Practical Network Scanning : Capture network vulnerabilities using standard tools such as Nmap and Nessus.
Network administrators use network scanning tools to build a network inventory and to perform security audits by examining active hosts on a network with the help of IP address ranges. The same principles can also be used in cyber attacks to find weaknesses in a system. This book will help you not o...
Clasificación: | Libro Electrónico |
---|---|
Autor principal: | |
Otros Autores: | |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Birmingham :
Packt Publishing,
2018.
|
Temas: | |
Acceso en línea: | Texto completo |
Tabla de Contenidos:
- Cover; Title Page; Copyright and Credits; Packt Upsell; Contributors; Table of Contents; Preface; Chapter 1: Fundamental Security Concepts; Why security?; Building blocks of information security; Computer security; Network security; Firewalls; Intrusion detection systems / intrusion prevention systems; Multitier topology; Internet security; Password; System upgrade and updates; Phishing; Beware of phishing phone calls; Phishing protection; Security issues, threats, and attacks; IoT security risk; Computer security risk; Security Risk-Border Gateway Protocol; Security and threats.
- Natural disastersHuman threats; Security vulnerabilities; Technology weaknesses; Configuration weaknesses ; Security policy weaknesses; Using unencrypted or weak encryption for a website; Summary; Questions; Further reading; Chapter 2: Secure Network Design; Access control ; Asset classification and physical security; Authentication, authorization, and accounting; Network management and security design; Network segmentation; Segmentation strategy steps; Network protection consideration and design; Hardening your TCP/IP stack; DoS and DDoS attacks ; Volume-based attacks.
- Application layer attacksLow-rate attacks; IP spoofing; Anti-spoofing using access lists; Encryption; Anti-spoofing using RPF checks; Ping sweeps and Port scans; Mitigation; DNS vulnerabilities ; How does DNS work?; DNS protocol attacks; Mitigation; Two factor authentication; Summary ; Questions; Further reading; Chapter 3: Server-Level Security; Classification of data; Physical security ; Disk encryption; Full-disk encryption; Bitlocker; Virtual Trusted Platform Module
- vTPM ; Encrypt your Hyper-V Guest VMs ; Cloud VM disk encryption; What is encryption at rest?; Hardening server security.
- Check for open ports or servicesSystem firewall configuration; System update; Disable USB; Hard disk encryption; BIOS protection; Check the installed packages; Password policies; Secure and encrypt remote access; Implement activity logging; Document the host information; Authentication NTLM versus Kerberos; Password policies; Server-level permissions; Server antivirus and malware protection; Local security policies; Summary; Questions; Further reading; Chapter 4: Cloud Security Design; Cloud offerings; IaaS; PaaS; SaaS; Public versus private; Public IaaS versus private IaaS.
- Public PaaS versus private PaaSPublic SaaS versus private SaaS; Shared technology and shared danger; Security approach for cloud computing; Traditional enterprise network model; Hybrid data center and cloud network; Network security devices for IaaS; Firewall Virtual Appliance; Virtual TAP vTAP; Virtual Router; Virtual web application firewalls; DDoS attack protection; Data loss prevention; Exploited system vulnerabilities; Summary ; Questions; Further reading; Chapter 5: Application Security Design; GDPR; Getting consent; Access to data; Encryption; SQL Injection.