LIMITED OFFER
Save 50% on book bundles
Immediately download your ebook while waiting for your print delivery. No promo code needed.
Network and System Security provides focused coverage of network and system security technologies. It explores practical solutions to a wide range of network and systems security… Read more
LIMITED OFFER
Immediately download your ebook while waiting for your print delivery. No promo code needed.
Network and System Security provides focused coverage of network and system security technologies. It explores practical solutions to a wide range of network and systems security issues. Chapters are authored by leading experts in the field and address the immediate and long-term challenges in the authors’ respective areas of expertise. Coverage includes building a secure organization, cryptography, system intrusion, UNIX and Linux security, Internet security, intranet security, LAN security; wireless network security, cellular network security, RFID security, and more.
Network and security IT practitioners, as well as other security technologists working with or interested in network and systems security. Job titles include network administrator, System administrator, system analyst, etc.
Dedication
Acknowledgements
About the Editor
Contributors
Introduction
Organization of this Book
Chapter 1. Detecting System Intrusions
1 Introduction
2 Monitoring Key Files in the System
3 Security Objectives
4 0day Attacks
5 Good Known State
6 Rootkits
7 Low Hanging Fruit
8 Antivirus Software
9 Homegrown Intrusion Detection
10 Full-Packet Capture Devices
11 Out-of-Band Attack Vectors
12 Security Awareness Training
13 Data Correlation
14 SIEM
15 Other Weird Stuff on the System
16 Detection
17 Network-Based Detection of System Intrusions (DSIs)
18 Summary
Chapter Review Questions/Exercises
Exercise
References
Chapter 2. Preventing System Intrusions
1 So, What is an Intrusion?
2 Sobering Numbers
3 Know Your Enemy: Hackers versus Crackers
4 Motives
5 The Crackers’ Tools of the Trade
6 Bots
7 Symptoms of Intrusions
8 What Can You Do?
9 Security Policies
10 Risk Analysis
11 Tools of Your Trade
12 Controlling User Access
13 Intrusion Prevention Capabilities
14 Summary
Chapter Review Questions/Exercises
Exercise
Chapter 3. Guarding Against Network Intrusions
1 Traditional Reconnaissance and Attacks
2 Malicious Software
3 Defense in Depth
4 Preventive Measures
5 Intrusion Monitoring and Detection
6 Reactive Measures
7 Network-Based Intrusion Protection
8 Summary
Chapter Review Questions/Exercises
Exercise
Chapter 4. Securing Cloud Computing Systems
1 Cloud Computing Essentials: Examining the Cloud Layers
2 Software as a Service (SaaS): Managing Risks in the Cloud
3 Platform as a Service (PaaS): Securing the Platform
4 Infrastructure as a Service (IaaS)
5 Leveraging Provider-Specific Security Options
6 Achieving Security in a Private Cloud
7 Meeting Compliance Requirements
8 Preparing for Disaster Recovery
9 Summary
Chapter Review Questions/Exercises
Exercise
References
Chapter 5. Unix and Linux Security
1 Unix and Security
2 Basic Unix Security Overview
3 Achieving Unix Security
4 Protecting User Accounts and Strengthening Authentication
5 Limiting Superuser Privileges
6 Securing Local and Network File Systems
7 Network Configuration
8 Improving the Security of Linux and Unix Systems
9 Additional Resources
10 Summary
Chapter Review Questions/Exercises
Exercise
Chapter 6. Eliminating the Security Weakness of Linux and Unix Operating Systems
1 Introduction to Linux and Unix
2 Hardening Linux and Unix
3 Proactive Defense for Linux and Unix
4 Summary
Chapter Review Questions/Exercises
Exercise
Chapter 7. Internet Security
1 Internet Protocol Architecture
2 An Internet Threat Model
3 Defending against Attacks on the internet
4 Internet Security Checklist
5 Summary
Chapter Review Questions/Exercises
Exercise
Chapter 8. Intranet Security
1 Smartphones and Tablets in the Intranet
2 Security Considerations
3 Plugging the Gaps: NAC and Access Control
4 Measuring Risk: Audits
5 Guardian at the Gate: Authentication and Encryption
6 Wireless Network Security
7 Shielding the Wire: Network Protection
8 Weakest Link in Security: User Training
9 Documenting the Network: Change Management
10 Rehearse the Inevitable: Disaster Recovery
11 Controlling Hazards: Physical and Environmental Protection
12 Know Your Users: Personnel Security
13 Protecting Data Flow: Information and System Integrity
14 Security Assessments
15 Risk Assessments
16 Intranet Security Implementation Process Checklist
17 Summary
Chapter Review Questions/Exercises
Exercise
Chapter 9. Local Area Network Security
1 Identify Network Threats
2 Establish Network Access Controls
3 Risk Assessment
4 Listing Network Resources
5 Threats
6 Security Policies
7 The Incident-Handling Process
8 Secure Design Through Network Access Controls
9 IDS Defined
10 NIDS: Scope and Limitations
11 A Practical Illustration of NIDS
12 Firewalls
13 Dynamic NAT Configuration
14 The Perimeter
15 Access List Details
16 Types of Firewalls
17 Packet Filtering: IP Filtering Routers
18 Application-Layer Firewalls: Proxy Servers
19 Stateful Inspection Firewalls
20 NIDS Complements Firewalls
21 Monitor and Analyze System Activities
22 Signature Analysis
23 Statistical Analysis
24 Signature Algorithms
25 Local Area Network Security Countermeasures Implementation Checklist
26 Summary
Chapter Review Questions/Exercises
Exercise
Chapter 10. Wireless Network Security
1 Cellular Networks
2 Wireless Ad Hoc Networks
3 Security Protocols
4 WEP
5 Secure Routing
6 ARAN
7 SLSP
8 Key Establishment
9 ING
10 Management Countermeasures
11 Summary
Chapter Review Questions/Exercises
Exercise
References
Chapter 11. Cellular Network Security
1 Introduction
2 Overview of Cellular Networks
3 The State of the Art of Cellular Network Security
4 Cellular Network Attack Taxonomy
5 Cellular Network Vulnerability Analysis
6 Summary
Chapter Review Questions/Exercises
Exercise
References
Chapter 12. RFID Security
1 RFID Introduction
2 RFID Challenges
3 RFID Protections
4 Summary
Chapter Review Questions/Exercises
Exercise
References
Chapter 13. Optical Wireless Security
1 Optical Wireless Systems Overview
2 Deployment Architectures
3 High Bandwidth
4 Low Cost
5 Implementation
6 Surface Area
7 Summary
Chapter Review Questions/Exercises
Exercise
Index
JV