O'Reilly logo

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Secure Your Network for Free

Book Description

This is the only book to clearly demonstrate how to get big dollar security for your network using freely available tools. This is a must have book for any company or person with a limited budget.

Network security is in a constant struggle for budget to get things done. Upper management wants thing to be secure but doesn’t want to pay for it. With this book as a guide, everyone can get what they want. The examples and information will be of immense value to every small business. It will explain security principles and then demonstrate how to achieve them using only freely available software.
  • Teachers you how to implement best of breed security using tools for free
  • Ideal for anyone recomending and implementing new technologies within the company

Table of Contents

  1. Cover image
  2. Title page
  3. Table of Contents
  4. Copyright page
  5. Lead Author
  6. Technical Editors
  7. Companion Web Site
  8. Chapter 1: Presenting the Business Case for Free Solutions
    1. Introduction
    2. The Costs of Using Free Security Solutions
    3. The Savings of Using Free Security Solutions
    4. Comparing Free Solutions with Commercial Solutions
    5. “Selling” a Free Solution
    6. Summary
    7. Solutions Fast Track
    8. Frequently Asked Questions
  9. Chapter 2: Protecting Your Perimeter
    1. Introduction
    2. Firewall Types
    3. Firewall Architectures
    4. Implementing Firewalls
    5. Providing Secure Remote Access
    6. Summary
    7. Solutions Fast Track
    8. Frequently Asked Questions
  10. Chapter 3: Protecting Network Resources
    1. Introduction
    2. Performing Basic Hardening
    3. Hardening Windows Systems
    4. Hardening Linux Systems
    5. Hardening Infrastructure Devices
    6. Patching Systems
    7. Personal Firewalls
    8. Providing Antivirus and Antispyware Protection
    9. Encrypting Sensitive Data
    10. Summary
    11. Solutions Fast Track
    12. Frequently Asked Questions
  11. Chapter 4: Configuring an Intrusion Detection System
    1. Introduction
    2. Intrusion Detection Systems
    3. Configuring an Intrusion Detection System
    4. Configuring Snort on a Windows System
    5. Configuring Snort on a Linux System
    6. Other Snort Add-Ons
    7. Demonstrating Effectiveness
    8. Summary
    9. Solutions Fast Track
    10. Frequently Asked Questions
  12. Chapter 5: Managing Event Logs
    1. Introduction
    2. Generating Windows Event Logs
    3. Generating Syslog Event Logs
    4. Securing Your Event Logs
    5. Applying Your Knowledge
    6. Summary
    7. Solutions Fast Track
    8. Frequently Asked Questions
  13. Chapter 6: Testing and Auditing Your Systems
    1. Introduction
    2. Taking Inventory
    3. Vulnerability Scanning
    4. OSSTMM
    5. Summary
    6. Solutions Fast Track
    7. Frequently Asked Questions
  14. Chapter 7: Network Reporting and Troubleshooting
    1. Introduction
    2. Reporting on Bandwidth Usage and Other Metrics
    3. Collecting Data for Analysis
    4. Understanding SNMP
    5. Troubleshooting Network Problems
    6. Additional Troubleshooting Tools
    7. Summary
    8. Solutions Fast Track
    9. Frequently Asked Questions
  15. Chapter 8: Security as an Ongoing Process
    1. Introduction
    2. Patch Management
    3. Change Management
    4. Antivirus
    5. Antispyware
    6. Intrusion Detection Systems
    7. Vulnerability Scanning
    8. Penetration Testing
    9. Policy Review
    10. Physical Security
    11. CERT Team
    12. Summary
    13. Solutions Fast Track
    14. Frequently Asked Questions
  16. Index