| 1. | - Creating Your Own VPN
- By
Eric Geier
- Oct 23, 2012
- Security expert Eric Geier shows you how to set up a VPN to securely access your PC or network when you’re away, and to secure your Internet connection when using Wi-Fi hotspots.
|
| 2. | - Cisco IronPort ESA Web User Interface
- By
Chris Porter
- Apr 25, 2012
- This chapter covers the layout and workflow of the web user interface used for the administration of the Email Security Appliance (ESA).
|
| 3. | - Protecting Your Network from the Wi-Fi Protected Setup Security Hole
- By
Eric Geier
- Mar 12, 2012
- Even if you’ve encrypted and secured your wireless network with Wi-Fi Protected Access (WPA or WPA2), a security hole affecting most wireless routers may make it fairly easy for those with the right tools to hack your network and connect. Eric Geier shows how to prevent this and protect your network.
|
| 4. | - Network Security First-Step: Firewalls
- By
Donald Stoddard, Thomas M. Thomas
- Feb 8, 2012
- This chapter dissects a firewall’s duties to understand what makes a firewall operate and how it does its job.
|
| 5. | - ZigBee Wireless Security: A New Age Penetration Tester's Toolkit
- By
Brad Bowers
- Jan 9, 2012
- Brad Bowers takes a closer look at the ZigBee protocol, some of the attacks that have been leveraged against it, and the security tools that penetration testers can use.
|
| 6. | - Prevent Wi-Fi Eavesdroppers from Hijacking Your Accounts
- By
Eric Geier
- Sep 20, 2011
- Eric Geier shows you how to protect your privacy when logging on to online accounts that don't always use secure connections, like Facebook, MySpace, Twitter, and Amazon.
|
| 7. | - 2011 Collegiate Cyber Defense Challenge: Shaping the Cyber Warriors of Tomorrow
- By
Brad Bowers
- May 2, 2011
- Brad Bowers provides an intriguing look into the 2011 Mid-Atlantic CCDC attack-and-defense competition for information technology students.
|
| 8. | - PKI Processes and Procedures
- By
Andre Karamanian, Francois Dessart, Srinivas Tenneti
- Apr 1, 2011
- Several processes need to occur in a PKI network for a deployment to function smoothly. To address these processes, this chapter covers enrollment, Certificate Expiration and Renewal, Certificate Verification and Enforcement, and PKI Resiliency.
|
| 9. | - Firesheep, Fireshepherd, and Facebook: Understanding Session Hijacking
- By
Mike Chapple
- Feb 22, 2011
- Mike Chapple shows you how web authentication makes session hijacking possible, how Firesheep exploits these vulnerabilities, and the measures that website administrators, web developers, and end users can take to protect against session hijacking attacks.
|
| 10. | - Cisco Secure Access Control System (ACS) 5.2 and User Change Password (UCP)
- By
Premdeep Banga
- Feb 14, 2011
- This article teaches you how to use the User Change Password (UCP) service in Cisco ACS to allow users defined in the ACS internal database to first authenticate themselves and then change their own password.
|
| 11. | - Q&A with the Authors of "AAA Identity Management Security"
- By
Premdeep Banga, Brandon J. Carroll, Vivek Santuka
- Feb 7, 2011
- The authors of AAA Identity Management Security discuss the book and its features.
|
| 12. | - Cisco AAA Identity Management Security: Getting Familiar with ACS 5.1
- By
Brandon J. Carroll, Premdeep Banga, Vivek Santuka
- Feb 2, 2011
- ACS 5.1 has a completely different user interface from ACS 4.2. Throughout the course of this chapter you will become familiar with the GUI and know where different functions are located.
|
| 13. | - Computer Incident Response and Product Security: Operating an Incident Response Team
- By
Damir Rajnovic
- Dec 17, 2010
- This chapter covers aspects of running an incidence response team (IRT) such as team size, team member profiles, cooperating with other groups, preparing for incidents, and measuring success.
|
| 14. | - Cisco Unified Wireless LAN Security Fundamentals
- By
Jake Woodhams, Robert Marg, Jeff Smith
- Dec 3, 2010
- This chapter discusses the fundamentals of wireless LAN security in the context of the Cisco Unified Wireless Network (CUWN).
|
| 15. | - The Evolution of Evil: Changes in the Use of USB Devices as Delivery Mechanisms for Malicious Code
- By
Brad Bowers
- Oct 7, 2010
- USB microcontrollers are small, capable of circumventing most malware detection software, and can deliver devastating payloads. Brad Bowers takes a closer look at this new attack vector and reveals some of the challenges IT security professionals face as the use of microcontrollers as an attack platform matures.
|
| 16. | - Getting Owned: The USB Keystroke Injection Attack
- By
Seth Fogie
- Oct 6, 2010
- What do you call a USB-based device that can bypass all AV and autorun policies? Although most would consider it a perfect mischievous attack vector, Hyundai has used it as a tool to build customer loyalty. This leaves Seth Fogie wondering: Are people are planning to maliciously use this technology?
|
| 17. | - Developing Network Security Strategies
- By
Priscilla Oppenheimer
- Oct 4, 2010
- To help you handle the difficulties inherent in designing network security for complex networks, this chapter teaches a systematic, top-down approach that focuses on planning and policy development before the selection of security products.
|
| 18. | - Network Security Auditing Tools and Techniques
- By
Chris Jackson
- Jun 29, 2010
- This chapter discusses software tools and techniques auditors can use to test network security controls. Security testing as a process is covered, but the focus is on gathering the evidence useful for an audit.
|
| 19. | - Recovering and Securing Your Wi-Fi Encryption Keys
- By
Eric Geier
- Jun 4, 2010
- Have you forgotten the WEP or WPA key or passphrase for your Wi-Fi? Eric Geier helps you discover how to recover or reset and secure your network password.
|
| 20. | - CCDC and the Tale of the Insider Threat
- By
Brad Bowers
- May 24, 2010
- Brad Bowers discusses the value of including the threat of insider attacks in Collegiate Cyber Defense Competition (CCDC) events.
|