Cover image for Network Security Foundations : Technology Fundamentals for IT Success.
Network Security Foundations : Technology Fundamentals for IT Success.
Title:
Network Security Foundations : Technology Fundamentals for IT Success.
Author:
Strebe, Matthew.
ISBN:
9780782151367
Personal Author:
Edition:
1st ed.
Physical Description:
1 online resource (333 pages)
Contents:
Foundations Network Security -- Frontmatter -- Acknowledgments -- Contents -- Introduction -- Chapter 1: Security Principles -- Why Computers Aren't Secure -- The History of Computer Security -- -1945 -- 1945-1955 -- 1955-1965 -- 1965-1975 -- 1975-1985 -- 1985-1995 -- 1995-2005 -- 2005- -- Security Concepts -- Trust -- Authentication -- Chain of Authority -- Accountability -- Access Control -- Terms to Know -- Review Questions -- Chapter 2: Understanding Hacking -- What Is Hacking? -- Types of Hackers -- Security Experts -- Script Kiddies -- Underemployed Adult Hackers -- Ideological Hackers -- Criminal Hackers -- Corporate Spies -- Disgruntled Employees -- Vectors That Hackers Exploit -- Direct Intrusion -- Dial-Up -- Internet -- Wireless -- Hacking Techniques -- Target Selection -- Information Gathering -- Attacks -- Terms to Know -- Review Questions -- Chapter 3: Encryption and Authentication -- Encryption -- Secret Key Encryption -- One-Way Functions (Hashes) -- Public Key Encryption -- Hybrid Cryptosystems -- Authentication -- Password Authentication -- Session Authentication -- Public Key Authentication -- Certificate-Based Authentication -- Biometric Authentication -- Terms to Know -- Review Questions -- Chapter 4: Managing Security -- Developing a Security Policy -- Creating a Policy Requirements Outline -- Security Policy Best Practices -- Implementing Security Policy -- Applying Automated Policy -- Human Security -- Updating the Security Policy -- The Security Cycle -- Terms to Know -- Review Questions -- Chapter 5: Border Security -- Principles of Border Security -- Understanding Firewalls -- Fundamental Firewall Functions -- Firewall Privacy Services -- Virtual Private Networks -- Other Border Services -- Selecting a Firewall -- Terms to Know -- Review Questions -- Chapter 6: Virtual Private Networks.

Virtual Private Networking Explained -- IP Encapsulation -- Cryptographic Authentication -- Data Payload Encryption -- Characteristics of VPNs -- Common VPN Implementations -- IPSec -- L2TP -- PPTP -- PPP/SSL or PPP/SSH -- VPN Best Practices -- Terms to Know -- Review Questions -- Chapter 7: Securing Remote and Home Users -- The Remote Security Problem -- Virtual Private Security Holes -- Laptops -- Protecting Remote Machines -- VPN Connections -- Data Protection and Reliability -- Backups and Archiving -- Protecting against Remote Users -- Terms to Know -- Review Questions -- Chapter 8: Malware and Virus Protection -- Understanding Malware -- Understanding Viruses -- Virus Protection -- Prevention -- Natural Immunity -- Active Protection -- Understanding Worms and Trojan Horses -- Protecting Against Worms -- Implementing Virus Protection -- Client Virus Protection -- Server-Based Virus Protection -- E-Mail Gateway Virus Protection -- Firewall-Based Virus Protection -- Enterprise Virus Protection -- Terms to Know -- Review Questions -- Chapter 9: Creating Fault Tolerance -- Causes for Loss -- Human Error -- Routine Failure Events -- Crimes -- Environmental Events -- Fault Tolerance Measures -- Backups -- Uninterruptible Power Supplies (UPSs) and Power Generators -- Redundant Array of Independent Disks (RAID) -- Permissions -- Border Security -- Auditing -- Offsite Storage -- Archiving -- Deployment Testing -- Circuit Redundancy -- Physical Security -- Clustered Servers -- Terms to Know -- Review Questions -- Chapter 10: Windows Security -- Windows Local Security -- Security Identifiers -- Logging In -- Resource Access -- Objects and Permissions -- NTFS File System Permissions -- Encrypting File System (EFS) -- Windows Network Security -- Active Directory -- Kerberos Authentication and Domain Security -- Group Policy -- Share Security -- IPSec.

Terms to Know -- Review Questions -- Chapter 11: Securing Unix Servers -- A Brief History of Unix -- Unix Security Basics -- Understanding Unix File Systems -- User Accounts -- File System Security -- Access Control Lists -- Execution Permissions -- Terms to Know -- Review Questions -- Chapter 12: Unix Network Security -- Unix Network Security Basics -- Remote Logon Security -- Remote Access -- Pluggable Authentication Module (PAM) -- Distributed Logon -- Distributed passwd -- NIS and NIS+ -- Kerberos -- File Sharing Security -- File Transfer Protocol (FTP) -- Network File System (NFS) -- Hypertext Transfer Protocol (HTTP) -- Samba -- Firewalling Unix Machines -- IPTables and IPChains -- TCP Wrappers -- Firewall Toolkit (FWTK) -- Terms to Know -- Review Questions -- Chapter 13: Web Server Security -- Web Security Problems -- Implementing Web Server Security -- Common Security Solutions -- Apache Security -- Internet Information Services Security -- Terms to Know -- Review Questions -- Chapter 14: E-mail Security -- E-mail Encryption and Authentication -- S/MIME -- PGP -- Mail Forgery -- E-mail Viruses -- Outlook Viruses -- Commercial Gateway Virus Scanners -- AMaViS -- Attachment Security -- Strip All Attachments -- Allow Only Specific Attachments -- Strip Only Dangerous Attachments -- Foreign E-mail Servers -- Spam -- Authenticating SMTP -- Systemic Spam Prevention -- Terms to Know -- Review Questions -- Chapter 15: Intrusion Detection -- Intrusion Detection Systems -- Inspectors -- Decoys -- Auditors -- Available IDSs -- Windows System -- Tripwire -- Snort -- Demarc PureSecure -- NFR Network Intrusion Detector -- Terms to Know -- Review Questions -- Appendix A: Answers to Review Questions -- Chapter 1 -- Chapter 2 -- Chapter 3 -- Chapter 4 -- Chapter 5 -- Chapter 6 -- Chapter 7 -- Chapter 8 -- Chapter 9 -- Chapter 10 -- Chapter 11 -- Chapter 12.

Chapter 13 -- Chapter 14 -- Chapter 15 -- Glossary -- Index -- Numbers -- A -- B -- C -- D -- E -- F -- G -- H -- I -- J -- K -- L -- M -- N -- O -- P -- Q -- R -- S -- T -- U -- V -- W -- X -- Y -- Z.
Abstract:
The world of IT is always evolving, but in every area there are stable, core concepts that anyone just setting out needed to know last year, needs to know this year, and will still need to know next year. The purpose of the Foundations series is to identify these concepts and present them in a way that gives you the strongest possible starting point, no matter what your endeavor. Network Security Foundations provides essential knowledge about the principles and techniques used to protect computers and networks from hackers, viruses, and other threats. What you learn here will benefit you in the short term, as you acquire and practice your skills, and in the long term, as you use them. Topics covered include: Why and how hackers do what they do How encryption and authentication work How firewalls work Understanding Virtual Private Networks (VPNs) Risks posed by remote access Setting up protection against viruses, worms, and spyware Securing Windows computers Securing UNIX and Linux computers Securing Web and email servers Detecting attempts by hackers.
Local Note:
Electronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2017. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries.
Electronic Access:
Click to View
Holds: Copies: