Book description
PART OF THE NEW JONES & BARTLETT LEARNING INFORMATION SYSTEMS SECURITY & ASSURANCE SERIES!
Network Security, Firewalls, and VPNs provides a unique, in-depth look at the major business challenges and threats that are introduced when an organization’s network is connected to the public Internet. Written by an industry expert, this book provides a comprehensive explanation of network security basics, including how hackers access online networks and the use of Firewalls and VPNs to provide security countermeasures. Using examples and exercises, this book incorporates hands-on activities to prepare the reader to disarm threats and prepare for emerging technologies and future attacks.
Table of contents
- Copyright
- Preface
-
ONE. Foundations of Network Security
-
1. Fundamentals of Network Security
- What Is Network Security?
- What Are You Trying to Protect?
- Goals of Network Security
- How Can You Measure the Success of Network Security?
- Why Are Written Network Security Policies Important?
- Who Is Responsible for Network Security?
- Examples of Network Infrastructures and Related Security Concerns
- Enhancing the Security of Wired Versus Wireless LAN Infrastructures
- Internal and External Network Issues
- Common Network Security Components Used to Mitigate Threats
- CHAPTER SUMMARY
- KEY CONCEPTS AND TERMS
- CHAPTER 1 ASSESSMENT
-
2. Firewall Fundamentals
- What Is a Firewall?
- Why Do You Need a Firewall?
- What Are Zones of Risk?
- How Firewalls Work and What Firewalls Do
- TCP/IP Basics
- Types of Firewalls
- Ingress and Egress Filtering
- Types of Filtering
- Software Versus Hardware Firewalls
- Dual-Homed and Triple-Homed Firewalls
- Placement of Firewalls
- CHAPTER SUMMARY
- KEY CONCEPTS AND TERMS
- CHAPTER 2 ASSESSMENT
- 3. VPN Fundamentals
-
4. Network Security Threats and Issues
- Hacker Motivation
- Favorite Targets of Hackers
- Threats from Internal Personnel and External Entities
- Common IT Infrastructure Threats
- Malicious Code (Malware)
- Fast Growth and Overuse
- Wireless Versus Wired
- Eavesdropping
- Replay Attacks
- Insertion Attacks
- Fragmentation Attacks, Buffer Overflows, and XSS Attacks
- Man-in-the-Middle, Session Hijacking, and Spoofing Attacks
- Covert Channels
- Network and Resource Availability Threats
- Denial of Service (DoS)
- Distributed Denial of Service (DDoS)
- Hacker Tools
- Social Engineering
- CHAPTER SUMMARY
- KEY CONCEPTS AND TERMS
- CHAPTER 4 ASSESSMENT
-
1. Fundamentals of Network Security
-
TWO. Technical Overview of Network Security, Firewalls, and VPNs
-
5. Network Security Implementation
- Seven Domains of a Typical IT Infrastructure
- Network Design and Defense-in-Depth
- Protocols and Topologies
- Common Types of Addressing
- Controlling Communication Pathways
- Hardening Systems
- Equipment Selection
- Authentication, Authorization, and Accounting
- Communication Encryption
- Hosts: Local Only or Remote and Mobile
- Redundancy
- Node Security
- CHAPTER SUMMARY
- KEY CONCEPTS AND TERMS
- CHAPTER 5 ASSESSMENT
-
6. Network Security Management
- Network Security Management Best Practices
- Fail-Secure, Fail-Open, Fail-Close Options
- Physical Security
- Watching for Compromise
- Incident Response
- Trapping Intruders and Violators
- Why Containment Is Important
- Imposing Compartmentalization
- Using Honeypots, Honeynets, and Padded Cells
- Essential Host Security Controls
- Backup and Recovery
- User Training and Awareness
- Network Security Management Tools
- Security Checklist
- Network Security Troubleshooting
- Compliance Auditing
- Security Assessment
- Configuration Scans
- Vulnerability Scanning
- Penetration Testing
- Post-Mortem Assessment Review
- CHAPTER SUMMARY
- KEY CONCEPTS AND TERMS
- CHAPTER 6 ASSESSMENT
-
7. Exploring the Depths of Firewalls
- Firewall Rules
- Authentication and Authorization
- Monitoring and Logging
- Understanding and Interpreting Firewall Logs and Alerts
- Intrusion Detection
- Limitations of Firewalls
- Improving Performance
- The Downside of Encryption with Firewalls
- Firewall Enhancements
- Management Interfaces
- CHAPTER SUMMARY
- KEY CONCEPTS AND TERMS
- CHAPTER 7 ASSESSMENT
-
8. Firewall Deployment Considerations
- What Should You Allow and What Should You Block?
- Common Security Strategies for Firewall Deployments
- Essential Elements of a Firewall Policy
- Software and Hardware Options for Firewalls
- Benefit and Purpose of Reverse Proxy
- Use and Benefit of Port-Forwarding
- Considerations for Selecting a Bastion Host OS
- Constructing and Ordering Firewall Rules
- Evaluating Needs and Solutions in Designing Security
- What Happens When Security Gets in the Way of Doing Business?
- CHAPTER SUMMARY
- KEY CONCEPTS AND TERMS
- CHAPTER 8 ASSESSMENT
-
9. Firewall Management and Security Concerns
- Best Practices for Firewall Management
- Security Measures in Addition to a Firewall
- Selecting the Right Firewall for Your Needs
- The Difference Between Buying and Building a Firewall
- Mitigating Firewall Threats and Exploits
- Concerns Related to Tunneling Through or Across a Firewall
- Testing Firewall Security
- Important Tools for Managing and Monitoring a Firewall
- Troubleshooting Firewalls
- Proper Firewall Implementation Procedure
- Responding to Incidents
- CHAPTER SUMMARY
- KEY CONCEPTS AND TERMS
- CHAPTER 9 ASSESSMENT
-
10. Using Common Firewalls
- Individual and Small Office/Home Office (SOHO) Firewall Options
- Uses for a Host Software Firewall
- Using Windows 7's Host Software Firewall
- Using a Linux Host Software Firewall
- Managing the Firewall on an ISP Connection Device
- Commercial Software Network Firewalls
- Open-Source Software Network Firewalls
- Appliance Firewalls
- Virtual Firewalls
- Simple Firewall Techniques
- CHAPTER SUMMARY
- KEY CONCEPTS AND TERMS
- CHAPTER 10 ASSESSMENT
-
11. VPN Management
- VPN Management Best Practices
- Developing a VPN Policy
- Developing a VPN Deployment Plan
- VPN Threats and Exploits
- Commercial or Open-Source VPNs
- Differences Between Personal and Network VPNs
- Balancing Anonymity and Privacy
- Protecting VPN Security to Support Availability
- The Importance of User Training
- VPN Troubleshooting
- CHAPTER SUMMARY
- KEY CONCEPTS AND TERMS
- CHAPTER 11 ASSESSMENT
-
12. VPN Technologies
- Differences Between Software and Hardware Solutions
- Differences Between Layer 2 and Layer 3 VPNs
- Internet Protocol Security (IPSec)
- Layer 2 Tunneling Protocol (L2TP)
- Secure Sockets Layer (SSL)/Transport Layer Security (TLS)
- Secure Shell (SSH) Protocol
- Establishing Performance and Stability for VPNs
- Using VPNs with Network Address Translation (NAT)
- Types of Virtualization
- Differences Between Internet Protocol (IP) Version 4 and Internet Protocol (IP) Version 6
- CHAPTER SUMMARY
- KEY CONCEPTS AND TERMS
- CHAPTER 12 ASSESSMENT
-
5. Network Security Implementation
-
THREE. Implementation, Resources, and the Future
-
13. Firewall Implementation
- Constructing, Configuring, and Managing a Firewall
- SmoothWall
- Examining Your Network and Its Security Needs
- Hardware Requirements for SmoothWall
- Planning a Firewall Implementation with SmoothWall
- Installing a Firewall with SmoothWall
- Configuring a Firewall with SmoothWall
- Elements of Firewall Deployment
- Performing Testing with SmoothWall
- Firewall Troubleshooting
- Additional SmoothWall Features
- Firewall Implementation Best Practices
- CHAPTER SUMMARY
- KEY CONCEPTS AND TERMS
- CHAPTER 13 ASSESSMENT
-
14. Real-World VPNs
- Operating System-Based VPNs
- VPN Appliances
- Remote Desktop Protocol
- Using Remote Control Tools
- Performing Remote Access
- Terminal Services
- Microsoft DirectAccess
- DMZ, Extranet, and Intranet VPN Solutions
- Internet Café VPNs
- Online Remote VPN Options
- The Tor Application
- Planning a VPN Implementation
- VPN Implementation Best Practices
- CHAPTER SUMMARY
- KEY CONCEPTS AND TERMS
- CHAPTER 14 ASSESSMENT
-
15. Perspectives, Resources and the Future
- What the Future Holds for Network Security, Firewalls, and VPNs
- Resources Sites for Network Security, Firewalls, and VPNs
- Tools for Network Security, Firewalls, and VPNs
- The Impact of Ubiquitous Wireless Connectivity
- Potential Uses of Security Technologies
- Specialized Firewalls Available
- Effect of Honeypots, Honeynets, and Padded Cells
- Emerging Network Security Technologies
- CHAPTER SUMMARY
- KEY CONCEPTS AND TERMS
- CHAPTER 15 ASSESSMENT
- A. Answer Key
- B. Standard Acronyms
- Glossary of Key Terms
- References
-
13. Firewall Implementation
Product information
- Title: Network Security, Firewalls, and VPNs
- Author(s):
- Release date: September 2010
- Publisher(s): Jones & Bartlett Learning
- ISBN: 9780763791315
You might also like
book
Cisco ASA: All-in-One Next-Generation Firewall, IPS, and VPN Services, Third Edition
Cisco® ASA All-in-One Next-Generation Firewall, IPS, and VPN Services, Third Edition Identify, mitigate, and respond to …
book
Network Security, Firewalls, and VPNs, 3rd Edition
Network Security, Firewalls, and VPNs, third Edition provides a unique, in-depth look at the major business …
book
Cyber Security and Network Security
CYBER SECUTIRY AND NETWORK SECURITY Written and edited by a team of experts in the field, …
book
Applied Network Security Monitoring
Applied Network Security Monitoring is the essential guide to becoming an NSM analyst from the ground …