Protect Your Windows Network: From Perimeter to Data (Paperback)
暫譯: 保護您的 Windows 網路:從邊界到數據
Jesper M. Johansson, Steve Riley
- 出版商: Addison Wesley
- 出版日期: 2005-05-30
- 定價: $2,150
- 售價: 6.0 折 $1,290
- 語言: 英文
- 頁數: 608
- 裝訂: Paperback
- ISBN: 0321336437
- ISBN-13: 9780321336439
立即出貨(限量) (庫存=3)
買這商品的人也買了...
-
$480$408 -
$720$612 -
$2,040$1,938 -
$550$468 -
$550$468 -
$680$578 -
$490$382 -
$540$427 -
$650$507 -
$450$383 -
$250$165 -
$680$578 -
$460$391 -
$620$527 -
$480$408 -
$880$748 -
$780$663 -
$580$493 -
$620$490 -
$1,170Database in Depth (Paperback)
-
$980$980 -
$820$697 -
$550$523 -
$880$695 -
$650$507
相關主題
商品描述
Description:
Acknowledgments.
About the Authors.
Preface.
I. INTRODUCTION AND FUNDAMENTALS.
1. Introduction to Network Protection.
Why Would Someone Attack Me?
Nobody Will Ever Call You to Tell You How Well the Network Is Working
Introduction to the Defense-in-Depth Model
The Defender's Dilemma
Summary
What You Should Do Today
2. Anatomy of a Hack-The Rise and Fall of Your Network.
What a Penetration Test Will Not Tell You
Why You Need To Understand Hacking
Target Network
Network Footprinting
Initial Compromise
Elevating Privileges
Hacking Other Machines
Taking Over the Domain
Post-mortem
How to Get an Attacker Out of Your Network
Summary
What You Should Do Today
3. Rule Number 1: Patch Your Systems.
Patches Are a Fact of Life
Exercise Good Judgment
What Is a Patch?
Patch Management Is Risk Management
Tools to Manage Security Updates
Advanced Tips and Tricks
Slipstreaming
Summary
What You Should Do Today
II. POLICIES, PROCEDURES, AND USER AWARENESS.
4. Developing Security Policies.
Who Owns Developing Security Policy
What a Security Policy Looks Like
Why a Security Policy Is Necessary
Why So Many Security Policies Fail
Analyzing Your Security Needs to Develop _Appropriate Policies
How to Make Users Aware of Security Policies
Procedures to Enforce Policies
Dealing with Breaches of Policy
More Information
Summary
What You Should Do Today
5. Educating Those Pesky Users.
System Administration ? Security Administration
Securing People
The Problem
Protecting People
Plausibility + Dread + Novelty = Compromise
Things You Should Do Today
III. PHYSICAL AND PERIMETER SECURITY: THE FIRST LINE OF DEFENSE.
6. If You Do Not Have Physical Security, You Do Not Have Security.
But First, a Story
It's a Fundamental Law of Computer Security
The Importance of Physical Access Controls
Protecting Client PCs
The Case of the Stolen Laptop
The Family PC
No Security, Physical or Otherwise, Is Completely Foolproof
Things You Should Do Today
7. Protecting Your Perimeter.
The Objectives of Information Security
The Role of the Network
Start with (What's Left of) Your Border
Next, Use the Right Firewall
Then, Consider Your Remote Access Needs
Finally, Start Thinking About "Deperimeterization"
Things You Should Do Today
IV. PROTECTING YOUR NETWORK INSIDE THE PERIMETER.
8. Security Dependencies.
Introduction to Security Dependencies
Administrative Security Dependencies
Service Account Dependencies
Mitigating Service and Administrative Dependencies
Other Security Dependencies
Summary
What You Should Do Today
9. Network Threat Modeling.
Network Threat Modeling Process
Document Your Network
Segment Your Network
Restrict Access to Your Network
Summary
What You Should Do Today
10. Preventing Rogue Access Inside the Network.
The Myth of Network Sniffing
Network Protection at Layers 2 and 3
Using 802.1X for Network Protection
Using IPsec for Network Protection
Network Quarantine Systems
Summary
What You Should Do Today
11. Passwords and Other Authentication Mechanisms-The Last Line of Defense.
Introduction
Password Basics
Password History
What Administrators Need to Know About Passwords
Password Best Practices
Recommended Password Policy
Better Than Best Practices-Multifactor Authentication
Summary
What You Should Do Today
V. PROTECTING HOSTS.
12. Server and Client Hardening.
Security Configuration Myths
On to the Tweaks
Top 10 (or so) Server Security Tweaks
Top 10 (or so) Client Security Tweaks
The Caution List-Changes You Should Not Make
Security Configuration Tools
Summary
What You Should Do Today
VI. PROTECTING APPLICATIONS.
13. Protecting User Applications.
Patch Them!
Make Them Run As a Nonadmin
Turn Off Functionality
Restrict Browser Functionality
Attachment Manager
Spyware
Security Between Chair and Keyboard (SeBCAK)
Summary
What You Should Do Today
14. Protecting Services and Server Applications.
You Need a Healthy Disrespect for Your Computer
Rule 1: All Samples Are Evil
Three Steps to Lowering the Attack Surface
What About Service Accounts?
Privileges Your Services Do Not Need
Hardening SQL Server 2000
Hardening IIS 5.0 and 6.0
Summary
What You Should Do Today
15. Security for Small Businesses.
Protect Your Desktops and Laptops
Protect Your Servers
Protect Your Network
Keep Your Data Safe
Use the Internet Safely
Small Business Security Is No Different, Really
What You Should Do Today
16. Evaluating Application Security.
Caution: More Software May Be Hazardous to Your Network Health
Baseline the System
Things to Watch Out For
Summary
What You Should Do Today
VII. PROTECTING DATA.
17. Data-Protection Mechanisms.
Security Group Review
Access Control Lists
Layers of Access Control
Access Control Best Practices
Rights Management Systems
Incorporating Data Protection into Your Applications
Protected Data: Our Real Goal
What You Should Do Today
Appendix A: How to Get Your Network Hacked in 10 Easy Steps.
Appendix B: Script To Revoke SQL Server PUBLIC Permissions.
Appendix C. HOSTS file to Block Spyware.
Appendix D. Password Generator Tool.
-g (Generate Password Based on Known Input)
-r (Generate Random Password)
-s (Set a Password on an Account and/or Service)
Security Information
Usage Scenarios
Appendix E: 10 Immutable Laws of Security.
Law #1: If a bad guy can persuade you to run his program on your computer, it's not your computer anymore.
Law #2: If a bad guy can alter the operating system on your computer, it's not your computer anymore.
Law #3: If a bad guy has unrestricted physical access to your computer, it's not your computer anymore.
Law #4: -If you allow a bad guy to upload programs to your Web site, it's not your Web site any more.
Law #5: Weak passwords trump strong security.
Law #6: A computer is only as secure as the administrator is trustworthy. Law #7: Encrypted data is only as secure as the decryption key.
Law #8: An out-of-date virus scanner is only marginally better than no virus scanner at all.
Law #9: Absolute anonymity isn't practical, in real life or on the Web. Law #10: Technology is not a panacea.
Index.
商品描述(中文翻譯)
描述:
致謝。
關於作者。
前言。
I. 介紹與基本原理。
1. 網路保護介紹。
為什麼會有人攻擊我?
沒有人會打電話告訴你網路運作得多好。
深度防禦模型介紹。
防禦者的困境。
總結。
今天你應該做的事。
2. 駭客的解剖—你的網路的興衰。
滲透測試不會告訴你的事。
為什麼你需要了解駭客行為。
目標網路。
網路足跡。
初步妥協。
提升權限。
駭客入侵其他機器。
接管域名。
事後分析。
如何將攻擊者驅逐出你的網路。
總結。
今天你應該做的事。
3. 規則第一:修補你的系統。
修補是生活的一部分。
行使良好的判斷。
什麼是修補?
修補管理即風險管理。
管理安全更新的工具。
進階提示與技巧。
滑流修補。
總結。
今天你應該做的事。
II. 政策、程序與用戶意識。
4. 制定安全政策。
誰負責制定安全政策。
安全政策的樣子。
為什麼安全政策是必要的。
為什麼這麼多安全政策失敗。
分析你的安全需求以制定適當的政策。
如何讓用戶意識到安全政策。
執行政策的程序。
處理政策違規的方式。
更多資訊。
總結。
今天你應該做的事。
5. 教育那些麻煩的用戶。
系統管理?安全管理。
保護人員。
問題。
保護人員。
可信度 + 恐懼 + 新穎性 = 妥協。
今天你應該做的事。
III. 實體與邊界安全:第一道防線。
6. 如果你沒有實體安全,你就沒有安全。
但首先,講一個故事。
這是電腦安全的一條基本法則。
實體訪問控制的重要性。
保護客戶端電腦。
被盜筆記型電腦的案例。
家庭電腦。
沒有任何安全措施,無論是實體的還是其他的,都是完全萬無一失的。
今天你應該做的事。
7. 保護你的邊界。
資訊安全的目標。
網路的角色。
從(剩下的)邊界開始。
接下來,使用合適的防火牆。
然後,考慮你的遠端訪問需求。
最後,開始思考「去邊界化」。
今天你應該做的事。
IV. 保護你在邊界內的網路。
8. 安全依賴性。
安全依賴性的介紹。
行政安全依賴性。
服務帳戶依賴性。
減輕服務和行政依賴性。
其他安全依賴性。
總結。
今天你應該做的事。
9. 網路威脅建模。
網路威脅建模過程。
記錄你的網路。
分段你的網路。
限制對你的網路的訪問。
總結。
今天你應該做的事。
10. 防止網路內的惡意訪問。
網路嗅探的神話。
在第2層和第3層的網路保護。
使用802.1X進行網路保護。
使用IPsec進行網路保護。
網路隔離系統。
總結。
今天你應該做的事。
11. 密碼和其他身份驗證機制—最後一道防線。
介紹。