Fundamentals of network security:
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
Boston [u.a.]
Artech House
2001
|
Schriftenreihe: | Artech House telecommunications library
|
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis |
Beschreibung: | XX, 319 S. Ill., graph. Darst. |
ISBN: | 1580531768 |
Internformat
MARC
LEADER | 00000nam a2200000zc 4500 | ||
---|---|---|---|
001 | BV023693836 | ||
003 | DE-604 | ||
005 | 20100114 | ||
007 | t | ||
008 | 010308s2001 xxuad|| |||| 00||| eng d | ||
020 | |a 1580531768 |c DM 163.81 |9 1-58053-176-8 | ||
035 | |a (OCoLC)248163218 | ||
035 | |a (DE-599)BVBBV023693836 | ||
040 | |a DE-604 |b ger | ||
041 | 0 | |a eng | |
044 | |a xxu |c US | ||
049 | |a DE-522 |a DE-634 |a DE-739 | ||
050 | 0 | |a QA76.9.A25 | |
082 | 0 | |a 005.8 | |
084 | |a ST 276 |0 (DE-625)143642: |2 rvk | ||
100 | 1 | |a Canavan, John E. |e Verfasser |4 aut | |
245 | 1 | 0 | |a Fundamentals of network security |c John E. Canavan |
264 | 1 | |a Boston [u.a.] |b Artech House |c 2001 | |
300 | |a XX, 319 S. |b Ill., graph. Darst. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
490 | 0 | |a Artech House telecommunications library | |
650 | 0 | 7 | |a Datensicherung |0 (DE-588)4011144-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Rechnernetz |0 (DE-588)4070085-9 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Rechnernetz |0 (DE-588)4070085-9 |D s |
689 | 0 | 1 | |a Datensicherung |0 (DE-588)4011144-1 |D s |
689 | 0 | |5 DE-604 | |
856 | 4 | 2 | |m HBZ Datenaustausch |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=017194400&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
999 | |a oai:aleph.bib-bvb.de:BVB01-017194400 |
Datensatz im Suchindex
_version_ | 1804138719719981056 |
---|---|
adam_text | Titel: Fundamentals of network security
Autor: Canavan, John E
Jahr: 2001
Contents
Preface_xvii
Regarding This Book xvii
Intended Audience xviii
Contents xviii
1 Basic Security Concepts_1
Why Is Computer and Network Security Important? 2
Background 4
History 5
The Security Trinity 8
Prevention 8
Detection 8
Response 8
Information Security 9
Risk Assessment 11
vii
Fundamentals of Network Security
Security Models 12
Security by Obscurity 12
The Perimeter Defense 13
The Defense in Depth 13
Basic T erminology 13
Threats 13
Vulnerabilities 14
Countermeasures 16
More Basic Terminology 16
Identification 16
A uthentication 16
Access Control (Authorization) 17
Availability 17
Confidentiality 18
Integrity 18
Accountability 18
Nonrepudiation 19
Threats, Vulnerabilities, and Attacks 21
Protocols 21
The OSI Reference Model 22
TCP/IP Protocol Suite 23
TCP/IP Protocol Suite 24
Threats, Vulnerabilities, and Attacks 25
Intro 25
Threats 25
Vulnerabilities 25
Attacks 25
Useful Web Sites 43
Search Engines 43
Mailing Lists
Contents
ix
Encryption, Digital Signatures, and Certification
Authorities_49
Stream Ciphers 51
Block Ciphers 52
Breaking Ciphers 53
Known Plaintext Attack 53
Chosen Plaintext Attack 53
Cryptanalysis 54
Brute Force 54
Social Engineering 55
Other Types of Attacks 55
Encryption 55
Symmetric Key Encryption 55
Data Encryption Standard (DES) 57
International Data Encryption Algorithm (IDEA) 57
CAST 57
Rivest Cipher #4 (RC4) 57
Asymmetric Key Encryption 58
Public Key Cryptosystems 59
Diffie-Hellman 59
Rivest, Shamir, Adelman (RSA) 60
Digital Signature Algorithm 60
A Slight Digression 60
Message Integrity 60
MD4 61
MD5 61
Secure Hash Algorithm-1 (SHA-1) 62
RIPEMD 62
Authentication 62
Digital Signatures 63
Competing Standards 64
Fundamentals of Network Security
Digital Certificate
Limitations of Digital Certificates 67
Certificate Authorities 67
Public Key Infrastructure 69
The Future 69
Introduction 69
Advanced Encryption Standard (AES) 70
Elliptic-Curve Cryptography (ECC) 71
The Limitations of Encryption 71
Kerberos Key Exchange_73
Kerberos 73
Kerberos Limitations 77
Encryption on the World Wide Web_79
The World Wide Web (WWW) 79
Secure Sockets Layer 80
Secure HTTP (SHTTP) 82
Microsoft s Internet Explorer 84
Netscape Navigator 91
Authenticode Certificates 94
Downloading a Program With an Invalid Certificate 97
E-Mail____gg
E-Mail Issues jqq
E-Mail Security 1O0
Secure E-Mail Protocols Q2
Web-Based E-Mail Services 115
Contents xi
Security of Stored Messages 117
Identity: Spoofing and Hiding 118
E-Mail as a Weapon 120
Policies 123
E-Mail Privacy 125
Auto-Responses 127
Operating System Security 129
Operating System Guidelines 129
Passwords 133
Password Guidelines 139
Access Control 141
Permissions 141
General Recommendations 146
Modems 149
Information Availability 151
Useful Tools 153
LAN Security 157
LAN Guidelines
Controlling End User Access
Concurrent Logins
Available Disk Space
Restrictions to Location or Workstation
Time/Day Restrictions
Access to Directories and Trustee Rights
File Attributes
Other Privileges
Remove Inactive Accounts
Single Sign-On
157
157
158
159
159
159
159
160
160
163
164
xii
Fundamentals of Network Security
Policy-Based Network Management 165
Segmenting LAN Traffic 170
Honeypot Systems 170
Static IP Addresses Versus Dynamic Host
Configuration Protocol (DHCP) 171
9 Media and Protocols 173
Network Media 7^
Wireless 177
Wireless (LAN) 177
Wireless (WAN) 178
Plenum Cabling and Risers 179
WANs 182
Dedicated Lease Lines 183
Packet-Switched Networks 183
Cable Television 187
x Digital Subscriber Line (xDSL) 188
The Internet 189
Redundancy and Alternative Connections 190
10 Routers and SNMP_ 191
Router Issues 191
Risks 192
Cisco IOS 192
Cisco Secure Integrated Software (SIS) 194
Simple Network Management Protocol (SNMP) 195
11 Virtual Private Networks 9m
Encryption on the Network
201
Contents
xiii
Node-to-Node Encryption 201
End-to-End Encryption 202
Where to Encrypt 203
Virtual Private Networks (VPNs) 205
PPTP 205
L2TP 206
IPSec 20 6
SOCKS 207
Implementation 208
12 , Firewalls______211
Firewalls 211
Firewalls Pros 212
Firewalls Cons 212
Types of Firewalls 214
Firewall Configurations 216
Restricting User s Access to the Internet 222
Firewall Products 223
Firewall Alternatives 224
Personal Firewalls 226
13 Biometrics _______231
Identification and Authentication 231
Biometric Identification and Authentication 232
14 Policies and Procedures__239
Policies and Procedures 239
Policies Versus Procedures 239
Policy and Procedure Manuals 24 5
Security Policy Suggestions 247
Use of Company-Owned Electronic Media and Services 249
xiv
Fundamentals of Network Security
Information Privacy ^
Information and Data Management 254
Systems Administration 255
Remote Network Access 256
Security of Telecommunications 256
Physical Security 256
Use of Standards 257
Reporting Noncompliance 257
Personnel-Related Policies 257
Information Protection Team 259
Crisis Management Planning 259
15 Auditing, Monitoring, and Intrusion Detection_261
What Is an Audit? 262
Audit Mistakes 266
Deficiencies of Traditional Audit Techniques 268
Intrusion Detection 269
Future Directions 278
16 Crisis Management__279
Disaster Recovery Planning 279
What Level of Preparation? 281
What to Restore First? 282
Review and Test 282
Disaster Recovery Planning Case Study 283
Outsourcing Plan Development and Maintenance 287
Computer Security Incident Response Plan 288
General Recommendations 288
Contents
xv
17 Cookies, Cache, and AutoComplete_293
Cookies 294
Cache Files , 298
AutoComplete 303
About the Author_305
Index 307
|
any_adam_object | 1 |
author | Canavan, John E. |
author_facet | Canavan, John E. |
author_role | aut |
author_sort | Canavan, John E. |
author_variant | j e c je jec |
building | Verbundindex |
bvnumber | BV023693836 |
callnumber-first | Q - Science |
callnumber-label | QA76 |
callnumber-raw | QA76.9.A25 |
callnumber-search | QA76.9.A25 |
callnumber-sort | QA 276.9 A25 |
callnumber-subject | QA - Mathematics |
classification_rvk | ST 276 |
ctrlnum | (OCoLC)248163218 (DE-599)BVBBV023693836 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01406nam a2200385zc 4500</leader><controlfield tag="001">BV023693836</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20100114 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">010308s2001 xxuad|| |||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1580531768</subfield><subfield code="c">DM 163.81</subfield><subfield code="9">1-58053-176-8</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)248163218</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV023693836</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">xxu</subfield><subfield code="c">US</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-522</subfield><subfield code="a">DE-634</subfield><subfield code="a">DE-739</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">QA76.9.A25</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 276</subfield><subfield code="0">(DE-625)143642:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Canavan, John E.</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Fundamentals of network security</subfield><subfield code="c">John E. Canavan</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Boston [u.a.]</subfield><subfield code="b">Artech House</subfield><subfield code="c">2001</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XX, 319 S.</subfield><subfield code="b">Ill., graph. Darst.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Artech House telecommunications library</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">HBZ Datenaustausch</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=017194400&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-017194400</subfield></datafield></record></collection> |
id | DE-604.BV023693836 |
illustrated | Illustrated |
indexdate | 2024-07-09T21:32:40Z |
institution | BVB |
isbn | 1580531768 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-017194400 |
oclc_num | 248163218 |
open_access_boolean | |
owner | DE-522 DE-634 DE-739 |
owner_facet | DE-522 DE-634 DE-739 |
physical | XX, 319 S. Ill., graph. Darst. |
publishDate | 2001 |
publishDateSearch | 2001 |
publishDateSort | 2001 |
publisher | Artech House |
record_format | marc |
series2 | Artech House telecommunications library |
spelling | Canavan, John E. Verfasser aut Fundamentals of network security John E. Canavan Boston [u.a.] Artech House 2001 XX, 319 S. Ill., graph. Darst. txt rdacontent n rdamedia nc rdacarrier Artech House telecommunications library Datensicherung (DE-588)4011144-1 gnd rswk-swf Rechnernetz (DE-588)4070085-9 gnd rswk-swf Rechnernetz (DE-588)4070085-9 s Datensicherung (DE-588)4011144-1 s DE-604 HBZ Datenaustausch application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=017194400&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Canavan, John E. Fundamentals of network security Datensicherung (DE-588)4011144-1 gnd Rechnernetz (DE-588)4070085-9 gnd |
subject_GND | (DE-588)4011144-1 (DE-588)4070085-9 |
title | Fundamentals of network security |
title_auth | Fundamentals of network security |
title_exact_search | Fundamentals of network security |
title_full | Fundamentals of network security John E. Canavan |
title_fullStr | Fundamentals of network security John E. Canavan |
title_full_unstemmed | Fundamentals of network security John E. Canavan |
title_short | Fundamentals of network security |
title_sort | fundamentals of network security |
topic | Datensicherung (DE-588)4011144-1 gnd Rechnernetz (DE-588)4070085-9 gnd |
topic_facet | Datensicherung Rechnernetz |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=017194400&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT canavanjohne fundamentalsofnetworksecurity |