Network Security Fundamentals
暫譯: 網路安全基礎知識

Gert DeLaet, Gert Schauwers

  • 出版商: Cisco Press
  • 出版日期: 2004-09-01
  • 售價: $2,540
  • 貴賓價: 9.5$2,413
  • 語言: 英文
  • 頁數: 480
  • 裝訂: Paperback
  • ISBN: 1587051672
  • ISBN-13: 9781587051678
  • 相關分類: 資訊安全
  • 已絕版

買這商品的人也買了...

相關主題

商品描述

Description:

An introduction to the key tools and technologies used to secure network access

  • Examine common security vulnerabilities and the defenses used to protect network resources
  • Learn about cryptography, including modern-day techniques like 3DES, RSA, hashing, and the use of certificates
  • Learn how to design, adopt, and enforce security policies
  • Evaluate the nuances of secure network design
  • Secure HTTP traffic by hardening operating systems, servers, and browsers
  • Protect routers through administrative access policies and services
  • Understand what firewalls do and how to implement them to maximum effect
  • Inspect and monitor network activity with IDS
  • Utilize VPNs for secure remote access
  • Learn about PKI technologies
  • Examine secure wireless design techniques
  • Use logging and auditing tools, such as syslog, SNMP, RMON, and SAA, to manage network traffic

Companies have long been struggling with threats from the hacking community. Keeping pace with the rapid evolution of security technology and the growing complexity of threats is a challenge even in the best of times. The increased focus on security has sent IT managers and engineers scrambling to acquire the proper expertise to implement complex, multilayered solutions.

Network Security Fundamentals introduces the topic of network security in an easy-to-understand and comprehensive manner. This book is designed to provide a fundamental understanding of the various components of a network security architecture and to demonstrate how each component can be implemented to achieve best results. The book uses straightforward language to introduce topics and to show the features, mechanics, and functionality of various network security devices. A series of case studies helps illuminate concepts and shows how you can apply the concepts to solve real-world problems.

Divided into four parts, Network Security Fundamentals takes you on a tour of all the essential technologies and modern defenses at your disposal to help you maintain network uptime and data integrity. Part I covers the basics, introducing terms and concepts and laying the foundation of a solid security structure. The discussion focuses on weaknesses and vulnerabilities along with an overview of the traditional defenses used to thwart attacks. Part II examines two components of security-cryptography and security policies. Part III looks at the various security components. Separate chapters cover web security, router security, firewalls, intrusion detection systems (IDS), remote access security, virtual private networks (VPN), Public Key Infrastructure (PKI), wireless security, and logging and auditing. Each chapter in this section is a self-contained tutorial, allowing you to skip to those topics of greatest interest or primary concern. Part IV includes several reference appendixes, including the Cisco SAFE Blueprint, NSA guidelines, and SANS policies.

Whether you are looking for an introduction to network security principles and practices or a security configuration reference, this book provides you with the invaluable insight you need to protect valuable company resources.

 

 

Table of Contents:

I. INTRODUCTION.

1. Network Security Overview.

    Defining Trust.

    Most Trusted.

    Less Trusted.

    Least Trusted.

    Weaknesses and Vulnerabilities.

    Responsibilities for Network Security.

    Security Objectives.

    Conclusion.

    Q&A.

2. Understanding Vulnerabilities–The Need for Security.

    Risk and Vulnerability.

    TCP/IP Suite Weaknesses.

    IP.

    TCP.

    TCP/IP Security Issues.

    Countermeasures.

    Buffer Overflows.

    Buffer Overflow Mechanisms.

    Buffer Overflow Protection.

    Countermeasures.

    Spoofing Techniques.

    Address Resolution Protocol Spoofing.

    Domain Name Service Spoofing.

    Countermeasures.

    Social Engineering.

    Techniques.

    Countermeasures.

    Conclusion.

    Q&A.

3. Understanding Defenses.

    Digital IDs.

    Intrusion Detection System.

    PC Card—Based Solutions.

    Security Cards.

    Hardware Keys.

    PC Encryption Cards.

    Physical Security.

    Outside and External Security.

    Internal Security.

    Disaster-Recovery Plans.

    Personnel Awareness.

    Encrypted Login.

    Secure Shell Protocol.

    Kerberos Encrypted Login Sessions.

    Secure Socket Layer (HTTP versus HTTPS).

    Firewalls.

    Reusable Passwords.

    Weaknesses.

    Sample Password Policy.

    Antivirus Software.

    Encrypted Files.

    Biometrics.

    Fingerprint Scanning.

    Voice Recognition.

    Typing Biometrics.

    Face Recognition.

    Signature Recognition.

    Conclusion.

    Q&A.

II. BUILDING BLOCKS.

4. Cryptography.

    Cryptography versus Cryptanalysis.

    Manual Systems.

    Crypto Machines.

    Computers.

    Modern-Day Techniques.

    Symmetric Key Algorithms.

    Asymmetric Key Algorithms.

    Hashing Algorithms.

    Secure Socket Layer and Transport Layer Security.

    Digital Certificates.

    Conclusion.

    Q&A.

5. Security Policies.

    Defining a Security Policy?

    Importance of a Security Policy.

    Development Process.

    Incident Handling Process.

    Security Wheel.

    Sample Security Policy.

    Purpose.

    Scope.

    Policy.

    Enforcement.

    Definitions.

    Conclusion.

    Q&A.

6. Secure Design.

    Network Design–Principles.

    Top-Down Design Practices.

    Requirements and Constraints.

    Design Activities, Tools, and Techniques.

    Defense in Depth.

    Network Design–Methodology.

    Stages of the Network.

    Return on Investment.

    Physical Security Issues.

    Securing the Perimeter.

    Internal Security.

    Personnel Training.

    Survivability and Recovery.

    Switches and Hubs.

    Conclusion.

    Q&A.

III. TOOLS AND TECHNIQUES.

7. Web Security.

    Hardening.

    File Systems.

    Web Servers.

    Browsers.

    Case Study.

    Conclusion.

    Q&A.

8. Router Security.

    Basic Router Security.

    Administrative Access.

    Services.

    Router Security to Protect the Network.

    Access Lists.

    Enhanced Access Lists.

    CBAC.

    Case Study.

    Conclusion.

    Q&A.

    References in This Chapter.

9. Firewalls.

    Firewall Basics.

    Different Types of Firewalls.

    Hardware Firewalls: PIX and NetScreen.

    Check Point Software Firewalls.

    Enhancements for Firewalls.

    NAT.

    Proxy Services.

    Content Filters.

    Antivirus Software.

    Case Study: Placing Filtering Routers and Firewalls.

    Summary.

    Q&A.

10. Intrusion Detection System Concepts.

    Introduction to Intrusion Detection.

    IDS Fundamentals.

    Evasion and Antievasion Techniques.

    Organizational Issues and Complications.

    Host-Based IDSs.

    Host Sensor Components and Architecture.

    Deploying Host-Based Intrusion Detection in the Network.

    Network-Based IDSs.

    Network Sensor Components and Architecture.

    Deploying Network-Based Intrusion Detection in the Network.

    Notification and Reporting.

    IDS Management Communications–Monitoring‡the‡Network.

    Communication Syntax–RDEP.

    Out-of-Band Management.

    In-Band Management.

    Sensor Maintenance.

    Case Study: Deployment of IDS Sensors in‡the‡Organization and Their Typical Placement.

    IDS Placement on the Network Blueprint.

    IDS Sensor Initialization and Configuration.

    IDS Tuning.

    Network Under Attack–IDS Event Viewer.

    IDS Active Responses in Action–Blocking a Host.

    Conclusion.

    Q&A.

    11. Remote Access.

    AAA Model.

    Authentication.

    Authorization.

    Accounting.

    AAA Servers.

    TACACS+ Overview.

    RADIUS Overview.

    TACACS+ versus RADIUS.

    Kerberos.

    Lock-and-Key Feature.

    Two-Factor Identification.

    Case Study: Configuring Secure Remote Access.

    TACACS+ Configuration Task List.

    Router COMMSROOM1 Setup and Configuration for This Scenario.

    Test and Troubleshoot Configuration for This Scenario.

    Summary.

    Q&A.

12. Virtual Private Networks.

    Generic Routing Encapsulation Tunnels.

    IP Security.

    Encryption.

    Data Integrity.

    Origin Authentication.

    Antireplay Protection.

    Protocol Framework.

    Tunnel or Transport Mode.

    Transform Sets.

    VPNs with IPSec.

    Case Study: Remote Access VPN.

    Conclusion.

    Q&A.

13. Public Key Infrastructure.

    Public Key Distribution.

    Trusted Third Party.

    PKI Topology.

    Enrollment Procedure.

    Revocation Procedure.

    Case Study: Creating Your Own CA.

    Conclusion.

    Q&A.

14. Wireless Security.

    Different WLAN Configurations.

    What Is a WLAN?

    How Wireless Works.

    WLAN Architecture.

    Setting Up the WLAN Connection.

    Risks of Open Wireless Ports.

    SSID Vulnerabilities.

    Open Authentication Vulnerabilities.

    Shared Key Authentication Vulnerabilities.

    EAP Protocol and the 802.11i Standard.

    War-Driving and War-Chalking.

    SAFE WLAN Design Techniques and Considerations.

    Case Study: Adding Wireless Solutions to a Secure Network.

    Conclusion.

    Q&A.

15. Logging and Auditing.

    Logging.

    SYSLOG.

    Simple Network Management Protocol.

    SNMP Notifications.

    SNMP Versions.

    SNMP Configuration.

    Remote Monitoring.

    Service Assurance Agent.

    Case Study.

    Conclusion.

    Q&A.

IV. APPENDIXES.

Appendix A: SAFE Blueprint.

Appendix B: SANS Policies.

Appendix C: NSA Guidelines.

Appendix D: Answers to Chapter Q&A.

Bibliography.

Books.

Website References.

商品描述(中文翻譯)

**描述:**
介紹用於保護網路存取的關鍵工具和技術
- 檢視常見的安全漏洞及用於保護網路資源的防禦措施
- 了解密碼學,包括現代技術如 3DES、RSA、雜湊及證書的使用
- 學習如何設計、採用和執行安全政策
- 評估安全網路設計的細微差別
- 通過加固作業系統、伺服器和瀏覽器來保護 HTTP 流量
- 通過管理存取政策和服務來保護路由器
- 了解防火牆的功能及如何有效實施
- 使用入侵檢測系統 (IDS) 檢查和監控網路活動
- 利用 VPN 進行安全的遠端存取
- 了解公鑰基礎設施 (PKI) 技術
- 檢視安全無線設計技術
- 使用日誌和審計工具,如 syslog、SNMP、RMON 和 SAA,來管理網路流量

公司長期以來一直在與駭客社群的威脅作鬥爭。跟上安全技術的快速演變和日益複雜的威脅,即使在最佳情況下也是一項挑戰。對安全的日益重視使 IT 管理者和工程師們急於獲得適當的專業知識,以實施複雜的多層解決方案。

《網路安全基礎》以易於理解和全面的方式介紹網路安全主題。本書旨在提供對網路安全架構各組件的基本理解,並展示如何實施每個組件以達到最佳效果。本書使用簡單明瞭的語言介紹主題,並展示各種網路安全設備的特性、機制和功能。一系列案例研究有助於闡明概念,並展示如何應用這些概念來解決現實世界的問題。

本書分為四個部分,《網路安全基礎》帶您參觀所有可用的基本技術和現代防禦措施,以幫助您維持網路正常運行和數據完整性。第一部分涵蓋基礎知識,介紹術語和概念,並奠定堅實的安全結構基礎。討論重點在於弱點和漏洞,以及用於抵禦攻擊的傳統防禦概述。第二部分檢視安全的兩個組件——密碼學和安全政策。第三部分探討各種安全組件。單獨的章節涵蓋網頁安全、路由器安全、防火牆、入侵檢測系統 (IDS)、遠端存取安全、虛擬私人網路 (VPN)、公鑰基礎設施 (PKI)、無線安全以及日誌和審計。本部分的每一章都是一個獨立的教程,允許您跳到最感興趣或最關心的主題。第四部分包括幾個參考附錄,包括 Cisco SAFE 藍圖、NSA 指導方針和 SANS 政策。

無論您是尋找網路安全原則和實踐的入門,還是安全配置的參考,本書都提供了保護公司寶貴資源所需的寶貴見解。

**目錄:**
I. 介紹
1. 網路安全概述
- 定義信任
- 最可信任
- 較少可信任
- 最不可信任
- 弱點和漏洞
- 網路安全的責任
- 安全目標
- 結論
- 問與答
2. 了解漏洞——安全的必要性
- 風險和漏洞
- TCP/IP 套件的弱點
- IP
- TCP
- TCP/IP 安全問題
- 對策
- 緩衝區溢出
- 緩衝區溢出機制
- 緩衝區溢出保護
- 對策
- 偽造技術
- 地址解析協定偽造
- 網域名稱服務偽造
- 對策
- 社會工程學
- 技術
- 對策
- 結論
- 問與答
3. 了解防禦
- 數位身份
- 入侵檢測系統
- 基於 PC 卡的解決方案
- 安全卡
- 硬體金鑰
- PC 加密卡
- 實體安全
- 外部和外部安全
- 內部安全
- 災難恢復計劃
- 人員意識
- 加密登錄
- 安全外殼協定
- Kerberos 加密登錄會話
- 安全套接字層 (HTTP 與 HTTPS)
- 防火牆
- 可重用密碼
- 弱點
- 密碼政策範例