Network and system security / edited by John R. Vacca.

Saved in:
Bibliographic Details
Other Authors: Vacca, John R.
Format: eBook
Language:English
Published: Amsterdam ; Boston : Syngress, 2014.
Edition:Second edition
Subjects:
Online Access:Click for online access
Table of Contents:
  • Machine generated contents note: 1. Detecting System Intrusions / Almantas Kakareka
  • 1. Introduction
  • 2. Monitoring Key Files in the System
  • 3. Security Objectives
  • 4.0day Attacks
  • 5. Good Known State
  • 6. Rootkits
  • 7. Low Hanging Fruit
  • 8. Antivirus Software
  • 9. Homegrown Intrusion Detection
  • 10. Full-Packet Capture Devices
  • 11. Out-of-Band Attack Vectors
  • 12. Security Awareness Training
  • 13. Data Correlation
  • 14. SIEM
  • 15. Other Weird Stuff on the System
  • 16. Detection
  • 17.Network-Based Detection of System Intrusions (DSIs)
  • 18. Summary
  • Chapter Review Questions/Exercises
  • Exercise
  • References
  • 2. Preventing System Intrusions / Michael West
  • 1. So, What is an Intrusion?
  • 2. Sobering Numbers
  • 3. Know Your Enemy: Hackers versus Crackers
  • 4. Motives
  • 5. The Crackers' Tools of the Trade
  • 6. Bots
  • 7. Symptoms of Intrusions
  • 8. What Can You Do?
  • 9. Security Policies
  • 10. Risk Analysis
  • 11. Tools of Your Trade
  • 12. Controlling User Access
  • 13. Intrusion Prevention Capabilities
  • 14. Summary
  • Chapter Review Questions/Exercises
  • Exercise
  • 3. Guarding Against Network Intrusions / Patrick J. Walsh
  • 1. Traditional Reconnaissance and Attacks
  • 2. Malicious Software
  • 3. Defense in Depth
  • 4. Preventive Measures
  • 5. Intrusion Monitoring and Detection
  • 6. Reactive Measures
  • 7.Network-Based Intrusion Protection
  • 8. Summary
  • Chapter Review Questions/Exercises
  • Exercise
  • 4. Securing Cloud Computing Systems / Cem Gurkok
  • 1. Cloud Computing Essentials: Examining the Cloud Layers
  • 2. Software as a Service (SaaS): Managing Risks in the Cloud
  • 3. Platform as a Service (PaaS): Securing the Platform
  • 4. Infrastructure as a Service (IaaS)
  • 5. Leveraging Provider-Specific Security Options
  • 6. Achieving Security in a Private Cloud
  • 7. Meeting Compliance Requirements
  • 8. Preparing for Disaster Recovery
  • 9. Summary
  • Chapter Review Questions/Exercises
  • Exercise
  • References
  • 5. Unix and Linux Security / Gerald Beuchelt
  • 1. Unix and Security
  • 2. Basic Unix Security Overview
  • 3. Achieving Unix Security
  • 4. Protecting User Accounts and Strengthening Authentication
  • 5. Limiting Superuser Privileges
  • 6. Securing Local and Network File Systems
  • 7.Network Configuration
  • 8. Improving the Security of Linux and Unix Systems
  • 9. Additional Resources
  • 10. Summary
  • Chapter Review Questions/Exercises
  • Exercise
  • 6. Eliminating the Security Weakness of Linux and Unix Operating Systems / Mario Santana
  • 1. Introduction to Linux and Unix
  • 2. Hardening Linux and Unix
  • 3. Proactive Defense for Linux and Unix
  • 4. Summary
  • Chapter Review Questions/Exercises
  • Exercise
  • 7. Internet Security / Jesse Walker
  • 1. Internet Protocol Architecture
  • 2. An Internet Threat Model
  • 3. Defending against Attacks on the Internet
  • 4. Internet Security Checklist
  • 5. Summary
  • Chapter Review Questions/Exercises
  • Exercise
  • 8. Intranet Security / Bill Mansoor
  • 1. Smartphones and Tablets in the Intranet
  • 2. Security Considerations
  • 3. Plugging the Gaps: NAC and Access Control
  • 4. Measuring Risk: Audits
  • 5. Guardian at the Gate: Authentication and Encryption
  • 6. Wireless Network Security
  • 7. Shielding the Wire: Network Protection
  • 8. Weakest Link in Security: User Training
  • 9. Documenting the Network: Change Management
  • 10. Rehearse the Inevitable: Disaster Recovery
  • 11. Controlling Hazards: Physical and Environmental Protection
  • 12. Know Your Users: Personnel Security
  • 13. Protecting Data Flow: Information and System Integrity
  • 14. Security Assessments
  • 15. Risk Assessments
  • 16. Intranet Security Implementation Process Checklist
  • 17. Summary
  • Chapter Review Questions/Exercises
  • Exercise
  • 9. Local Area Network Security / Dr. Pramod Pandya
  • 1. Identify Network Threats
  • 2. Establish Network Access Controls
  • 3. Risk Assessment
  • 4. Listing Network Resources
  • 5. Threats
  • 6. Security Policies
  • 7. The Incident-Handling Process
  • 8. Secure Design Through Network Access Controls
  • 9. IDS Defined
  • 10. NIDS: Scope and Limitations
  • 11.A Practical Illustration of NIDS
  • 12. Firewalls
  • 13. Dynamic NAT Configuration
  • 14. The Perimeter
  • 15. Access List Details
  • 16. Types of Firewalls
  • 17. Packet Filtering: IP Filtering Routers
  • 18. Application-Layer Firewalls: Proxy Servers
  • 19. Stateful Inspection Firewalls
  • 20. NIDS Complements Firewalls
  • 21. Monitor and Analyze System Activities
  • 22. Signature Analysis
  • 23. Statistical Analysis
  • 24. Signature Algorithms
  • 25. Local Area Network Security Countermeasures Implementation Checklist
  • 26. Summary
  • Chapter Review Questions/Exercises
  • Exercise
  • 10. Wireless Network Security / Hongbing Cheng
  • 1. Cellular Networks
  • 2. Wireless Ad hoc Networks
  • 3. Security Protocols
  • 4. WEP
  • 5. Secure Routing
  • 6. ARAN
  • 7. SLSP
  • 8. Key Establishment
  • 9. ING
  • 10. Management Countermeasures
  • 11. Summary
  • Chapter Review Questions/Exercises
  • Exercise
  • References
  • 11. Cellular Network Security / Kameswari Kotapati
  • 1. Introduction
  • 2. Overview of Cellular Networks
  • 3. The State of the Art of Cellular Network Security
  • 4. Cellular Network Attack Taxonomy
  • 5. Cellular Network Vulnerability Analysis
  • 6. Summary
  • Chapter Review Questions/Exercises
  • Exercise
  • References
  • 12. Rfid Security / Hongbing Cheng
  • 1. RFID Introduction
  • 2. RFID Challenges
  • 3. RFID Protections
  • 4. Summary
  • Chapter Review Questions/Exercises
  • Exercise
  • References
  • 13. Optical Wireless Security / Scott R. Ellis
  • 1. Optical Wireless Systems Overview
  • 2. Deployment Architectures
  • 3. High Bandwidth
  • 4. Low Cost
  • 5. Implementation
  • 6. Surface Area
  • 7. Summary
  • Chapter Review Questions/Exercises
  • Exercise.