Book description
Network and System Security provides focused coverage of network and system security technologies. It explores practical solutions to a wide range of network and systems security issues. Chapters are authored by leading experts in the field and address the immediate and long-term challenges in the authors’ respective areas of expertise. Coverage includes building a secure organization, cryptography, system intrusion, UNIX and Linux security, Internet security, intranet security, LAN security; wireless network security, cellular network security, RFID security, and more.
- Chapters contributed by leaders in the field covering foundational and practical aspects of system and network security, providing a new level of technical expertise not found elsewhere
- Comprehensive and updated coverage of the subject area allows the reader to put current technologies to work
- Presents methods of analysis and problem solving techniques, enhancing the reader’s grasp of the material and ability to implement practical solutions
Table of contents
- Cover image
- Title page
- Table of Contents
- Copyright
- Dedication
- Acknowledgements
- About the Editor
- Contributors
- Introduction
-
Chapter 1. Detecting System Intrusions
- 1 Introduction
- 2 Monitoring Key Files in the System
- 3 Security Objectives
- 4 0day Attacks
- 5 Good Known State
- 6 Rootkits
- 7 Low Hanging Fruit
- 8 Antivirus Software
- 9 Homegrown Intrusion Detection
- 10 Full-Packet Capture Devices
- 11 Out-of-Band Attack Vectors
- 12 Security Awareness Training
- 13 Data Correlation
- 14 SIEM
- 15 Other Weird Stuff on the System
- 16 Detection
- 17 Network-Based Detection of System Intrusions (DSIs)
- 18 Summary
- Chapter Review Questions/Exercises
- Exercise
- References
-
Chapter 2. Preventing System Intrusions
- 1 So, What is an Intrusion?
- 2 Sobering Numbers
- 3 Know Your Enemy: Hackers versus Crackers
- 4 Motives
- 5 The Crackers’ Tools of the Trade
- 6 Bots
- 7 Symptoms of Intrusions
- 8 What Can You Do?
- 9 Security Policies
- 10 Risk Analysis
- 11 Tools of Your Trade
- 12 Controlling User Access
- 13 Intrusion Prevention Capabilities
- 14 Summary
- Chapter Review Questions/Exercises
- Exercise
- Chapter 3. Guarding Against Network Intrusions
-
Chapter 4. Securing Cloud Computing Systems
- 1 Cloud Computing Essentials: Examining the Cloud Layers
- 2 Software as a Service (SaaS): Managing Risks in the Cloud
- 3 Platform as a Service (PaaS): Securing the Platform
- 4 Infrastructure as a Service (IaaS)
- 5 Leveraging Provider-Specific Security Options
- 6 Achieving Security in a Private Cloud
- 7 Meeting Compliance Requirements
- 8 Preparing for Disaster Recovery
- 9 Summary
- Chapter Review Questions/Exercises
- Exercise
- References
-
Chapter 5. Unix and Linux Security
- 1 Unix and Security
- 2 Basic Unix Security Overview
- 3 Achieving Unix Security
- 4 Protecting User Accounts and Strengthening Authentication
- 5 Limiting Superuser Privileges
- 6 Securing Local and Network File Systems
- 7 Network Configuration
- 8 Improving the Security of Linux and Unix Systems
- 9 Additional Resources
- 10 Summary
- Chapter Review Questions/Exercises
- Exercise
- Chapter 6. Eliminating the Security Weakness of Linux and Unix Operating Systems
- Chapter 7. Internet Security
-
Chapter 8. Intranet Security
- 1 Smartphones and Tablets in the Intranet
- 2 Security Considerations
- 3 Plugging the Gaps: NAC and Access Control
- 4 Measuring Risk: Audits
- 5 Guardian at the Gate: Authentication and Encryption
- 6 Wireless Network Security
- 7 Shielding the Wire: Network Protection
- 8 Weakest Link in Security: User Training
- 9 Documenting the Network: Change Management
- 10 Rehearse the Inevitable: Disaster Recovery
- 11 Controlling Hazards: Physical and Environmental Protection
- 12 Know Your Users: Personnel Security
- 13 Protecting Data Flow: Information and System Integrity
- 14 Security Assessments
- 15 Risk Assessments
- 16 Intranet Security Implementation Process Checklist
- 17 Summary
- Chapter Review Questions/Exercises
- Exercise
-
Chapter 9. Local Area Network Security
- 1 Identify Network Threats
- 2 Establish Network Access Controls
- 3 Risk Assessment
- 4 Listing Network Resources
- 5 Threats
- 6 Security Policies
- 7 The Incident-Handling Process
- 8 Secure Design Through Network Access Controls
- 9 IDS Defined
- 10 NIDS: Scope and Limitations
- 11 A Practical Illustration of NIDS
- 12 Firewalls
- 13 Dynamic NAT Configuration
- 14 The Perimeter
- 15 Access List Details
- 16 Types of Firewalls
- 17 Packet Filtering: IP Filtering Routers
- 18 Application-Layer Firewalls: Proxy Servers
- 19 Stateful Inspection Firewalls
- 20 NIDS Complements Firewalls
- 21 Monitor and Analyze System Activities
- 22 Signature Analysis
- 23 Statistical Analysis
- 24 Signature Algorithms
- 25 Local Area Network Security Countermeasures Implementation Checklist
- 26 Summary
- Chapter Review Questions/Exercises
- Exercise
- Chapter 10. Wireless Network Security
- Chapter 11. Cellular Network Security
- Chapter 12. RFID Security
- Chapter 13. Optical Wireless Security
- Index
Product information
- Title: Network and System Security, 2nd Edition
- Author(s):
- Release date: August 2013
- Publisher(s): Syngress
- ISBN: 9780124166950
You might also like
book
Computer Network Security
Developed in collaboration with a training and certification team from Cisco, Computer Network Security is an …
book
Practical Internet of Things Security - Second Edition
A practical, indispensable security guide that will navigate you through the complex realm of securely building …
book
Computer and Information Security Handbook, 3rd Edition
Computer and Information Security Handbook, Third Edition, provides the most current and complete reference on computer …
book
Firewalls Don't Stop Dragons: A Step-by-Step Guide to Computer Security and Privacy for Non-Techies
Rely on this practical, end-to-end guide on cyber safety and privacy written expressly for a non-technical …