security sage’s guide to hardening the network infrastructure

545 348 0
security sage’s guide to hardening the network infrastructure

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

Thông tin tài liệu

[...]... of the topics cov­ ered in Special Ops warranted an entire book .To satisfy this need, we have cre­ ated the exciting new series entitled: Security Sage’s Guides Security Sage’s Guide to Hardening the Network Infrastructure is the first book in this series; concentrating on the bottom OSI layers that provide a solid founda­ tion to any sound security posture .The next book in the series is Security Sage’s. .. that keep the corporate packets moving securely, day after day The good news is that everyone is finally thinking about security; now is our time to execute Security Sage’s Guide to Hardening the Network Infrastructure is dedicated to delivering the most up -to- date network layer attacks and mitiga­ tion techniques across a wide assortment of vendors, and not just the typical attention paid to market... and the network protocols that utilize them .The goal was to create a readable and usable book that would empower its readers to mitigate risk by reducing attack vectors, remediation of known vulnerabilities, and segmenting critical assets from known threats Security Sage’s Guide to Hardening the Network Infrastructure is xxvii xxviii Foreword an indispensable reference for anyone responsible for the. .. to Improve Security 306 Patching the Switch 306 Securing Unused Ports 308 Adding Passwords to the Switch 308 Port Mirroring 308 Remote Management 309 Remote Monitoring 310 Simple Network Management Protocol 310 Other Protocols 311 Setting the Time 312 Using VLANs for Security 312 Using Multilayer Switching (MLS) for Security 312 Choosing the Right Switch 313 Understanding the Layers of the Campus Network. .. and administrators while reducing their usability to increase their security A great network doesn’t just happen—but a bad one does Some of the worst network designs have reared their ugly heads because of a lack of forethought as to how the network should ultimately look Instead, someone said, ‘Get these machines on the network as cheaply and quickly as possible.’ —Chapter 11 “Internal Network Design”... Security Sage’s Guides aim to deliver you the information you need to fight host and network negligence Drawing from their extensive real world experiences and showcasing their successes as well as their failures, Steven Andrés and Brian Kenyon provide the reader with a comprehensive tactical and strategic guide to securing the core of the network infrastructure. This book details how to attack, defend... physical environment to another untrusted network, such as the Internet A good example could be a network that is attached to the external interface of your firewall and connects to the external interface of you ISP’s router In this scenario, the network is untrusted from the standpoint of your organization because it is ultimately controlled by the ISP This definition could extend to other network segments... security Over the past two years, network based worms opened the eyes of execu­ tives in boardrooms around the globe From management’s perspective; the security of a corporate network can exist in two states; working and not working When business operations halt due to a security issue, management is forced to re-assess the funds and resources they allocated to ensure they are adequately protecting their critical... because the administrator didn’t bother to change the password for the Oracle user account Our running joke was something about how all you needed to know to hack UNIX was oracle:oracle After each engagement I would carefully document my findings and deliver them as draft to my manager or the regional partner for inclusion in the audit report.What a joke Did my ineffective security control findings cause the. .. created the book Special Ops: Host and Network Security for Microsoft, UNIX and Oracle, I attempted to include a chapter to cover each common yet critical component of a corporate network More specifically, I coined the phrase internal network security; which was really just an asset-centric approach to securing your hosts and networks from the inside-out After the release of Special Ops it became clear (to . can do to make your job easier. 278_SSage_Inf_FM.qxd 3/30/04 11:43 AM Page ii 278_SSage_Inf_FM.qxd 3/30/04 11:43 AM Page iii Hardening the Network Infrastructure Guide to SECURITY SAGE’S. Street Rockland, MA 02370 Security Sage’s Guide to Hardening the Network Infrastructure Copyright © 2004 by Syngress Publishing, Inc. All rights reserved. Printed in the United States of America updates to customers and worldwide partners. Prior to Foundstone, Steven designed secure networks for the managed hosting division of the largest, private Tier-1 Internet Service Provider in the

Ngày đăng: 06/07/2014, 15:28

Từ khóa liên quan

Mục lục

  • Security Sage's Guide to Hardening the Network Infrastructure

    • Cover

    • Contents

    • Foreword

    • Chapter 1 Defining Perimeter and Internal Segments

    • Chapter 2 Assessing Your Current Networks

    • Chapter 3 Selecting the Correct Firewall

    • Chapter 4 Firewall Manipulation Manipulation: Attacks and Defenses :

    • Chapter 5 Routing Devices and Protocols

    • Chapter 6 Secure Network Management

    • Chapter 7 Network Switching

    • Chapter 8 Defending Routers and Switches

    • Chapter 9 Implementing Intrusion Detection Systems

    • Chapter 10 Perimeter Network Design

    • Index

    • Team DDU

Tài liệu cùng người dùng

  • Đang cập nhật ...

Tài liệu liên quan