Secure your network for free : using NMAP, wireshark, snort, nessus, and MRTG /
This is the only book to clearly demonstrate how to get big dollar security for your network using freely available tools. This is a must have book for any company or person with a limited budget. Network security is in a constant struggle for budget to get things done. Upper management wants thing...
Clasificación: | Libro Electrónico |
---|---|
Autor principal: | |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Rockland, Mass. : Oxford :
Syngress ; Elsevier Science [distributor],
2006.
|
Temas: | |
Acceso en línea: | Texto completo |
Tabla de Contenidos:
- Secure Your Network for Free
- Copyright Page
- 1. Presenting the Business Case for Free Solutions
- Introduction
- The Costs of Using Free Security Solutions
- The Savings of Using Free Security Solutions
- Comparing Free Solutions with Commercial Solutions
- "Selling" a Free Solution
- Summary
- Solutions Fast Track
- Frequently Asked Questions
- 2. Protecting Your Perimeter
- Introduction
- Firewall Types
- Firewall Architectures
- Implementing Firewalls
- Providing Secure Remote Access
- Summary
- Solutions Fast Track
- Frequently Asked Questions.
- 3. Protecting Network ResourcesIntroduction
- Performing Basic Hardening
- Hardening Windows Systems
- Hardening Linux Systems
- Hardening Infrastructure Devices
- Patching Systems
- Personal Firewalls
- Providing Antivirus and Antispyware Protection
- Encrypting Sensitive Data
- Summary
- Solutions Fast Track
- Frequently Asked Questions
- 4. Configuring an Intrusion Detection System
- Introduction
- Intrusion Detection Systems
- Configuring an Intrusion Detection System
- Configuring Snort on a Windows System
- Configuring Snort on a Linux System
- Other Snort Add-Ons.
- Demonstrating EffectivenessSummary
- Solutions Fast Track
- Frequently Asked Questions
- 5. Managing Event Logs
- Introduction
- Generating Windows Event Logs
- Generating Syslog Event Logs
- Securing Your Event Logs
- Applying Your Knowledge
- Summary
- Solutions Fast Track
- Frequently Asked Questions
- 6. Testing and Auditing Your Systems
- Introduction
- Taking Inventory
- Vulnerability Scanning
- OSSTMM
- Summary
- Solutions Fast Track
- Frequently Asked Questions
- 7. Network Reporting and Troubleshooting
- Introduction
- Reporting on Bandwidth Usage and Other Metrics.
- Collecting Data for AnalysisUnderstanding SNMP
- Troubleshooting Network Problems
- Additional Troubleshooting Tools
- Summary
- Solutions Fast Track
- Frequently Asked Questions
- 8. Security as an Ongoing Process
- Introduction
- Patch Management
- Change Management
- Antivirus
- Antispyware
- Intrusion Detection Systems
- Vulnerability Scanning
- Penetration Testing
- Policy Review
- Physical Security
- CERT Team
- Summary
- Solutions Fast Track
- Frequently Asked Questions.