Network Security First-Step
暫譯: 網路安全入門
Thomas M. Thomas
- 出版商: Cisco Press
- 出版日期: 2004-05-31
- 售價: $1,520
- 貴賓價: 9.5 折 $1,444
- 語言: 英文
- 頁數: 480
- 裝訂: Paperback
- ISBN: 1587200996
- ISBN-13: 9781587200991
-
相關分類:
資訊安全
已過版
買這商品的人也買了...
-
$880$695 -
$590$466 -
$2,710$2,575 -
$850$672 -
$720$569 -
$1,548Core Servlets and JavaServer Pages, Vol. 1: Core Technologies, 2/e
-
$2,540$2,413 -
$560$476 -
$850$723 -
$750$593 -
$620$490 -
$1,176Computer Organization and Design: The Hardware/Software Interface, 3/e(IE) (美國版ISBN:1558606041)
-
$2,540$2,413 -
$650$507 -
$2,800$2,660 -
$1,250$1,225 -
$2,210$2,100 -
$620$527 -
$580$452 -
$680$646 -
$650$507 -
$400$360 -
$780$741 -
$400$340 -
$750$593
相關主題
商品描述
Description:
Your first step into the world of network security
- No security experience required
- Includes clear and easily understood explanations
- Makes learning easy
Your first step to network security begins here!
- Learn about hackers and their attacks
- Understand security tools and technologies
- Defend your network with firewalls, routers, and other devices
- Explore security for wireless networks
- Learn how to prepare for security incidents
Welcome to the world of network security!
Computer networks are indispensable-but they're also not secure. With the proliferation of Internet viruses and worms, many people and companies are considering increasing their network security. But first, you need to make sense of this complex world of hackers, viruses, and the tools to combat them.
No security experience needed!
Network Security First-Step explains the basics of network security in easy-to-grasp language that all of us can understand. This book takes you on a guided tour of the core technologies that make up and control network security. Whether you are looking to take your first step into a career in network security or are interested in simply gaining knowledge of the technology, this book is for you!
Table of Contents:
1. Here There Be Hackers!
Essentials First: Looking for a Target. Hacking Innocent Information. Targets of Opportunity. Are You a Target of Opportunity? Targets of Choice. Are You a Target of Choice? The Process of an Attack. Reconnaissance and Footprinting (a.k.a. Casing the Joint). Scanning. Enumeration. Gaining Access. Application Attacks. Misconfiguration Attacks. Script Attacks. Escalating Privilege. Covering Tracks. Network Security Organizations. SANS. Center for Internet Security (CIS). SCORE. Internet Storm Center. ICAT Metabase. Security Focus. Learning from the Network Security Organizations. Overview of Common Attacks and Exploits. Chapter Summary. Chapter Review.2. Security Policies and Responses.
Defining Trust. Acceptable Use Policy. Policy Overview. Purpose. Scope General Use and Ownership. Security and Proprietary Information. Unacceptable Use. E-mail and Communications Activities. Enforcement. Conclusion. Password Policy. Overview. Purpose. Scope. General Policy. General Password Construction Guidelines. Password Protection Standards. Enforcement. Conclusion. Virtual Private Network (VPN) Security Policy. Scope. Policy. Conclusion. Extranet Connection Policy. Scope. Security Review. Third-Party Connection Agreement. Business Case. Point of Contact. Establishing Connectivity. Modifying or Changing Connectivity and Access. Terminating Access. Conclusion. ISO Certification and Security. Sample Security Policies on the Internet. Chapter Summary. Chapter Review.3. Overview of Security Technologies.
Security First Design Concepts. Packet Filtering via Access Control Lists (ACLs). Limitations of Packet Filtering. Stateful Packet Inspection (SPI). Detailed Packet Flow Using SPI. Limitations of Stateful Packet Inspection. Network Address Translation (NAT). NAT's Limitations. Proxies and Application Level Protection. Content Filters. Public Key Infrastructure (PKI). AAA Technologies. Authorization. Accounting. Remote Authentication Dial-In User Service (RADIUS). Terminal Access Controller Access Control System (TACACS). TACACS+ Versus RADIUS. Chapter Summary. Chapter Review Questions.4. Security Protocols.
DES Encryption. Limitations of DES. Triple DES Encryption. Limitations of 3DES. Message Digest 5 Algorithm. Point-to-Point Tunneling Protocol (PPTP). Limitations of PPTP. Layer 2 Tunneling Protocol (L2TP). Benefits of L2TP. L2TP Operation. Secure Shell (SSH). SSH Operation. Tunneling and Port Forwarding. Limitations of SSH. Chapter Summary. Chapter Review Questions.5. Firewalls.
Firewall Frequently Asked Questions. Why Do I Need a Firewall? Do I Have Anything Worth Protecting? What Does a Firewall Do? Firewalls Are "The Security Policy". Firewall Operational Overview. Implementing a Firewall. Determine the Inbound Access Policy. Determine Outbound Access Policy. Essentials First: Life in the DMZ. Case Studies. Case Study: Firewall Deployment with Mail Server Inside the Protected (Internal). Case Study: Firewall Deployment with Mail Server in DMZ. Firewall Limitations. Chapter Summary. Chapter Review Questions.6. Router Security.
Edge Router as a Choke Point. Edge Router as a Packet Inspector. Content-Based Packet Inspection. Intrusion Detection with Cisco IOS. When to Use the FFS IDS. FFS IDS Operational Overview. FFS Limitations. Secure IOS Template. Chapter Summary. Chapter Review Questions.7. IPSec Virtual Private Networks (VPNs).
Analogy: VPNs Connect IsLANds Securely. VPN Overview. VPN Benefits and Goals. VPN Implementation Strategies. Split Tunneling. Overview of IPSec VPNs. Tunneling Data. Encryption Modes. Transport Mode. IPSec Protocols. Internet Key Exchange (IKE). ISAKMP Overview. IPSec Operational Overview. IKE Phase 2. Diffie-Hellman Algorithm. Router Configuration as VPN Peer. Configuring IPSec. Step 2: Create the IPSec Transforms. Step 3: Create the Crypto Map. Step 4: Apply the Crypto Map to an Interface. Firewall VPN Configuration for Client Access. Chapter Summary. Chapter Review Questions.8. Wireless Security.
Essentials First: Wireless LANs. Benefits of Wireless LANs. Wireless Equals Radio Frequency. Wireless Networking. Coverage. Bandwidth Availability. WarGames Wirelessly. WarDriving. WarFlying. WarSpamming. WarSpying. Wireless Threats. Denial of Service Attacks. Rogue/Unauthorized Access Points. Incorrectly Configured Access Points. Network Abuses. Wireless Security. Device and Access Point Association. Wired Equivalent Privacy (WEP). MAC Address Filtering. Extensible Authentication Protocol (EAP). LEAP (EAP-Cisco). EAP-TLS EAP-TTLS. Essentials First: Wireless Hacking Tools. Wireless Packet Sniffers. AirSNORT. Chapter Summary. Chapter Review Questions.9. Intrusion Detection and Honeypots.
Essentials First: Intrusion Detection. IDS Functional Overview. Host Intrusion Detection System (HIDS). How Are Intrusions Detected? Protocol Analysis. Anomaly Detection. Signature/Pattern Matching. Log Analysis. Combining Methods. Intrusion Prevention. IPS Responses and Actions. IDS Products. Essentials First: Honeypots. Honeypot Limitations. Chapter Summary. Chapter Review Questions.10. Tools of the Trade.
Essentials First: Vulnerability Analysis. Fundamental Attacks. Packet Sniffers. Denial of Service (DoS) Attacks. Man-in-the-Middle Attacks. Back Doors. Miscellaneous Attacks. Security Assessments and Penetration Testing. Internal Vulnerability and Penetration Assessment. External Penetration and Vulnerability Assessment. Physical Security Assessment. Miscellaneous Assessments. Vulnerability Scanners. Features and Benefits of Vulnerability Scanners. Nessus. In Their Own Words. Scan and Detection Accuracy. Documentation and Support. Reporting. Vulnerability Updates. Retina. Scan and Detection Accuracy. Documentation and Support. Reporting. Vulnerability Updates. Penetration Testing Products. Scan and Detection Accuracy. Documentation. Documentation and Support. Vulnerability Updates. Core Impact In Action. Chapter Summary. Chapter Review Questions.Appendix A: Answers to Chapter Review Questions
商品描述(中文翻譯)
**描述:**
您的第一步進入網路安全的世界
- 不需要安全經驗
- 包含清晰且易於理解的解釋
- 讓學習變得簡單
您的網路安全之旅從這裡開始!
- 了解駭客及其攻擊
- 理解安全工具和技術
- 使用防火牆、路由器及其他設備保護您的網路
- 探索無線網路的安全性
- 學習如何為安全事件做好準備
歡迎來到網路安全的世界!
計算機網路是不可或缺的,但它們也不安全。隨著互聯網病毒和蠕蟲的激增,許多人和公司正在考慮增強其網路安全。但首先,您需要理解這個複雜的駭客、病毒及其對抗工具的世界。
不需要安全經驗!
《網路安全入門》用易於理解的語言解釋網路安全的基本概念,讓所有人都能理解。本書帶您參觀構成和控制網路安全的核心技術。無論您是希望在網路安全領域邁出第一步,還是僅僅想獲得技術知識,本書都適合您!
**目錄:**
1. 這裡有駭客!
- 基本要素:尋找目標。駭取無辜資訊。機會目標。您是機會目標嗎?選擇目標。您是選擇目標嗎?攻擊過程。偵查與足跡(即偵查)。掃描。枚舉。獲取訪問權限。應用攻擊。配置錯誤攻擊。腳本攻擊。提升權限。掩蓋痕跡。網路安全組織。SANS。互聯網安全中心(CIS)。SCORE。互聯網風暴中心。ICAT元數據庫。安全焦點。從網路安全組織學習。常見攻擊和利用概述。章節摘要。章節回顧。
2. 安全政策與回應。
- 定義信任。可接受使用政策。政策概述。目的。範圍。一般使用與擁有權。安全與專有資訊。不當使用。電子郵件與通訊活動。執行。結論。密碼政策。概述。目的。範圍。一般政策。一般密碼建構指導方針。密碼保護標準。執行。結論。虛擬私人網路(VPN)安全政策。範圍。政策。結論。外部網路連接政策。範圍。安全審查。第三方連接協議。商業案例。聯絡人。建立連接。修改或變更連接和訪問。終止訪問。結論。ISO認證與安全。網路上的安全政策範本。章節摘要。章節回顧。
3. 安全技術概述。
- 安全優先設計概念。通過訪問控制列表(ACL)進行封包過濾。封包過濾的限制。狀態封包檢查(SPI)。使用SPI的詳細封包流。狀態封包檢查的限制。網路地址轉換(NAT)。NAT的限制。代理和應用層保護。內容過濾器。公鑰基礎設施(PKI)。AAA技術。授權。會計。遠端身份驗證撥號用戶服務(RADIUS)。終端訪問控制器訪問控制系統(TACACS)。TACACS+與RADIUS的比較。章節摘要。章節回顧問題。
4. 安全協議。
- DES加密。DES的限制。三重DES加密。3DES的限制。訊息摘要5算法。點對點隧道協議(PPTP)。PPTP的限制。第二層隧道協議(L2TP)。L2TP的好處。L2TP操作。安全外殼(SSH)。SSH操作。隧道和端口轉發。SSH的限制。章節摘要。章節回顧問題。
5. 防火牆。
- 防火牆常見問題。為什麼我需要防火牆?我有值得保護的東西嗎?防火牆的作用是什麼?防火牆是「安全政策」。防火牆操作概述。實施防火牆。確定入站訪問政策。確定出站訪問政策。基本要素:DMZ中的生活。案例研究。案例研究:在受保護(內部)內部部署郵件伺服器的防火牆。案例研究:在DMZ中部署郵件伺服器的防火牆。防火牆的限制。章節摘要。章節回顧問題。
6. 路由器安全。
- 邊緣路由器作為瓶頸。邊緣路由器作為封包檢查器。基於內容的封包檢查。使用Cisco IOS的入侵檢測。何時使用FFS IDS。FFS IDS操作概述。FFS的限制。安全IOS範本。章節摘要。章節回顧問題。
7. IPSec虛擬私人網路(VPN)。
- 類比:VPN安全地連接島嶼。VPN概述。VPN的好處和目標。VPN實施策略。分割隧道。IPSec VPN概述。隧道數據。加密模式。傳輸模式。IPSec協議。互聯網密鑰交換(IKE)。ISAKMP概述。IPSec操作概述。IKE第二階段。Diffie-Hellman算法。路由器配置作為VPN對等體。配置IPSec。步驟2:創建IPSec轉換。步驟3:創建加密映射。步驟4:將加密映射應用於接口。防火牆VPN配置以供客戶訪問。章節摘要。章節回顧問題。
8. 無線安全。
- 基本要素:無線局域網。無線局域網的好處。無線等於無線頻率。無線網路。覆蓋範圍。帶寬可用性。無線戰爭遊戲。WarDriving。WarFlying。WarSpamming。WarSpying。無線威脅。拒絕服務攻擊。惡意/未授權接入點。配置錯誤的接入點。網路濫用。無線安全。設備和接入點關聯。有線等效隱私(WEP)。MAC地址過濾。可擴展身份驗證協議(EAP)。LEAP(EAP-Cisco)。EAP-TLS EAP-TTLS。基本要素:無線駭客工具。無線封包嗅探器。AirSNORT。章節摘要。章節回顧問題。
9. 入侵檢測與蜜罐。
- 基本要素:入侵檢測。IDS功能概述。主機入侵檢測系統(HIDS)。如何檢測入侵?協議分析。異常檢測。簽名/模式匹配。日誌分析。結合方法。入侵預防。IPS回應與行動。IDS產品。基本要素:蜜罐。蜜罐的限制。章節摘要。章節回顧問題。
10. 行業工具。
- 基本要素:漏洞分析。基本攻擊。封包嗅探器。拒絕服務(DoS)攻擊。中間人攻擊。後門。其他攻擊。安全評估與滲透測試。內部漏洞與滲透評估。外部滲透與漏洞評估。物理安全評估。其他評估。漏洞掃描器。漏洞掃描器的特徵與好處。Nessus。用他們自己的話說。掃描與檢測準確性。文檔與支持。報告。漏洞更新。Retina。掃描與檢測準確性。文檔與支持。報告。漏洞更新。滲透測試產品。掃描與檢測準確性。文檔。文檔與支持。漏洞更新。Core Impact的實際應用。章節摘要。章節回顧問題。
附錄A:章節回顧問題的答案