Network and system security /
Network and System Security provides focused coverage of network and system security technologies. It explores practical solutions to a wide range of network and systems security issues. Chapters are authored by leading experts in the field and address the immediate and long-term challenges in the a...
Clasificación: | Libro Electrónico |
---|---|
Otros Autores: | |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Amsterdam ; Boston :
Syngress,
2014.
|
Edición: | Second edition |
Temas: | |
Acceso en línea: | Texto completo |
Tabla de Contenidos:
- Machine generated contents note: 1. Detecting System Intrusions / Almantas Kakareka
- 1. Introduction
- 2. Monitoring Key Files in the System
- 3. Security Objectives
- 4.0day Attacks
- 5. Good Known State
- 6. Rootkits
- 7. Low Hanging Fruit
- 8. Antivirus Software
- 9. Homegrown Intrusion Detection
- 10. Full-Packet Capture Devices
- 11. Out-of-Band Attack Vectors
- 12. Security Awareness Training
- 13. Data Correlation
- 14. SIEM
- 15. Other Weird Stuff on the System
- 16. Detection
- 17.Network-Based Detection of System Intrusions (DSIs)
- 18. Summary
- Chapter Review Questions/Exercises
- Exercise
- References
- 2. Preventing System Intrusions / Michael West
- 1. So, What is an Intrusion?
- 2. Sobering Numbers
- 3. Know Your Enemy: Hackers versus Crackers
- 4. Motives
- 5. The Crackers' Tools of the Trade
- 6. Bots
- 7. Symptoms of Intrusions
- 8. What Can You Do?
- 9. Security Policies
- 10. Risk Analysis
- 11. Tools of Your Trade
- 12. Controlling User Access
- 13. Intrusion Prevention Capabilities
- 14. Summary
- Chapter Review Questions/Exercises
- Exercise
- 3. Guarding Against Network Intrusions / Patrick J. Walsh
- 1. Traditional Reconnaissance and Attacks
- 2. Malicious Software
- 3. Defense in Depth
- 4. Preventive Measures
- 5. Intrusion Monitoring and Detection
- 6. Reactive Measures
- 7.Network-Based Intrusion Protection
- 8. Summary
- Chapter Review Questions/Exercises
- Exercise
- 4. Securing Cloud Computing Systems / Cem Gurkok
- 1. Cloud Computing Essentials: Examining the Cloud Layers
- 2. Software as a Service (SaaS): Managing Risks in the Cloud
- 3. Platform as a Service (PaaS): Securing the Platform
- 4. Infrastructure as a Service (IaaS)
- 5. Leveraging Provider-Specific Security Options
- 6. Achieving Security in a Private Cloud
- 7. Meeting Compliance Requirements
- 8. Preparing for Disaster Recovery
- 9. Summary
- Chapter Review Questions/Exercises
- Exercise
- References
- 5. Unix and Linux Security / Gerald Beuchelt
- 1. Unix and Security
- 2. Basic Unix Security Overview
- 3. Achieving Unix Security
- 4. Protecting User Accounts and Strengthening Authentication
- 5. Limiting Superuser Privileges
- 6. Securing Local and Network File Systems
- 7.Network Configuration
- 8. Improving the Security of Linux and Unix Systems
- 9. Additional Resources
- 10. Summary
- Chapter Review Questions/Exercises
- Exercise
- 6. Eliminating the Security Weakness of Linux and Unix Operating Systems / Mario Santana
- 1. Introduction to Linux and Unix
- 2. Hardening Linux and Unix
- 3. Proactive Defense for Linux and Unix
- 4. Summary
- Chapter Review Questions/Exercises
- Exercise
- 7. Internet Security / Jesse Walker
- 1. Internet Protocol Architecture
- 2. An Internet Threat Model
- 3. Defending against Attacks on the Internet
- 4. Internet Security Checklist
- 5. Summary
- Chapter Review Questions/Exercises
- Exercise
- 8. Intranet Security / Bill Mansoor
- 1. Smartphones and Tablets in the Intranet
- 2. Security Considerations
- 3. Plugging the Gaps: NAC and Access Control
- 4. Measuring Risk: Audits
- 5. Guardian at the Gate: Authentication and Encryption
- 6. Wireless Network Security
- 7. Shielding the Wire: Network Protection
- 8. Weakest Link in Security: User Training
- 9. Documenting the Network: Change Management
- 10. Rehearse the Inevitable: Disaster Recovery
- 11. Controlling Hazards: Physical and Environmental Protection
- 12. Know Your Users: Personnel Security
- 13. Protecting Data Flow: Information and System Integrity
- 14. Security Assessments
- 15. Risk Assessments
- 16. Intranet Security Implementation Process Checklist
- 17. Summary
- Chapter Review Questions/Exercises
- Exercise
- 9. Local Area Network Security / Dr. Pramod Pandya
- 1. Identify Network Threats
- 2. Establish Network Access Controls
- 3. Risk Assessment
- 4. Listing Network Resources
- 5. Threats
- 6. Security Policies
- 7. The Incident-Handling Process
- 8. Secure Design Through Network Access Controls
- 9. IDS Defined
- 10. NIDS: Scope and Limitations
- 11.A Practical Illustration of NIDS
- 12. Firewalls
- 13. Dynamic NAT Configuration
- 14. The Perimeter
- 15. Access List Details
- 16. Types of Firewalls
- 17. Packet Filtering: IP Filtering Routers
- 18. Application-Layer Firewalls: Proxy Servers
- 19. Stateful Inspection Firewalls
- 20. NIDS Complements Firewalls
- 21. Monitor and Analyze System Activities
- 22. Signature Analysis
- 23. Statistical Analysis
- 24. Signature Algorithms
- 25. Local Area Network Security Countermeasures Implementation Checklist
- 26. Summary
- Chapter Review Questions/Exercises
- Exercise
- 10. Wireless Network Security / Hongbing Cheng
- 1. Cellular Networks
- 2. Wireless Ad hoc Networks
- 3. Security Protocols
- 4. WEP
- 5. Secure Routing
- 6. ARAN
- 7. SLSP
- 8. Key Establishment
- 9. ING
- 10. Management Countermeasures
- 11. Summary
- Chapter Review Questions/Exercises
- Exercise
- References
- 11. Cellular Network Security / Kameswari Kotapati
- 1. Introduction
- 2. Overview of Cellular Networks
- 3. The State of the Art of Cellular Network Security
- 4. Cellular Network Attack Taxonomy
- 5. Cellular Network Vulnerability Analysis
- 6. Summary
- Chapter Review Questions/Exercises
- Exercise
- References
- 12. Rfid Security / Hongbing Cheng
- 1. RFID Introduction
- 2. RFID Challenges
- 3. RFID Protections
- 4. Summary
- Chapter Review Questions/Exercises
- Exercise
- References
- 13. Optical Wireless Security / Scott R. Ellis
- 1. Optical Wireless Systems Overview
- 2. Deployment Architectures
- 3. High Bandwidth
- 4. Low Cost
- 5. Implementation
- 6. Surface Area
- 7. Summary
- Chapter Review Questions/Exercises
- Exercise.