Two Books - Network Security &ndash A Beginner&rsquos Guide

Local pick-up preferred (please call first) but will ship at the buyer s expenseKingston Books 11- IMG_1346Author Eric MailwaldPublisher Osborne McGraw HillCharts Screen-Shots Illustrations Block-Diagrams Intrusion Detection System Architecture Diagram E-Commerce Architecture Diagram Proper Internet Architecture Diagram The Information Security Process Plan Illustration DES Block Diagram DES sub-key generation algorithm Triple DES functional diagram The Unix password encryption function. INTRODUCTIONNetwork Security A Beginner s Guide. It seems that the title of this book defines what it is about pretty well. But this book is not just a beginner s guide. In writing this book I attempted to pick out the issues that confront me on a day-to-day basis. Most of these issues caused me much consternation over the years and it would have been very helpful for me to have had all of this information at my fingertips.Security has become more and more of an issue in recent years. We are constantly hearing about the successful penetration of WEB sites and organizations. In response to these stories more and more vendors are appearing with tools that offer some protection. From looking at all this information it would appear that the big issues in security can be solved with technology. Unfortunately security issues are much more complex than that. At the very bottom security is a people issue. No matter how much technology that we throw at this problem the best we can do is to make the job of the security practitioner a little easier. We will not solve the basic problem with technology but we can manage the security problem through the dedicated application of well-thought out security processes and procedures. Hopefully this book will provide you with the basic tools you will need to manage your security issues. This book is divided into four main parts plus some good information in the appendices Part I Information Security Basics Part I provides you with a basic understanding of what information security is. Proper terms are defined from both the attack perspective and the defensive perspective. Chapter 1 What is Information Security Chapter 2 Types of Attacks Chapter 3 Information Security ServicesPart II Ground Work Part II provides you with the ground work for a security program. To begin a program security professionals need an understanding of the law how policy is to be used the management of risk and the process of implementing and managing security. The section concludes with a discussion of best practices in the area of security. Chapter 4 Legal Issues in Information Security Chapter 5 Policy Chapter 6 Managing Risk Chapter 7 Information Security Process Chapter 8 Information Security Best Practices Part III Practical Solutions Part III provides you with detailed technical information regarding architecture e-commerce sites encryption and intrusion detection. This section also provides information on how hackers seek to target networks and specific techniques that are used to attack the site. Chapter 9. Internet Architecture Chapter 10. Virtual Private Networks Chapter 11. E-Commerce Security Needs Chapter 12. Encrypton Chapter 13. Hacker Techniques Chapter 14. Intrusion DetectionPart IV Platform-Specific ImplementationsPart IV is intended to provide detailed configuration recommendations for common operating systems. Details for securing Windows NT Unix and Windows 2000 are provided.Chapter 15. Unix Security IssuesChapter 16. Windows NT Security IssuesChapter 17. Windows 2000 Security IssuesPart V Appendixes Part V provides four appendixes that complement the purpose of the book. These sections are intended to assist the reader in answering particular questions about security and implementing a strong program.Appendix A The Process Project PlanAppendix B Unix vs. Windows Which is More Secure Appendix C Resources to Learn More About SecurityAppendix D Incident Response Procedure Testing ScenariosOverall this book attempts to put information security in perspective. Too often I see organizations purchasing the latest security tools in order to solve their security problems without realizing that well-trained security staff and employees who understand why security is important are more crucial. I hope that you find the information in this book useful.Contents by ChapterInformation Security Basics What is Information Security Types of AttacksInformation Security BasicsGround Work Legal Issues in Information SecurityPolicyManaging RiskInformation Security ProcessInformation Security Best PracticesPractical Solutions Internet Architecture Virtual Private Networks E-Commerce Security Needs Encryption Hackers Techniques Intrusion Detection4. Platform Specific Implementations Unix Security Issues Windows NT Security Issues Windows 2000 Security IssuesAppendixes The Process Project PlanUnix vs. Windows Which is More Secure Resources to Learn More About SecurityIncident Response Procedure Testing ScenariosIndexContents by ChapterAcknowledgementsIntroduction Part IWhat is Information Security Defining Information Security Brief History of Security Physical Security Communications Security Emissions Security Computer Security Network Security Information Security Why Security Is a Process Not Point Products Anti-Virus Software Access Controls Firewalls Smart Cards Biometrics Intrusion Detection Policy Management Vulnerability Scanning Encryption Physical Security MechanismsTypes of Attacks Access Attacks Snooping Eavesdropping Interception How Access Attacks Are Accomplished Modification Attacks Changes Insertion Deletion How Modification Attacks Are Accomplished Denial-of-Service Attacks Denial of Access to Information Denial of Access to Applications Denial of Access to Systems Denial of Access to Communications How Denial-of-Service Attacks Are Accomplished Repudiation Attacks Masquerading Denying an Event How Repudiation Attacks Are AccomplishedInformation Security Services Confidentiality Confidentiality of Files Confidentially of Information in Transmission Traffic Flow Confidentiality Attacks That Can be Prevented Integrity Integrity of Files Integrity of Information Transmission Attacks That Can be Prevented Availability Backups Fail-Over Disaster Recovery Attacks That Can be Prevented Accountability Identification and Authentication Audit Attacks That Can Be prevented Part IILegal Issues in Information Security U.S. Criminal Law Computer Fraud and Abuse (18 US Code 1030) Credit Card Fraud (18 US Code 1029) Copyrights (18 US Code 2319) Interception (18 US Code 2511) Access to Electronic Information (18 US Code 2701) Other Criminal StatutesState LawsExamples of Laws of Other Countries Australia The Netherlands United KingdomProsecution Evidence Collection Contacting Law EnforcementCivil Issues Employee Issues Downstream LiabilityPrivacy Issues Customer Information Health InformationPolicy Policy Is Important Defining How Security Should Be Putting Everyone on the Same Page Types of Policy Information Policy Security Policy Computer Use Policy Internet Use Policy Mail Policy User Management Procedures System Administration Procedure Incidence Response Procedure Configuration management Procedure Design Methodology Disaster Recovery Plans Creating Appropriate Policy Defining What Is Important Defining Acceptable Behavior Identifying Stake Holders Defining Appropriate Outlines Policy Development Deploying Policy Gaining Buy-In Education Implementation Using Policy Effectively Existing Systems and Projects Audits Policy Reviews Managing Risk What is Risk Vulnerably Threat Vulnerability Risk Identifying the Risk to an Organization Identifying Vulnerabilities Identifying Real Threats Examining Countermeasures Identifying Risk Measuring Risk Money Time Resources Reputation Lost Business Methodology for Measuring Risk Information Security Risk Assessment Network Physical Security Policies and Procedures Precautions Awareness People Workload Attitude Adherence Business Assessment Results Policy Choosing the Order of the Policies to Develop Updating Existing Policies Implementation Security Reporting Systems Authentication Systems Internet Security Intrusion Detection Systems Encryption Physical Security Staff Awareness Training Employees Administrators Developers Executives Security Staff Audit Policy Adherence Audit Periodic and New Project Assignments Penetration Tests Information Security best Practices Administrative Security Policies and Procedures Resources Responsibility Education Contingency Plans Security Project Plans Technical Security Network Connectivity Authentication Audit Encryption Backup and Recovery Physical Security Part III Internet Architecture Services to Offer Mail Web Internal Access to the Internet External Access to Internal Systems Control Services Service Not to Offer Communications Architecture Single-Line Access Multiple-Line Access to a Single ISP Multiple-Line Access to Multiple ISPs Demilitarized Zone Defining the DMZ Systems to Place the DMZ Appropriate DMZ Architecture Firewalls Types of Firewalls Firewall Configurations Firewall Rule Set Design Network Address Translation What Is Network Address Translation Private Class Addresses Static NAT Dynamic NAT Partner Networks Use of Partner Networks Setup Addressing IssuesVirtual Private Networks Defining Virtual Private Networks User VPNs Benefits of User VPNs Issues with User VPNs Managing User VPNs Site VPNs Benefits of Site VPNs Issues with Site VPNs Managing Site VPNs Standard VPN Techniques VPN Server Encryption Algorithms Authentication SystemE-Commerce Services E-Commerce ServicesDifferences between E-Commerce Services and Example and Regular DMZ ServicesExamples of E-Commerce Services Availability Business-to-Consumer Issues Business-to-Business Issues Global Time Client Comfort Cost of Downtime Solving the Availability Problem Client-Side Security Communications Security Saving Information on the Client System Repudiation Server-Side Security Information Stored on the Server Protecting the Server from Attack Application Security Proper Application Design Proper Programming Techniques Showing Code to the World Configuration Management Database Server Security Database Location Communications with the E-commerce Server Internal Access Protection E-Commerce Architecture Server Location and Connectivity Availability Vulnerability Scanning Audit Information and Problem Detection Encryption Encryption Concepts Encryption Terms Attacks Against Encryption Private Key Encryption What is Private Key Encryption Substitution Ciphers One-Time Pads Data Encryption Standard Triple DES Password Encryption The Advanced Encryption Standard Rijndael Other Private Key Algorithms Public Key Encryption What is Public Key Encryption Diffe-Hellman Key Exchange RSA Other Public Key Algorithms Digital Signatures What is a Digital Signature Secure Hash Functions Key Management Key Creation Key Distribution Key Certification Key Protection Key Revocation Trust Hierarchy Web Hacker Techniques A Hacker s Motivation Challenge Greed Malicious Intent Historical Hacking Techniques Open Sharing Bad Passwords Unwise Programming Social Engineering Buffer Overflows Denial of Service Methods of the Untargeted Hacker Targets Reconnaissance Attack Methods Use of Compromised Systems Intrusion Detection Types of Intrusion Detection Systems Host-Based IDS Network-Based IDS Is One Type of IDS Better Setting Up an IDS Defining the Goals of the IDS Choosing What to Monitor Choosing How to Respond Setting Thresholds Implementing the System Managing and IDS Understanding What an IDS Can Tell You Understanding What an IDS is Telling You Investigating Suspicious Events Part IV Unix Security Issues Setting up the SystemPaperback 400 pages ISBN 0-07-213324-4

Share:

Important!

There are a lot of advertisers on Advertigo. We cannot check them one by one.

You work hard for your money and you want a company you can rely on when you are buying or selling things. That’s why we want to help you protect yourself from fraud. In this section, you’ll find informative tips and other useful material to stay informed and help reduce your chances of falling victim to scammers.

Please understand that Advertigo.net is a free service to help buyers and sellers (and etc.) find one another. Advertigo.net is not involved in any transactions and can not police the actions of our many users.