Log In
Or create an account ->
Imperial Library
Home
About
News
Upload
Forum
Help
Login/SignUp
Index
Cover
Title Page
Copyright
Contents
Preface
Part One: Foundations of Network Security
Chapter 1 Fundamentals of Network Security
What Is Network Security?
What Is Trust?
Who—or What—Is Trustworthy?
What Are Security Objectives?
What Are You Trying to Protect?
Seven Domains of a Typical IT Infrastructure
Goals of Network Security
How Can You Measure the Success of Network Security?
Why Are Written Network Security Policies Important?
Planning for the Worst
Who Is Responsible for Network Security?
Examples of Network Infrastructures and Related Security Concerns
Workgroups
SOHO Networks
Client/Server Networks
LAN Versus WAN
Thin Clients and Terminal Services
Remote Control, Remote Access, and VPN
Boundary Networks
Strengths and Weaknesses of Network Design
Enhancing the Security of Wired Versus Wireless LAN Infrastructures
Internal and External Network Issues
Common Network Security Components Used to Mitigate Threats
Hosts and Nodes
IPv4 Versus IPv6
Firewall
Virtual Private Networks
Proxy Servers
Network Address Translation
Routers, Switches, and Bridges
The Domain Name System
Directory Services
Intrusion Detection Systems and Intrusion Prevention Systems
Network Access Control
Chapter Summary
Key Concepts and Terms
Chapter 1 Assessment
Chapter 2 Firewall Fundamentals
What Is a Firewall?
What Firewalls Cannot Do
Why Do You Need a Firewall?
What Are Zones of Risk?
How Firewalls Work and What Firewalls Do
TCP/IP Basics
OSI Reference Model
Sub-Protocols
Headers and Payloads
Addressing
Types of Firewalls
Ingress and Egress Filtering
Types of Filtering
Static Packet Filtering
Stateful Inspection and Dynamic Packet Filtering
Network Address Translation (NAT)
Application Proxy
Circuit Proxy
Content Filtering
Software Versus Hardware Firewalls
IPv4 Versus IPv6 Firewalls
Dual-Homed and Triple-Homed Firewalls
Placement of Firewalls
Chapter Summary
Key Concepts and Terms
Chapter 2 Assessment
Chapter 3 VPN Fundamentals
What Is a Virtual Private Network?
What Are the Benefits of Deploying a VPN?
What Are the Limitations of a VPN?
What Are Effective VPN Policies?
VPN Deployment Models and Architecture
Tunnel Versus Transport Mode
The Relationship Between Encryption and VPNs
Symmetric Cryptography
Asymmetric Cryptography
Hashing
What Is VPN Authentication?
VPN Authorization
Chapter Summary
Key Concepts and Terms
Chapter 3 Assessment
Chapter 4 Network Security Threats and Issues
Hacker Motivation
Favorite Targets of Hackers
Threats from Internal Personnel and External Entities
The Hacking Process
Fallback Attacks
Common IT Infrastructure Threats
Hardware Failures and Other Physical Threats
Natural Disasters
Accidents and Intentional Concerns
Malicious Code (Malware)
Advanced Persistent Threat
Fast Growth and Overuse
Wireless Versus Wired
Eavesdropping
Replay Attacks
Insertion Attacks
Fragmentation Attacks, Buffer Overflows, and XSS Attacks
Fragmentation Attacks
Buffer Overflows
XSS (Cross-Site Scripting) Attacks
Man-in-the-Middle, Session Hijacking, and Spoofing Attacks
Man-in-the-Middle Attacks
Session Hijacking
Spoofing Attacks
Covert Channels
Network and Resource Availability Threats
Denial of Service (DoS)
Distributed Denial of Service (DDoS)
Hacker Tools
Social Engineering
Chapter Summary
Key Concepts and Terms
Chapter 4 Assessment
Part Two: Technical Overview of Network Security, Firewalls, and VPNs
Chapter 5 Network Security Implementation
Seven Domains of a Typical IT Infrastructure
Network Design and Defense in Depth
Protocols
Common Types of Addressing
IPv6
Controlling Communication Pathways
Hardening Systems
Equipment Selection
Authentication, Authorization, and Accounting
Communication Encryption
Hosts: Local-Only or Remote and Mobile
Redundancy
Endpoint Security
Clients
Servers
Routers
Switches
Firewalls and Proxies
Chapter Summary
Key Concepts and Terms
Chapter 5 Assessment
Chapter 6 Network Security Management
Network Security Management Best Practices
Fail-Secure, Fail-Open, and Fail-Close Options
Physical Security
Watching for Compromise
Incident Response
Trapping Intruders and Violators
Why Containment Is Important
Imposing Compartmentalization
Using Honeypots, Honeynets, and Padded Cells
Essential Host Security Controls
Backup and Recovery
User Training and Awareness
Network Security Management Tools
Security Checklist
Network Security Troubleshooting
Compliance Auditing
Security Assessment
Configuration Scans
Vulnerability Scanning
Penetration Testing
Post-Mortem Assessment Review
Chapter Summary
Key Concepts and Terms
Chapter 6 Assessment
Chapter 7 Firewall Basics
Firewall Rules
Authentication, Authorization, and Accounting
Monitoring and Logging
Understanding and Interpreting Firewall Logs and Alerts
Intrusion Detection
Limitations of Firewalls
Improving Performance
The Downside of Encryption with Firewalls
Firewall Enhancements
Management Interfaces
Chapter Summary
Key Concepts and Terms
Chapter 7 Assessment
Chapter 8 Firewall Deployment Considerations
What Should You Allow and What Should You Block?
Common Security Strategies for Firewall Deployments
Security Through Obscurity
Least Privilege
Simplicity
Defense in Depth
Diversity of Defense
Chokepoint
Weakest Link
Fail-Safe
Forced Universal Participation
Essential Elements of a Firewall Policy
Software and Hardware Options for Firewalls
Benefit and Purpose of Reverse Proxy
Use and Benefit of Port-Forwarding
Considerations for Selecting a Bastion Host OS
Constructing and Ordering Firewall Rules
Evaluating Needs and Solutions in Designing Security
What Happens When Security Gets in the Way of Doing Business?
Chapter Summary
Key Concepts and Terms
Chapter 8 Assessment
Chapter 9 Firewall Management and Security
Best Practices for Firewall Management
Security Measures in Addition to a Firewall
Selecting the Right Firewall for Your Needs
The Difference Between Buying and Building a Firewall
Mitigating Firewall Threats and Exploits
Concerns Related to Tunneling Through or Across a Firewall
Testing Firewall Security
Important Tools for Managing and Monitoring a Firewall
Troubleshooting Firewalls
Proper Firewall Implementation Procedure
Responding to Incidents
Chapter Summary
Key Concepts and Terms
Chapter 9 Assessment
Chapter 10 Using Common Firewalls
Individual and Small Office/Home Office (SOHO) Firewall Options
Uses for a Host Software Firewall
Examples of Software Firewall Products
Using Windows 7’s Host Software Firewall
Using a Linux Host Software Firewall
Managing the Firewall on an ISP Connection Device
Converting a Home Router into a Firewall
Commercial Software Network Firewalls
Open-Source Software Network Firewalls
Appliance Firewalls
Virtual Firewalls
Simple Firewall Techniques
Chapter Summary
Key Concepts and Terms
Chapter 10 Assessment
Chapter 11 VPN Management
VPN Management Best Practices
Developing a VPN Policy
Developing a VPN Deployment Plan
Bypass Deployment
Internally Connected Deployment
DMZ-Based Implementation
VPN Threats and Exploits
Commercial or Open Source VPNs
Differences Between Personal and Enterprise VPNs
Balancing Anonymity and Privacy
Protecting VPN Security to Support Availability
The Importance of User Training
VPN Troubleshooting
Chapter Summary
Key Concepts and Terms
Chapter 11 Assessment
Chapter 12 VPN Technologies
Differences Between Software and Hardware Solutions
Software VPNs
Hardware VPNs
Differences Between Layer 2 and Layer 3 VPNs
Internet Protocol Security (IPSec)
Layer 2 Tunneling Protocol (L2TP)
Secure Sockets Layer (SSL)/Transport Layer Security (TLS)
SSL/TLS and VPNs
Secure Shell (SSH) Protocol
Establishing Performance and Stability for VPNs
Performance
Stability
Using VPNs with Network Address Translation (NAT)
Types of Virtualization
Desktop Virtualization
SSL VPN Virtualization
Differences Between Internet Protocol Version 4 (IPv4) and Internet Protocol Version 6 (IPv6)
The TCP/IP Protocol Suite
IPv4 Challenges
IPv6
IPSec and IPv6
Chapter Summary
Key Concepts and Terms
Chapter 12 Assessment
Part Three: Implementation, Resources, and the Future
Chapter 13 Firewall Implementation
Constructing, Configuring, and Managing a Firewall
SmoothWall
Examining Your Network and Its Security Needs
What to Protect and Why
Preserving Privacy
Firewall Design and Implementation Guidelines
Selecting a Firewall
Hardware Requirements for SmoothWall
Planning a Firewall Implementation with SmoothWall
Firewalling a Big Organization: Application-Level Firewall and Package Filtering, a Hybrid System
Firewalling a Small Organization: Packet Filtering or Application-Level Firewall, a Proxy Implementation
Firewalling in a Subnet Architecture
Installing a Firewall with SmoothWall
Configuring a Firewall with SmoothWall
Elements of Firewall Deployment
Performing Testing with SmoothWall
Firewall Troubleshooting
Additional SmoothWall Features
Firewall Implementation Best Practices
Chapter Summary
Key Concepts and Terms
Chapter 13 Assessment
Chapter 14 Real-World VPNs
Operating System–Based VPNs
VPN Appliances
Configuring a Typical VPN Appliance
Client-Side Configuration
Remote Desktop Protocol
Using Remote Control Tools
Using Remote Access
The Technology for Remote Use
Choosing Between IPSec and SSL Remote Access VPNs
Terminal Services
TS RemoteApp
TS Web Access
Microsoft DirectAccess
DMZ, Extranet, and Intranet VPN Solutions
Intranet VPNs
Extranet VPNs
Internet Café VPNs
Online Remote VPN Options
Security
Wake-on-LAN Support
File Sharing
Remote Printing
Mac Support
The Tor Application
Planning a VPN Implementation
Requirements
Installation
Deployment
Testing and Troubleshooting
VPN Implementation Best Practices
Chapter Summary
Key Concepts and Terms
Chapter 14 Assessment
Chapter 15 Perspectives, Resources, and the Future
What the Future Holds for Network Security, Firewalls, and VPNs
Threats
Firewall Capabilities
Encryption
Authentication
Metrics
Focus
Securing the Cloud
Securing Mobile Devices
Mobile IP
Bring Your Own Device (BYOD)
Resource Sites for Network Security, Firewalls, and VPNs
Tools for Network Security, Firewalls, and VPNs
Commercial Off-the-Shelf (COTS) Software
Open Source Applications and Tools
The Impact of Ubiquitous Wireless Connectivity
Potential Uses of Security Technologies
What Happens When There Is No Perimeter?
Specialized Firewalls Available
Intrusion Detection Systems (IDSs) and Intrusion Prevention Systems (IPSs)
Effect of Honeypots, Honeynets, and Padded Cells
Emerging Network Security Technologies
IP Version 6
VPNs, Firewalls, and Virtualization
Steganography
Anti-Forensics
Chapter Summary
Key Concepts and Terms
Chapter 15 Assessment
Appendix A: Answer Key
Appendix B: Standard Acronyms
Glossary of Key Terms
References
Index
← Prev
Back
Next →
← Prev
Back
Next →