Security

All Security Articles

Showing 41-60 of 112

Sort by Date | Title

Page: < Prev 1 2 3 4 5 Next >

41.
Creating Custom Policies for the Cisco Security Agent
Jul 14, 2006
Creating your own policies is a major part of operating a successful CSA deployment. To accomplish this, you must thoroughly understand the components available to you and the methods of research available. Understanding the rule types and the events caused by those rules helps you move forward in your deployment and perform day-to-day support. A solid grasp of the fundamentals and advanced components not only makes you an effective administrator but also an efficient one. This chapter will help you get started with this.
42.
Creating Your Own VPN
Oct 23, 2012
Security expert Eric Geier shows you how to set up a VPN to securely access your PC or network when you’re away, and to secure your Internet connection when using Wi-Fi hotspots.
43.
Deploying Secure Internet Connectivity with Cisco ASA and PIX Firewalls
Aug 5, 2005
This chapter provides you with the necessary information to use the ASDM Startup Wizard to perform the initial configuration of your network. It provides a step-by-step procedure explaining how to use the ASDM Startup Wizard to set up the initial configuration for your ASA/PIX Security Appliance.
44.
Developing Network Security Strategies
Oct 4, 2010
To help you handle the difficulties inherent in designing network security for complex networks, this chapter teaches a systematic, top-down approach that focuses on planning and policy development before the selection of security products.
45.
EAP Authentication Protocols for WLANs
Feb 18, 2005
This chapter examines the authentication methods: EAP, PEAP, LEAP, and the newer, emerging paradigm EAP-FAST, and weighs the pros and cons of each, in terms of standardization maturity and effectiveness.
46.
Firesheep, Fireshepherd, and Facebook: Understanding Session Hijacking
Feb 22, 2011
Mike Chapple shows you how web authentication makes session hijacking possible, how Firesheep exploits these vulnerabilities, and the measures that website administrators, web developers, and end users can take to protect against session hijacking attacks.
47.
Five Applications to Secure Your Wi-Fi Hotspot Connections
May 13, 2010
Don't risk eavesdroppers capturing your email, passwords, and other sensitive info! Eric Geier reviews five helpful apps that encrypt your wireless traffic.
48.
General Design Considerations for Secure Networks
Jun 18, 2004
49.
Getting Familiar with Cisco Secure Access Control Server
Dec 3, 2004
This chapter covers the basics of the Cisco Secure Access Control Server interface, and familiarizes you with the very simplest of actions in this medium.
50.
Getting Owned: The USB Keystroke Injection Attack
Oct 6, 2010
What do you call a USB-based device that can bypass all AV and autorun policies? Although most would consider it a perfect mischievous attack vector, Hyundai has used it as a tool to build customer loyalty. This leaves Seth Fogie wondering: Are people are planning to maliciously use this technology?
51.
Getting Started with the Cisco PIX Firewall
Apr 11, 2003
52.
Home Network Router Security Secrets
Apr 7, 2006
Ever delve inside your home network routers and use the hidden security settings that can lock down a network nice and tight? Most people never do. Andy Walker reveals 10 secrets on how to easily access your router's security settings.
53.
Host Intrusion Prevention Systems: Defense-in-Depth's Best Friend
Jul 1, 2005
Chad Sullivan takes a look at common security issues and how host Intrusion Prevention Systems (IPS) can become the most crucial piece of your corporate layered security plan.
54.
Identifying and Classifying Network Security Threats
Jun 26, 2008
This chapter presents several best practices and methodologies you can use to successfully and quickly identify and classify security threats and anomalies in the network.
55.
Improve Your Network's Security Using Network Admission Control
Aug 26, 2005
Is there a place for security focused on the good guys in networking? There is, and one of the latest additions to this area of security is called Network Admission Control (NAC). Sean Convery introduces NAC, a security measure built around the idea that asking specific questions of an organization's end hosts can improve the overall security of a network by improving the compliance of end systems to a given admission policy.
56.
Intrusion Detection Systems
Feb 15, 2002
Intrusion Detection Systems (IDSs) are basically burglar alarms for your computer network. Earl Carter shows you that understanding how they operate can enable you to determine if and how you can use an IDS to protect your network.
57.
Intrusion Detection: Cisco IDS Overview
Dec 28, 2001
Cisco Secure IDS is a network-based intrusion detection system that uses a signature database to trigger intrusion alarms.
58.
Intrusion Prevention: Signatures and Actions
May 26, 2006
Attack signatures have been around for long enough that the definition should be universally understood, but that's not the case. Simply put, an IPS signature is any distinctive characteristic that identifies something. Using this definition, all IPS products use signatures of some kind, regardless of what the product descriptions claim. To find something and stop it, you must be able to identify it, and for you to identify it, it must display a distinct characteristic. This chapter introduces you to the concept of signatures.
59.
IP Network Traffic Plane Security Concepts
Jun 18, 2008
This chapter introduces the concepts of defense in depth and breadth as applied to IP traffic plane security.
60.
IPSec Authentication and Authorization Models
Oct 21, 2005
This chapter covers IPSec features and mechanisms that are primarily targeted at the authentication of remote access users. You'll learn about XAUTH, which provides extended authentication for IPSec telecommuters by using authentication schemes such as RADIUS. MODECFG uses a push model to push attributes to the IPSec client.

Page: < Prev 1 2 3 4 5 Next >