Protect Your Windows Network: From Perimeter to Data (Paperback)
暫譯: 保護您的 Windows 網路:從邊界到數據

Jesper M. Johansson, Steve Riley

  • 出版商: Addison Wesley
  • 出版日期: 2005-05-30
  • 定價: $2,150
  • 售價: 6.0$1,290
  • 語言: 英文
  • 頁數: 608
  • 裝訂: Paperback
  • ISBN: 0321336437
  • ISBN-13: 9780321336439
  • 立即出貨(限量) (庫存=3)

買這商品的人也買了...

相關主題

商品描述

Description:

Acknowledgments.

About the Authors.

Preface.

I. INTRODUCTION AND FUNDAMENTALS.

1. Introduction to Network Protection.

    Why Would Someone Attack Me?

    Nobody Will Ever Call You to Tell You How Well the Network Is Working

    Introduction to the Defense-in-Depth Model

    The Defender's Dilemma

    Summary

    What You Should Do Today

2. Anatomy of a Hack-The Rise and Fall of Your Network.

    What a Penetration Test Will Not Tell You

    Why You Need To Understand Hacking

    Target Network

    Network Footprinting

    Initial Compromise

    Elevating Privileges

    Hacking Other Machines

    Taking Over the Domain

    Post-mortem

    How to Get an Attacker Out of Your Network

    Summary

    What You Should Do Today

3. Rule Number 1: Patch Your Systems.

    Patches Are a Fact of Life

    Exercise Good Judgment

    What Is a Patch?

    Patch Management Is Risk Management

    Tools to Manage Security Updates

    Advanced Tips and Tricks

    Slipstreaming

    Summary

    What You Should Do Today

II. POLICIES, PROCEDURES, AND USER AWARENESS.

4. Developing Security Policies.

    Who Owns Developing Security Policy

    What a Security Policy Looks Like

    Why a Security Policy Is Necessary

    Why So Many Security Policies Fail

    Analyzing Your Security Needs to Develop _Appropriate Policies

    How to Make Users Aware of Security Policies

    Procedures to Enforce Policies

    Dealing with Breaches of Policy

    More Information

    Summary

    What You Should Do Today

5. Educating Those Pesky Users.

    System Administration ? Security Administration

    Securing People

    The Problem

    Protecting People

    Plausibility + Dread + Novelty = Compromise

    Things You Should Do Today

III. PHYSICAL AND PERIMETER SECURITY: THE FIRST LINE OF DEFENSE.

6. If You Do Not Have Physical Security, You Do Not Have Security.

    But First, a Story

    It's a Fundamental Law of Computer Security

    The Importance of Physical Access Controls

    Protecting Client PCs

    The Case of the Stolen Laptop

    The Family PC

    No Security, Physical or Otherwise, Is Completely Foolproof

    Things You Should Do Today

7. Protecting Your Perimeter.

    The Objectives of Information Security

    The Role of the Network

    Start with (What's Left of) Your Border

    Next, Use the Right Firewall

    Then, Consider Your Remote Access Needs

    Finally, Start Thinking About "Deperimeterization"

    Things You Should Do Today

IV. PROTECTING YOUR NETWORK INSIDE THE PERIMETER.

8. Security Dependencies.

    Introduction to Security Dependencies

    Administrative Security Dependencies

    Service Account Dependencies

    Mitigating Service and Administrative Dependencies

    Other Security Dependencies

    Summary

    What You Should Do Today

9. Network Threat Modeling.

    Network Threat Modeling Process

    Document Your Network

    Segment Your Network

    Restrict Access to Your Network

    Summary

    What You Should Do Today

10. Preventing Rogue Access Inside the Network.

    The Myth of Network Sniffing

    Network Protection at Layers 2 and 3

    Using 802.1X for Network Protection

    Using IPsec for Network Protection

    Network Quarantine Systems

    Summary

    What You Should Do Today

11. Passwords and Other Authentication Mechanisms-The Last Line of Defense.

    Introduction

    Password Basics

    Password History

    What Administrators Need to Know About Passwords

    Password Best Practices

    Recommended Password Policy

    Better Than Best Practices-Multifactor Authentication

    Summary

    What You Should Do Today

V. PROTECTING HOSTS.

12. Server and Client Hardening.

    Security Configuration Myths

    On to the Tweaks

    Top 10 (or so) Server Security Tweaks

    Top 10 (or so) Client Security Tweaks

    The Caution List-Changes You Should Not Make

    Security Configuration Tools

    Summary

    What You Should Do Today

VI. PROTECTING APPLICATIONS.

13. Protecting User Applications.

    Patch Them!

    Make Them Run As a Nonadmin

    Turn Off Functionality

    Restrict Browser Functionality

    Attachment Manager

    Spyware

    Security Between Chair and Keyboard (SeBCAK)

    Summary

    What You Should Do Today

14. Protecting Services and Server Applications.

    You Need a Healthy Disrespect for Your Computer

    Rule 1: All Samples Are Evil

    Three Steps to Lowering the Attack Surface

    What About Service Accounts?

    Privileges Your Services Do Not Need

    Hardening SQL Server 2000

    Hardening IIS 5.0 and 6.0

    Summary

    What You Should Do Today

15. Security for Small Businesses.

    Protect Your Desktops and Laptops

    Protect Your Servers

    Protect Your Network

    Keep Your Data Safe

    Use the Internet Safely

    Small Business Security Is No Different, Really

    What You Should Do Today

16. Evaluating Application Security.

    Caution: More Software May Be Hazardous to Your Network Health

    Baseline the System

    Things to Watch Out For

    Summary

    What You Should Do Today

VII. PROTECTING DATA.

17. Data-Protection Mechanisms.

    Security Group Review

    Access Control Lists

    Layers of Access Control

    Access Control Best Practices

    Rights Management Systems

    Incorporating Data Protection into Your Applications

    Protected Data: Our Real Goal

    What You Should Do Today

Appendix A: How to Get Your Network Hacked in 10 Easy Steps.

Appendix B: Script To Revoke SQL Server PUBLIC Permissions.

Appendix C. HOSTS file to Block Spyware.

Appendix D. Password Generator Tool.

    -g (Generate Password Based on Known Input)

    -r (Generate Random Password)

    -s (Set a Password on an Account and/or Service)

    Security Information

    Usage Scenarios

Appendix E: 10 Immutable Laws of Security.

    Law #1: If a bad guy can persuade you to run his program on your computer, it's not your computer anymore.

    Law #2: If a bad guy can alter the operating system on your computer, it's not your computer anymore.

    Law #3: If a bad guy has unrestricted physical access to your computer, it's not your computer anymore.

    Law #4: -If you allow a bad guy to upload programs to your Web site, it's not your Web site any more.

    Law #5: Weak passwords trump strong security.

    Law #6: A computer is only as secure as the administrator is trustworthy.     Law #7: Encrypted data is only as secure as the decryption key.

    Law #8: An out-of-date virus scanner is only marginally better than no virus scanner at all.

    Law #9: Absolute anonymity isn't practical, in real life or on the Web.     Law #10: Technology is not a panacea.

Index.

商品描述(中文翻譯)

描述:

致謝。

關於作者。

前言。

I. 介紹與基本原理。

1. 網路保護介紹。
為什麼會有人攻擊我?
沒有人會打電話告訴你網路運作得多好。
深度防禦模型介紹。
防禦者的困境。
總結。
今天你應該做的事。

2. 駭客的解剖—你的網路的興衰。
滲透測試不會告訴你的事。
為什麼你需要了解駭客行為。
目標網路。
網路足跡。
初步妥協。
提升權限。
駭客入侵其他機器。
接管域名。
事後分析。
如何將攻擊者驅逐出你的網路。
總結。
今天你應該做的事。

3. 規則第一:修補你的系統。
修補是生活的一部分。
行使良好的判斷。
什麼是修補?
修補管理即風險管理。
管理安全更新的工具。
進階提示與技巧。
滑流修補。
總結。
今天你應該做的事。

II. 政策、程序與用戶意識。

4. 制定安全政策。
誰負責制定安全政策。
安全政策的樣子。
為什麼安全政策是必要的。
為什麼這麼多安全政策失敗。
分析你的安全需求以制定適當的政策。
如何讓用戶意識到安全政策。
執行政策的程序。
處理政策違規的方式。
更多資訊。
總結。
今天你應該做的事。

5. 教育那些麻煩的用戶。
系統管理?安全管理。
保護人員。
問題。
保護人員。
可信度 + 恐懼 + 新穎性 = 妥協。
今天你應該做的事。

III. 實體與邊界安全:第一道防線。

6. 如果你沒有實體安全,你就沒有安全。
但首先,講一個故事。
這是電腦安全的一條基本法則。
實體訪問控制的重要性。
保護客戶端電腦。
被盜筆記型電腦的案例。
家庭電腦。
沒有任何安全措施,無論是實體的還是其他的,都是完全萬無一失的。
今天你應該做的事。

7. 保護你的邊界。
資訊安全的目標。
網路的角色。
從(剩下的)邊界開始。
接下來,使用合適的防火牆。
然後,考慮你的遠端訪問需求。
最後,開始思考「去邊界化」。
今天你應該做的事。

IV. 保護你在邊界內的網路。

8. 安全依賴性。
安全依賴性的介紹。
行政安全依賴性。
服務帳戶依賴性。
減輕服務和行政依賴性。
其他安全依賴性。
總結。
今天你應該做的事。

9. 網路威脅建模。
網路威脅建模過程。
記錄你的網路。
分段你的網路。
限制對你的網路的訪問。
總結。
今天你應該做的事。

10. 防止網路內的惡意訪問。
網路嗅探的神話。
在第2層和第3層的網路保護。
使用802.1X進行網路保護。
使用IPsec進行網路保護。
網路隔離系統。
總結。
今天你應該做的事。

11. 密碼和其他身份驗證機制—最後一道防線。
介紹。