's just a matter of time
- 20.3.8. Secure today does not mean secure tomorrow
- 20.4. Historic Cryptography
- 20.5. The Four Cryptographic Primitives
- 20.6. Putting These Primitives Together to Achieve CIA
- 20.7. The Difference Between Algorithm and Implementation
- 20.8. Proprietary Versus Open Source Algorithms
- 20.9. Attacks on Hash Functions
- 20.10. Quantum Cryptography
- 20.11. Summary
-
21. Covert Communication
- 21.1. Where Hidden Data Hides
- 21.2. Where Did It Come From?
- 21.3. Where Is It Going?
- 21.4. Overview of Steganography
- 21.5. History of Steganography
- 21.6. Core Areas of Network Security and Their Relation to Steganography
- 21.7. Principles of Steganography
- 21.8. Steganography Compared to Cryptography
- 21.9. Types of Steganography
- 21.10. Products That Implement Steganography
- 21.11. Steganography Versus Digital Watermarking
- 21.12. Types of Digital Watermarking
- 21.13. Goals of Digital Watermarking
- 21.14. Digital Watermarking and Stego
- 21.15. Summary
- 22. Applications of Secure/Covert Communication
-
20. Secret Communication
-
VI. The Security Threat and Response
-
23. Intrusion Detection and Response
- 23.1. Intrusion Detection Mechanisms
- 23.2. Honeypots
-
23.3. Incident Handling
-
23.3.1. CERT/CC practices
- 23.3.1.1. Establishing response policies and procedures
- 23.3.1.2. Preparing to respond to intrusions
- 23.3.1.3. Analyzing all available information
- 23.3.1.4. Communicating with all parties
- 23.3.1.5. Collecting and protecting information
- 23.3.1.6. Applying short-term containment solutions
- 23.3.1.7. Eliminating all means of intruder access
- 23.3.1.8. Returning systems to normal operation
- 23.3.1.9. Identifying and implementing security lessons learned
- 23.3.2. Internet Engineering Task Force guidance
- 23.3.3. Layered security and IDS
- 23.3.4. Computer Security and Incident Response Teams
- 23.3.5. Security incident notification process
- 23.3.6. Automated notice and recovery mechanisms
-
23.3.1. CERT/CC practices
- 23.4. Summary
-
24. Digital Forensics
- 24.1. Computer Forensics Defined
-
24.2. Traditional Computer Forensics
- 24.2.1. Evidence collection
- 24.2.2. Chain of evidence/custody
-
24.2.3. Acquisitions
- 24.2.3.1. Mirror image
- 24.2.3.2. Forensic duplication
- 24.2.3.3. Live acquisition
- 24.2.3.4. Acquisition storage media
- 24.2.3.5. Volatile information
- 24.2.3.6. Analysis
- 24.2.3.7. Limited examination
- 24.2.3.8. Partial examination
- 24.2.3.9. Full examination
- 24.2.3.10. Documentation
- 24.2.3.11. Evidence retention
- 24.2.3.12. Legal closure
- 24.2.3.13. Civil
- 24.2.3.14. Criminal
- 24.3. Proactive Forensics
- 24.4. Future Research Areas
- 24.5. The Forensic Life Cycle
- 24.6. Summary
-
25. Security Assessments, Testing, and Evaluation
- 25.1. Information Assurance Approaches and Methodologies
- 25.2. Certification and Accreditation
- 25.3. DIACAP
- 25.4. Federal Information Processing Standard 102
- 25.5. OMB Circular A-130
- 25.6. The National Institute of Standards and Technology Assessment Guidelines
- 25.7. Penetration Testing
- 25.8. Auditing and Monitoring
- 25.9. Summary
-
23. Intrusion Detection and Response
-
VII. Integrated Cyber Security
-
26. Validating Your Security
- 26.1. Overview
- 26.2. Current State of Penetration Testing
- 26.3. Formal Penetration Testing Methodology
- 26.4. Steps to Exploiting a System
- 26.5. Summary
-
27. Data Protection
-
27.1.
- 27.1.1. Identifying and classifying sensitive data
- 27.1.2. Creating a data usage policy
- 27.1.3. Controlling access
- 27.1.4. Using encryption
- 27.1.5. Hardening endpoints and network infrastructure
- 27.1.6. Physically securing the work environment
- 27.1.7. Backing up data
- 27.1.8. Improving education and awareness
- 27.1.9. Enforcing compliance
- 27.1.10. Validating processes
- 27.2. Endpoint Security
- 27.3. Insider Threats and Data Protection
- 27.4. Summary
-
27.1.
-
28. Putting Everything Together
-
28.1. Critical Problems Facing Organizations
- 28.1.1. How do I convince managers that security is a problem and that they should spend money on it?
- 28.1.2. How do I keep up with the increased number of attacks?
- 28.1.3. How do you make employees part of the solution and not part of the problem?
- 28.1.4. How do you analyze all the log data?
- 28.1.5. How do I keep up with all of the different systems across my enterprise and make sure they are all secure?
- 28.1.6. How do I know if i am a target of corporate espionage or some other threat?
- 28.1.7. Top 10 common mistakes
- 28.2. General Tips for Protecting a Site
-
28.3. Security Best Practices
- 28.3.1. Create security policy statements
- 28.3.2. Create and update the network diagram
- 28.3.3. Place systems in appropriate areas
- 28.3.4. Protect internal servers from outbound communications
- 28.3.5. Assess the infrastructure
- 28.3.6. Protect the perimeter
- 28.3.7. Create a strong password policy
- 28.3.8. Create good passwords
- 28.3.9. Audit passwords
- 28.3.10. Use strong authentication
- 28.3.11. Remove service accounts
- 28.3.12. Create a patching policy
- 28.3.13. Perform regular vulnerability assessments
- 28.3.14. Enable logging
- 28.3.15. Review logs
- 28.3.16. Use multiple detection methods
- 28.3.17. Monitor outgoing communications
- 28.3.18. Perform content inspection
- 28.3.19. Control and monitor remote access
- 28.3.20. Use defense in depth
- 28.3.21. Secure communications
- 28.3.22. Back up frequently and regularly
- 28.3.23. Protect sensitive information
- 28.3.24. Create and test a disaster recovery plan
- 28.3.25. Control and monitor the physical space
- 28.3.26. Educate users
- 28.3.27. Don't forget about the code
- 28.3.28. Secure UNIX systems
- 28.3.29. Install only essential services
- 28.3.30. Deploy single-use servers
- 28.3.31. Perform configuration management
- 28.3.32. Use firewalls and IDS beyond the perimeter
- 28.3.33. Question trust relationships
- 28.3.34. Use antivirus software
- 28.3.35. Protect system accounts
- 28.3.36. Name servers securely
- 28.4. Summary
-
28.1. Critical Problems Facing Organizations
- 29. The Future
-
26. Validating Your Security
Product information
- Title: Network Security Bible, 2nd Edition
- Author(s):
- Release date: September 2009
- Publisher(s): Wiley
- ISBN: 9780470502495
You might also like
book
Computer Network Security
Developed in collaboration with a training and certification team from Cisco, Computer Network Security is an …
book
Introduction to Network Security, 2nd Edition
Introductory textbook in the important area of network security for undergraduate and graduate students Comprehensively covers …
book
Network Security First-Step, Second Edition
Network Security first-step Second Edition Tom Thomas and Donald Stoddard Your first step into the world …
book
Industrial Network Security, 2nd Edition
As the sophistication of cyber-attacks increases, understanding how to defend critical infrastructure systems—energy production, water, gas, …