Introduction to network security:
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
Boca Raton, Fla. [u.a.]
CRC Press
2009
|
Schriftenreihe: | Chapman & Hall/CRC computer and information science series
|
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis |
Beschreibung: | XXI, 478 S. graph. Darst. |
ISBN: | 9781584885436 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV022236314 | ||
003 | DE-604 | ||
005 | 20090121 | ||
007 | t | ||
008 | 070123s2009 d||| |||| 00||| eng d | ||
020 | |a 9781584885436 |9 978-1-58488-543-6 | ||
035 | |a (OCoLC)254528888 | ||
035 | |a (DE-599)BVBBV022236314 | ||
040 | |a DE-604 |b ger |e rakwb | ||
041 | 0 | |a eng | |
049 | |a DE-703 |a DE-355 | ||
050 | 0 | |a TK5105.59 | |
082 | 0 | |a 005.8 |2 22 | |
084 | |a ST 276 |0 (DE-625)143642: |2 rvk | ||
100 | 1 | |a Jacobson, Douglas |e Verfasser |4 aut | |
245 | 1 | 0 | |a Introduction to network security |c Douglas Jacobson |
264 | 1 | |a Boca Raton, Fla. [u.a.] |b CRC Press |c 2009 | |
300 | |a XXI, 478 S. |b graph. Darst. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
490 | 0 | |a Chapman & Hall/CRC computer and information science series | |
650 | 4 | |a Computer networks |x Security measures | |
650 | 4 | |a Computer security | |
650 | 0 | 7 | |a Rechnernetz |0 (DE-588)4070085-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Rechnernetz |0 (DE-588)4070085-9 |D s |
689 | 0 | 1 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | |C b |5 DE-604 | |
856 | 4 | 2 | |m Digitalisierung UB Regensburg |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=015447320&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
999 | |a oai:aleph.bib-bvb.de:BVB01-015447320 |
Datensatz im Suchindex
_version_ | 1804136226298527744 |
---|---|
adam_text | Contents
Preface
..............................................................xiii
Acknowledgments
...................................................xix
The Author
..........................................................xxi
Part I Introduction to Network Concepts and Threats
...............1
1
Network Architecture
..............................................3
1.1
Layered Network Architecture
...................................3
1.2
Overview of a Protocol
........................................12
1.3
Layered Network Model
.......................................15
Homework Problems and Lab Experiments
...........................20
References
........................................................21
2
Network Protocols
................................................23
2.1
Protocol Specifications
........................................23
2.2
Addresses
....................................................29
2.3
Headers
......................................................35
Homework Problems and Lab Experiments
...........................37
References
........................................................37
3
The Internet
......................................................39
3.1
Addressing
...................................................41
3.1.1
Address Spoofing
......................................45
3.1.2
IP Addresses
...........................................46
3.1.3
Host Name to IP Address Mapping
.......................47
3.2
Client-Server Model
...........................................49
3.3
Routing
......................................................54
Homework Problems and Lab Experiments
...........................57
References
........................................................59
vi
Contents
4
Taxonomy of Network-Based Vulnerabilities
.......................61
4.1
Network Security Threat Model
................................61
4.2
The Taxonomy
...............................................69
4.2.1
Header-Based Vulnerabilities and Attacks
................69
4.2.2
Protocol-Based Vulnerabilities and Attacks
...............70
4.2.3
Authentication-Based Vulnerabilities and Attacks
.........73
4.2.4
Traffic-Based Vulnerabilities and Attacks
.................75
4.3
Applying the Taxonomy
.......................................76
Homework Problems and Lab Experiments
...........................78
References
........................................................79
Part II Lower-Layer Security
......................................83
5
Physical Network Layer Overview
.................................85
5.1
Common Attack Methods
......................................87
5.1.1
Hardware Address Spoofing
.............................87
5.1.2
Network Sniffing
.......................................89
5.1.3
Physical Attacks
.......................................90
5.2
Wired Network Protocols
......................................92
5.2.1
Ethernet Protocol
.......................................92
5.2.2
Header-Based Attacks
.................................101
5.2.3
Protocol-Based Attacks
................................101
5.2.4
Authentication-Based Attacks
..........................102
5.2.5
Traffic-Based Attacks
..................................104
5.3
Wireless Network Protocols
...................................106
5.3.1
Header-Based Attacks
.................................114
5.3.2
Protocol-Based Attacks
................................114
5.3.3
Authentication-Based Attacks
..........................116
5.3.4
Traffic-Based Attacks
..................................119
5.4
Common Countermeasures
...................................124
5.4.1
Virtual Local Area Networks (VLANs)
..................124
5.4.2
Network Access Control (NAC)
........................126
5.5
General Comments
...........................................128
Homework Problems and Lab Experiments
..........................129
References
.......................................................131
Contents
vii
Network
Layer Protocols
.........................................135
6.1
IP Version
4
Protocol
.........................................137
6.1.1
IP Addressing
.........................................138
6.1.2
Routing
..............................................143
6.1.3
Packet Format
........................................149
6.1.4
Address Resolution Protocol
(ARP)
.....................153
6.1.5
Internet Control Messaging Protocol (ICMP)
.............156
6.1.5.1
ICMP Echo Request (TYPE
= 8)
and Reply
(TYPE
= 0)..................................157
6.1.5.2
ICMP Timestamp Request (TYPE
= 13)
and Reply (TYPE
=14).......................158
6.1.5.3
ICMP Destination Unreachable (TYPE
= 0).....158
6.1.5.4
ICMP Time Exceeded (TYPE
=11)............158
6.1.5.5
ICMP Redirection (TYPE
= 5).................159
6.1.6
Putting It All Together
.................................159
6.1.6.1
Scenario
1
(HI to H2)
.........................160
6.1.6.2
Scenario
2
(HI to H3)
.........................162
6.1.6.3
Scenario
3
(HI to H4)
.........................164
6.1.6.4
Scenario
4
(HI to H5)
.........................166
6.1.6.5
Scenario
5
(HI to No Host on Network
1).......168
6.1.6.6
Scenario
6
(HI to No Host on Network
2).......170
6.1.7
Header-Based Attacks
.................................172
6.1.8
Protocol-Based Attacks
................................173
6.1.9
Authentication-Based Attacks
..........................174
6.1.10
Traffic-Based Attacks
.................................177
6.2
BOOTP and DHCP
..........................................181
6.2.1
BOOTP Protocol
......................................182
6.2.2
DHCP Protocol
.......................................185
6.2.3
Header-Based Attacks
.................................186
6.2.4
Protocol-Based Attacks
................................186
6.2.5
Authentication-Based Attacks
..........................189
6.2.6
Traffic-Based Attacks
..................................190
6.3
IP Version
6
Protocol
.........................................190
6.3.1
Packet Format
........................................191
6.3.2
ICMP Version
6
Protocol
..............................194
viii Contents
6.4
Common IP Layer Counteraieasures
...........................195
6.4.1
IP Filtering
...........................................195
6.4.2
Network Address Translation (NAT)
....................1%
6.4.3
Virtual Private Network (VPN)
.........................203
6.4.4
IPSEC
...............................................206
Homework Problems and Lab Experiments
..........................208
References
.......................................................215
7
Transport Layer Protocols
.......................................221
7.1
Transmission Control Protocol (TCP)
..........................221
7.1.1
Multiplexing
..........................................221
7.1.2
Connection Management
...............................223
7.1.3
Data Transfer
.........................................223
7.1.4
Special Services
......................................224
7.1.5
Error Reporting
.......................................225
7.1.6
TCP Protocol
.........................................225
7.1.7
TCP Packet Format
....................................228
7.1.8
Header-Based Attacks
.................................229
7.1.9
Protocol-Based Attacks
................................230
7.1.10
Authentication-Based Attacks
..........................237
7.1.11
Traffic-Based Attacks
..................................237
7.2
User Datagram Protocol
(UDP)
...............................238
7.2.1
Packet Format
........................................239
7.2.2
Header- and Protocol-Based Attacks
....................239
7.2.3
Authentication-Based Attacks
..........................239
7.2.4
Traffic-Based Attacks
..................................239
7.3
Domain Name Service (DNS)
.................................239
7.3.1
DNS Protocol
.........................................242
7.3.2
DNS Packet Format
...................................245
7.3.3
Header-Based Attacks
.................................248
7.3.4
Protocol-Based Attacks
................................248
7.3.5
Authentication-Based Attacks
..........................248
73.6
Traffic-Based Attacks
..................................250
7.4
Common Countermeasures
...................................251
7.4.1
Transport Layer Security (TLS)
.........................251
Homework Problems and Lab Experiments
..........................253
References
.......................................................254
Contents ix
Part III Application Layer Security
...............................259
8
Application Layer Overview
......................................261
8.1
Sockets
.....................................................263
8.2
Common Attack Methods
.....................................266
8.2.1
Header-Based Attacks
.................................266
8.2.2
Protocol-Based Attacks
................................267
8.2.3
Authentication-Based Attacks
..........................267
8.2.4
Traffic-Based Attacks
..................................268
Homework Problems and Lab Experiments
..........................268
References
.......................................................270
9
Email
...........................................................271
9.1
Simple Mail Transfer Protocol
................................274
9.1.1
Vulnerabilities, Attacks, and Countermeasures
...........278
9.1.1.1
Header-Based Attacks
.........................278
9.1.1.2
Protocol-Based Attacks
........................278
9.1.1.3
Authentication-Based Attacks
..................278
9.1.1.4
Traffic-Based Attacks
.........................282
9.1.1.5
General Countermeasures
......................282
9.2
POP and IMAP
..............................................283
9.2.1
Vulnerabilities, Attacks, and Countermeasures
...........288
9.2.1.1
Header- and Protocol-Based Attacks
............288
9.2.1.2
Authentication-Based Attacks
..................288
9.2.1.3
Traffic-Based Attacks
.........................290
9.3
MIME
......................................................290
9.3.1
Vulnerabilities, Attacks, and Countermeasures
...........297
9.3.1.1
Header-Based Attacks
.........................298
9.3.1.2
Protocol-Based Attacks
........................298
9.3.1.3
Authentication-Based Attacks
..................299
9.3.1.4
Traffic-Based Attacks
.........................299
9.4
General Email Countermeasures
...............................300
9.4.1
Encryption and Authentication
.........................300
9.4.2
Email Filtering
........................................304
9.4.3
Content Filtering
......................................308
9.4.4
Email Forensics
.......................................309
Homework Problems and Lab Experiments
..........................314
References
.......................................................317
x
Contents
10
Web Security
...................................................321
10.1
Hypertext
Transfer Protocol (HTTP)
.........................324
10.1.1
Command Message................................
324
10.1.2
Response Message
.................................326
10.1.3
HTTP Headers
....................................326
10.1.4
Vulnerabilities, Attacks, and Countermeasures
........333
10.1.4.1
Header-Based Attacks
....................333
10.1.4.2
Protocol-Based Attacks
...................334
10.1.4.3
Authentication-Based Attacks
.............334
10.1.4.4
Traffic-Based Attacks
.....................336
10.2
Hypertext Markup Language (HTML)
........................340
10.2.1
Vulnerabilities, Attacks, and Countermeasures
.........343
10.2.1.1
Header-Based Attacks
.....................343
10.2.1.2
Protocol-Based Attacks
....................344
10.2.1.3
Authentication-Based Attacks
...............344
10.2.1.4
Traffic-Based Attacks
......................344
10.3
Server-Side Security
........................................345
10.3.1
Vulnerabilities, Attacks, and Countermeasures
.........347
10.3.1.1
Header-Based Attacks
.....................347
10.3.1.2
Protocol-Based Attacks
....................348
10.3.1.3
Authentication-Based Attacks.
...............348
10.3.1.4
Traffic-Based Attacks
......................348
10.4
Client-Side Security
........................................349
10.4.1
Vulnerabilities, Attacks, and Countermeasures
.........351
10.4.1.1
Header- and Protocol-Based Attacks
.........351
10.4.1.2
Authentication-Based Attacks.
..............351
10.4.1.3
Traffic-Based Attacks
......................352
10.5
General Web Countermeasures
...............................352
10.5.1
URL Filtering
......................................353
10.5.2
Content Filtering
....................................356
Homework Problems and Lab Experiments
........................359
References
......................................................361
11
Remote Access Security
.........................................367
11.1
Terminal-Based Remote Access (TELNET, rlogin,
and X-Windows)
..........................................368
11.1.1
TELNET
.........................................368
11.1.2
rlogin
.............................................372
Contents xi
11.1.3
X-Windows
........................................376
11.1.4
Vulnerabilities, Attacks, and Countermeasures
.........378
11.1.4.1
Header-Based Attacks
.....................379
11.1.4.2
Protocol-Based Attacks
....................379
11.1.4.3
Authentication-Based Attacks
...............379
11.1.4.4
Traffic-Based Attacks
......................381
11.2
File Transfer Protocols
......................................382
11.2.1
File Transfer Protocol (FTP)
.........................382
11.2.2
Trivial FTP
.........................................389
11.2.3
RCP
...............................................390
11.2.4
Vulnerabilities, Attacks, and Countermeasures
.........391
11.2.4.1
Header-Based Attacks
.....................391
11.2.4.2
Protocol-Based Attacks
....................391
11.2.4.3
Authentication-Based Attacks
...............392
11.2.4.4
Traffic-Based Attacks
......................393
11.3
Peer-to-Peer Networks
......................................394
11.3.1
Centralized Peer to Peer
.............................396
11.3.2
KaZaA
............................................399
11.3.3
Decentralized Peer to Peer
...........................400
11.3.3.1
Limewire, Bearshare, and Gnutella
..........401
11.3.4
Vulnerabilities, Attacks, and Countermeasures
.........403
11.3.4.1
Header- and Protocol-Based Attacks
.........403
11.3.4.2
Authentication-Based Attacks
...............403
11.3.4.3
Traffic-Based Attacks
......................404
11.3.4.4
Peer-to-Peer Countermeasures
..............404
11.4
General Countermeasures
...................................406
11.4.1
Encrypted Remote Access
...........................406
11.4.2
SSH
...............................................407
11.4.3
Remote Desktop
....................................410
11.4.4
Secure File Transfer (SFTP, FTPS, HTTPS)
...........411
Homework Problems and Lab Experiments
........................412
References
......................................................415
Part IV Network-Based Mitigation
................................425
12
Common Network Security Devices
.............................427
12.1
Network Firewalls
.........................................427
12.2
Network-Based Intrusion Detection and Prevention
...........433
12.3
Network-Based Data Loss Prevention
........................437
xii Contents
Homework
Problems and Lab Experiments........................439
References......................................................
440
Appendix A Cryptology
..........................................445
Appendix
В
Laboratory Configuration
............................455
Appendix
С
Homework Solutions
................................461
Index
..............................................................473
|
adam_txt |
Contents
Preface
.xiii
Acknowledgments
.xix
The Author
.xxi
Part I Introduction to Network Concepts and Threats
.1
1
Network Architecture
.3
1.1
Layered Network Architecture
.3
1.2
Overview of a Protocol
.12
1.3
Layered Network Model
.15
Homework Problems and Lab Experiments
.20
References
.21
2
Network Protocols
.23
2.1
Protocol Specifications
.23
2.2
Addresses
.29
2.3
Headers
.35
Homework Problems and Lab Experiments
.37
References
.37
3
The Internet
.39
3.1
Addressing
.41
3.1.1
Address Spoofing
.45
3.1.2
IP Addresses
.46
3.1.3
Host Name to IP Address Mapping
.47
3.2
Client-Server Model
.49
3.3
Routing
.54
Homework Problems and Lab Experiments
.57
References
.59
vi
Contents
4
Taxonomy of Network-Based Vulnerabilities
.61
4.1
Network Security Threat Model
.61
4.2
The Taxonomy
.69
4.2.1
Header-Based Vulnerabilities and Attacks
.69
4.2.2
Protocol-Based Vulnerabilities and Attacks
.70
4.2.3
Authentication-Based Vulnerabilities and Attacks
.73
4.2.4
Traffic-Based Vulnerabilities and Attacks
.75
4.3
Applying the Taxonomy
.76
Homework Problems and Lab Experiments
.78
References
.79
Part II Lower-Layer Security
.83
5
Physical Network Layer Overview
.85
5.1
Common Attack Methods
.87
5.1.1
Hardware Address Spoofing
.87
5.1.2
Network Sniffing
.89
5.1.3
Physical Attacks
.90
5.2
Wired Network Protocols
.92
5.2.1
Ethernet Protocol
.92
5.2.2
Header-Based Attacks
.101
5.2.3
Protocol-Based Attacks
.101
5.2.4
Authentication-Based Attacks
.102
5.2.5
Traffic-Based Attacks
.104
5.3
Wireless Network Protocols
.106
5.3.1
Header-Based Attacks
.114
5.3.2
Protocol-Based Attacks
.114
5.3.3
Authentication-Based Attacks
.116
5.3.4
Traffic-Based Attacks
.119
5.4
Common Countermeasures
.124
5.4.1
Virtual Local Area Networks (VLANs)
.124
5.4.2
Network Access Control (NAC)
.126
5.5
General Comments
.128
Homework Problems and Lab Experiments
.129
References
.131
Contents
vii
Network
Layer Protocols
.135
6.1
IP Version
4
Protocol
.137
6.1.1
IP Addressing
.138
6.1.2
Routing
.143
6.1.3
Packet Format
.149
6.1.4
Address Resolution Protocol
(ARP)
.153
6.1.5
Internet Control Messaging Protocol (ICMP)
.156
6.1.5.1
ICMP Echo Request (TYPE
= 8)
and Reply
(TYPE
= 0).157
6.1.5.2
ICMP Timestamp Request (TYPE
= 13)
and Reply (TYPE
=14).158
6.1.5.3
ICMP Destination Unreachable (TYPE
= 0).158
6.1.5.4
ICMP Time Exceeded (TYPE
=11).158
6.1.5.5
ICMP Redirection (TYPE
= 5).159
6.1.6
Putting It All Together
.159
6.1.6.1
Scenario
1
(HI to H2)
.160
6.1.6.2
Scenario
2
(HI to H3)
.162
6.1.6.3
Scenario
3
(HI to H4)
.164
6.1.6.4
Scenario
4
(HI to H5)
.166
6.1.6.5
Scenario
5
(HI to No Host on Network
1).168
6.1.6.6
Scenario
6
(HI to No Host on Network
2).170
6.1.7
Header-Based Attacks
.172
6.1.8
Protocol-Based Attacks
.173
6.1.9
Authentication-Based Attacks
.174
6.1.10
Traffic-Based Attacks
.177
6.2
BOOTP and DHCP
.181
6.2.1
BOOTP Protocol
.182
6.2.2
DHCP Protocol
.185
6.2.3
Header-Based Attacks
.186
6.2.4
Protocol-Based Attacks
.186
6.2.5
Authentication-Based Attacks
.189
6.2.6
Traffic-Based Attacks
.190
6.3
IP Version
6
Protocol
.190
6.3.1
Packet Format
.191
6.3.2
ICMP Version
6
Protocol
.194
viii Contents
6.4
Common IP Layer Counteraieasures
.195
6.4.1
IP Filtering
.195
6.4.2
Network Address Translation (NAT)
.1%
6.4.3
Virtual Private Network (VPN)
.203
6.4.4
IPSEC
.206
Homework Problems and Lab Experiments
.208
References
.215
7
Transport Layer Protocols
.221
7.1
Transmission Control Protocol (TCP)
.221
7.1.1
Multiplexing
.221
7.1.2
Connection Management
.223
7.1.3
Data Transfer
.223
7.1.4
Special Services
.224
7.1.5
Error Reporting
.225
7.1.6
TCP Protocol
.225
7.1.7
TCP Packet Format
.228
7.1.8
Header-Based Attacks
.229
7.1.9
Protocol-Based Attacks
.230
7.1.10
Authentication-Based Attacks
.237
7.1.11
Traffic-Based Attacks
.237
7.2
User Datagram Protocol
(UDP)
.238
7.2.1
Packet Format
.239
7.2.2
Header- and Protocol-Based Attacks
.239
7.2.3
Authentication-Based Attacks
.239
7.2.4
Traffic-Based Attacks
.239
7.3
Domain Name Service (DNS)
.239
7.3.1
DNS Protocol
.242
7.3.2
DNS Packet Format
.245
7.3.3
Header-Based Attacks
.248
7.3.4
Protocol-Based Attacks
.248
7.3.5
Authentication-Based Attacks
.248
73.6
Traffic-Based Attacks
.250
7.4
Common Countermeasures
.251
7.4.1
Transport Layer Security (TLS)
.251
Homework Problems and Lab Experiments
.253
References
.254
Contents ix
Part III Application Layer Security
.259
8
Application Layer Overview
.261
8.1
Sockets
.263
8.2
Common Attack Methods
.266
8.2.1
Header-Based Attacks
.266
8.2.2
Protocol-Based Attacks
.267
8.2.3
Authentication-Based Attacks
.267
8.2.4
Traffic-Based Attacks
.268
Homework Problems and Lab Experiments
.268
References
.270
9
Email
.271
9.1
Simple Mail Transfer Protocol
.274
9.1.1
Vulnerabilities, Attacks, and Countermeasures
.278
9.1.1.1
Header-Based Attacks
.278
9.1.1.2
Protocol-Based Attacks
.278
9.1.1.3
Authentication-Based Attacks
.278
9.1.1.4
Traffic-Based Attacks
.282
9.1.1.5
General Countermeasures
.282
9.2
POP and IMAP
.283
9.2.1
Vulnerabilities, Attacks, and Countermeasures
.288
9.2.1.1
Header- and Protocol-Based Attacks
.288
9.2.1.2
Authentication-Based Attacks
.288
9.2.1.3
Traffic-Based Attacks
.290
9.3
MIME
.290
9.3.1
Vulnerabilities, Attacks, and Countermeasures
.297
9.3.1.1
Header-Based Attacks
.298
9.3.1.2
Protocol-Based Attacks
.298
9.3.1.3
Authentication-Based Attacks
.299
9.3.1.4
Traffic-Based Attacks
.299
9.4
General Email Countermeasures
.300
9.4.1
Encryption and Authentication
.300
9.4.2
Email Filtering
.304
9.4.3
Content Filtering
.308
9.4.4
Email Forensics
.309
Homework Problems and Lab Experiments
.314
References
.317
x
Contents
10
Web Security
.321
10.1
Hypertext
Transfer Protocol (HTTP)
.324
10.1.1
Command Message.
324
10.1.2
Response Message
.326
10.1.3
HTTP Headers
.326
10.1.4
Vulnerabilities, Attacks, and Countermeasures
.333
10.1.4.1
Header-Based Attacks
.333
10.1.4.2
Protocol-Based Attacks
.334
10.1.4.3
Authentication-Based Attacks
.334
10.1.4.4
Traffic-Based Attacks
.336
10.2
Hypertext Markup Language (HTML)
.340
10.2.1
Vulnerabilities, Attacks, and Countermeasures
.343
10.2.1.1
Header-Based Attacks
.343
10.2.1.2
Protocol-Based Attacks
.344
10.2.1.3
Authentication-Based Attacks
.344
10.2.1.4
Traffic-Based Attacks
.344
10.3
Server-Side Security
.345
10.3.1
Vulnerabilities, Attacks, and Countermeasures
.347
10.3.1.1
Header-Based Attacks
.347
10.3.1.2
Protocol-Based Attacks
.348
10.3.1.3
Authentication-Based Attacks.
.348
10.3.1.4
Traffic-Based Attacks
.348
10.4
Client-Side Security
.349
10.4.1
Vulnerabilities, Attacks, and Countermeasures
.351
10.4.1.1
Header- and Protocol-Based Attacks
.351
10.4.1.2
Authentication-Based Attacks.
.351
10.4.1.3
Traffic-Based Attacks
.352
10.5
General Web Countermeasures
.352
10.5.1
URL Filtering
.353
10.5.2
Content Filtering
.356
Homework Problems and Lab Experiments
.359
References
.361
11
Remote Access Security
.367
11.1
Terminal-Based Remote Access (TELNET, rlogin,
and X-Windows)
.368
11.1.1
TELNET
.368
11.1.2
rlogin
.372
Contents xi
11.1.3
X-Windows
.376
11.1.4
Vulnerabilities, Attacks, and Countermeasures
.378
11.1.4.1
Header-Based Attacks
.379
11.1.4.2
Protocol-Based Attacks
.379
11.1.4.3
Authentication-Based Attacks
.379
11.1.4.4
Traffic-Based Attacks
.381
11.2
File Transfer Protocols
.382
11.2.1
File Transfer Protocol (FTP)
.382
11.2.2
Trivial FTP
.389
11.2.3
RCP
.390
11.2.4
Vulnerabilities, Attacks, and Countermeasures
.391
11.2.4.1
Header-Based Attacks
.391
11.2.4.2
Protocol-Based Attacks
.391
11.2.4.3
Authentication-Based Attacks
.392
11.2.4.4
Traffic-Based Attacks
.393
11.3
Peer-to-Peer Networks
.394
11.3.1
Centralized Peer to Peer
.396
11.3.2
KaZaA
.399
11.3.3
Decentralized Peer to Peer
.400
11.3.3.1
Limewire, Bearshare, and Gnutella
.401
11.3.4
Vulnerabilities, Attacks, and Countermeasures
.403
11.3.4.1
Header- and Protocol-Based Attacks
.403
11.3.4.2
Authentication-Based Attacks
.403
11.3.4.3
Traffic-Based Attacks
.404
11.3.4.4
Peer-to-Peer Countermeasures
.404
11.4
General Countermeasures
.406
11.4.1
Encrypted Remote Access
.406
11.4.2
SSH
.407
11.4.3
Remote Desktop
.410
11.4.4
Secure File Transfer (SFTP, FTPS, HTTPS)
.411
Homework Problems and Lab Experiments
.412
References
.415
Part IV Network-Based Mitigation
.425
12
Common Network Security Devices
.427
12.1
Network Firewalls
.427
12.2
Network-Based Intrusion Detection and Prevention
.433
12.3
Network-Based Data Loss Prevention
.437
xii Contents
Homework
Problems and Lab Experiments.439
References.
440
Appendix A Cryptology
.445
Appendix
В
Laboratory Configuration
.455
Appendix
С
Homework Solutions
.461
Index
.473 |
any_adam_object | 1 |
any_adam_object_boolean | 1 |
author | Jacobson, Douglas |
author_facet | Jacobson, Douglas |
author_role | aut |
author_sort | Jacobson, Douglas |
author_variant | d j dj |
building | Verbundindex |
bvnumber | BV022236314 |
callnumber-first | T - Technology |
callnumber-label | TK5105 |
callnumber-raw | TK5105.59 |
callnumber-search | TK5105.59 |
callnumber-sort | TK 45105.59 |
callnumber-subject | TK - Electrical and Nuclear Engineering |
classification_rvk | ST 276 |
ctrlnum | (OCoLC)254528888 (DE-599)BVBBV022236314 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
discipline_str_mv | Informatik |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01512nam a2200397 c 4500</leader><controlfield tag="001">BV022236314</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20090121 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">070123s2009 d||| |||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781584885436</subfield><subfield code="9">978-1-58488-543-6</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)254528888</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV022236314</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-703</subfield><subfield code="a">DE-355</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">TK5105.59</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 276</subfield><subfield code="0">(DE-625)143642:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Jacobson, Douglas</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Introduction to network security</subfield><subfield code="c">Douglas Jacobson</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Boca Raton, Fla. [u.a.]</subfield><subfield code="b">CRC Press</subfield><subfield code="c">2009</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XXI, 478 S.</subfield><subfield code="b">graph. Darst.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Chapman & Hall/CRC computer and information science series</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="C">b</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Digitalisierung UB Regensburg</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=015447320&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-015447320</subfield></datafield></record></collection> |
id | DE-604.BV022236314 |
illustrated | Illustrated |
index_date | 2024-07-02T16:34:16Z |
indexdate | 2024-07-09T20:53:02Z |
institution | BVB |
isbn | 9781584885436 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-015447320 |
oclc_num | 254528888 |
open_access_boolean | |
owner | DE-703 DE-355 DE-BY-UBR |
owner_facet | DE-703 DE-355 DE-BY-UBR |
physical | XXI, 478 S. graph. Darst. |
publishDate | 2009 |
publishDateSearch | 2009 |
publishDateSort | 2009 |
publisher | CRC Press |
record_format | marc |
series2 | Chapman & Hall/CRC computer and information science series |
spelling | Jacobson, Douglas Verfasser aut Introduction to network security Douglas Jacobson Boca Raton, Fla. [u.a.] CRC Press 2009 XXI, 478 S. graph. Darst. txt rdacontent n rdamedia nc rdacarrier Chapman & Hall/CRC computer and information science series Computer networks Security measures Computer security Rechnernetz (DE-588)4070085-9 gnd rswk-swf Computersicherheit (DE-588)4274324-2 gnd rswk-swf Rechnernetz (DE-588)4070085-9 s Computersicherheit (DE-588)4274324-2 s b DE-604 Digitalisierung UB Regensburg application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=015447320&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Jacobson, Douglas Introduction to network security Computer networks Security measures Computer security Rechnernetz (DE-588)4070085-9 gnd Computersicherheit (DE-588)4274324-2 gnd |
subject_GND | (DE-588)4070085-9 (DE-588)4274324-2 |
title | Introduction to network security |
title_auth | Introduction to network security |
title_exact_search | Introduction to network security |
title_exact_search_txtP | Introduction to network security |
title_full | Introduction to network security Douglas Jacobson |
title_fullStr | Introduction to network security Douglas Jacobson |
title_full_unstemmed | Introduction to network security Douglas Jacobson |
title_short | Introduction to network security |
title_sort | introduction to network security |
topic | Computer networks Security measures Computer security Rechnernetz (DE-588)4070085-9 gnd Computersicherheit (DE-588)4274324-2 gnd |
topic_facet | Computer networks Security measures Computer security Rechnernetz Computersicherheit |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=015447320&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT jacobsondouglas introductiontonetworksecurity |