Network Security First-Step

  • Published: May 21, 2004
  • Copyright 2004
  • Dimensions: 7-3/8" x 9-1/8"
  • Pages: 480
  • Edition: 1st
  • Book
  • ISBN-10: 1-58720-099-6
  • ISBN-13: 978-1-58720-099-1
  • eBook (Watermarked)
  • ISBN-10: 1-58720-314-6
  • ISBN-13: 978-1-58720-314-5

Register your product to gain access to bonus material or receive a coupon.

More Information

DescriptionReviewsSample Content

Product Description

Your first step into the world of network security

  • No security experience required
  • Includes clear and easily understood explanations
  • Makes learning easy

Your first step to network security begins here!

  • Learn about hackers and their attacks
  • Understand security tools and technologies
  • Defend your network with firewalls, routers, and other devices
  • Explore security for wireless networks
  • Learn how to prepare for security incidents

Welcome to the world of network security!

Computer networks are indispensable-but they're also not secure. With the proliferation of Internet viruses and worms, many people and companies are considering increasing their network security. But first, you need to make sense of this complex world of hackers, viruses, and the tools to combat them.

No security experience needed!

Network Security First-Step explains the basics of network security in easy-to-grasp language that all of us can understand. This book takes you on a guided tour of the core technologies that make up and control network security. Whether you are looking to take your first step into a career in network security or are interested in simply gaining knowledge of the technology, this book is for you!

Customer Reviews

3 of 3 people found the following review helpful
1.0 out of 5 stars Not a good textbook, October 31, 2006
This review is from: Network Security First-Step (Paperback)
We are currently using this book as a text in school. The book is more like an overview (hence the title) but it's so over the entire view that it's hard to get any real substance out of it. I'd rather have just read a glossary that told me what VPNs, DMZs, firewalls and encryption are. The mispellings and other typos are enough to make me want to throw this book out of the window. Did the editor actually proofread this thing? This is an alright reference as an addition to another book but it fails to stand on it's own as a text. Big disappointment.
Help other customers find the most helpful reviews 
Was this review helpful to you? Yes No


2 of 2 people found the following review helpful
2.0 out of 5 stars Filled with critical errors, July 17, 2006
By 
Enigma (Palo Alto, CA USA) - See all my reviews
Amazon Verified Purchase(What's this?)
This review is from: Network Security First-Step (Paperback)
I have been buying books/other items on Amazon since Amazon's inception and this is the first review I've written. I feel compelled to warn others.

I would have given this book four stars if it weren't for the errors. The intent and content are very good for beginners. Also, good writing style and easy read. However, there are so many critical errors, it drops the value of the book tremendously. As placed in an example by another reviewer, simply leaving out a word like 'not' can have a huge difference in meaning w/in a given context. This book does it over and over again.

Luckily, I have experience and know what is an error, but this is a beginner's guide so it is unacceptable to have so many of these types of errors. Since I don't know everything, there were a few occasions where I had to research what was stated to find correct information (knowing it was wrong, but not knowing the exact answer).

Unfortunately, if you are new to the subject matter... Read more
Help other customers find the most helpful reviews 
Was this review helpful to you? Yes No


2 of 2 people found the following review helpful
1.0 out of 5 stars Good First-Step for MUCH NEEDED Network Security, October 30, 2004
By 
S. Scheiderer (M. Hill, CA USA) - See all my reviews
(REAL NAME)   
This review is from: Network Security First-Step (Paperback)
Network Security First-Step

(Your first step into the world of network security)

Reviewer Name: Steve Owen Scheiderer, Network Administrator

Reviewer Certification: MCSE NT 4.0, CCNA

ISBN: 1-58720-099-6

If you've ever been victimized by a hacker you're left standing there asking "How'd they do this?" and "What could we have done to prevent it?" One of the most valuable insights of Network Security First-Step by Tom Thomas is that you don't have to be a rocket scientist to begin fighting hacker attacks. Thomas introduces the reader to the techniques - often strikingly simplistic or scripted via readily available tools - of the hacker with a "It takes one to fight one!" tactic.

Although there is plethora of technical information, there is plenty of non-technical information to consider. There is something for network administrators, security experts, CEOs and average Jane and Joe user at the office (or at home). Even... Read more
Help other customers find the most helpful reviews 
Was this review helpful to you? Yes No


Share your thoughts with other customers:
 See all 22 customer reviews...

Praise For Network Security First-Step

Review by Edward Bovell
Review by André De La Cruz
Review by Branden McIntyre
Review by Jack Thrams, CCNA, MCSE, Network+
Review by Brion Washington, CCNA, CCIE

Index

Download - 312 KB -- Index

Table of Contents



1. Here There Be Hackers!

Essentials First: Looking for a Target. Hacking Innocent Information. Targets of Opportunity. Are You a Target of Opportunity? Targets of Choice. Are You a Target of Choice? The Process of an Attack. Reconnaissance and Footprinting (a.k.a. Casing the Joint). Scanning. Enumeration. Gaining Access. Application Attacks. Misconfiguration Attacks. Script Attacks. Escalating Privilege. Covering Tracks. Network Security Organizations. SANS. Center for Internet Security (CIS). SCORE. Internet Storm Center. ICAT Metabase. Security Focus. Learning from the Network Security Organizations. Overview of Common Attacks and Exploits. Chapter Summary. Chapter Review.



2. Security Policies and Responses.

Defining Trust. Acceptable Use Policy. Policy Overview. Purpose. Scope General Use and Ownership. Security and Proprietary Information. Unacceptable Use. E-mail and Communications Activities. Enforcement. Conclusion. Password Policy. Overview. Purpose. Scope. General Policy. General Password Construction Guidelines. Password Protection Standards. Enforcement. Conclusion. Virtual Private Network (VPN) Security Policy. Scope. Policy. Conclusion. Extranet Connection Policy. Scope. Security Review. Third-Party Connection Agreement. Business Case. Point of Contact. Establishing Connectivity. Modifying or Changing Connectivity and Access. Terminating Access. Conclusion. ISO Certification and Security. Sample Security Policies on the Internet. Chapter Summary. Chapter Review.



3. Overview of Security Technologies.

Security First Design Concepts. Packet Filtering via Access Control Lists (ACLs). Limitations of Packet Filtering. Stateful Packet Inspection (SPI). Detailed Packet Flow Using SPI. Limitations of Stateful Packet Inspection. Network Address Translation (NAT). NAT's Limitations. Proxies and Application Level Protection. Content Filters. Public Key Infrastructure (PKI). AAA Technologies. Authorization. Accounting. Remote Authentication Dial-In User Service (RADIUS). Terminal Access Controller Access Control System (TACACS). TACACS+ Versus RADIUS. Chapter Summary. Chapter Review Questions.



4. Security Protocols.

DES Encryption. Limitations of DES. Triple DES Encryption. Limitations of 3DES. Message Digest 5 Algorithm. Point-to-Point Tunneling Protocol (PPTP). Limitations of PPTP. Layer 2 Tunneling Protocol (L2TP). Benefits of L2TP. L2TP Operation. Secure Shell (SSH). SSH Operation. Tunneling and Port Forwarding. Limitations of SSH. Chapter Summary. Chapter Review Questions.



5. Firewalls.

Firewall Frequently Asked Questions. Why Do I Need a Firewall? Do I Have Anything Worth Protecting? What Does a Firewall Do? Firewalls Are "The Security Policy". Firewall Operational Overview. Implementing a Firewall. Determine the Inbound Access Policy. Determine Outbound Access Policy. Essentials First: Life in the DMZ. Case Studies. Case Study: Firewall Deployment with Mail Server Inside the Protected (Internal). Case Study: Firewall Deployment with Mail Server in DMZ. Firewall Limitations. Chapter Summary. Chapter Review Questions.



6. Router Security.

Edge Router as a Choke Point. Edge Router as a Packet Inspector. Content-Based Packet Inspection. Intrusion Detection with Cisco IOS. When to Use the FFS IDS. FFS IDS Operational Overview. FFS Limitations. Secure IOS Template. Chapter Summary. Chapter Review Questions.



7. IPSec Virtual Private Networks (VPNs).

Analogy: VPNs Connect IsLANds Securely. VPN Overview. VPN Benefits and Goals. VPN Implementation Strategies. Split Tunneling. Overview of IPSec VPNs. Tunneling Data. Encryption Modes. Transport Mode. IPSec Protocols. Internet Key Exchange (IKE). ISAKMP Overview. IPSec Operational Overview. IKE Phase 2. Diffie-Hellman Algorithm. Router Configuration as VPN Peer. Configuring IPSec. Step 2: Create the IPSec Transforms. Step 3: Create the Crypto Map. Step 4: Apply the Crypto Map to an Interface. Firewall VPN Configuration for Client Access. Chapter Summary. Chapter Review Questions.



8. Wireless Security.

Essentials First: Wireless LANs. Benefits of Wireless LANs. Wireless Equals Radio Frequency. Wireless Networking. Coverage. Bandwidth Availability. WarGames Wirelessly. WarDriving. WarFlying. WarSpamming. WarSpying. Wireless Threats. Denial of Service Attacks. Rogue/Unauthorized Access Points. Incorrectly Configured Access Points. Network Abuses. Wireless Security. Device and Access Point Association. Wired Equivalent Privacy (WEP). MAC Address Filtering. Extensible Authentication Protocol (EAP). LEAP (EAP-Cisco). EAP-TLS EAP-TTLS. Essentials First: Wireless Hacking Tools. Wireless Packet Sniffers. AirSNORT. Chapter Summary. Chapter Review Questions.



9. Intrusion Detection and Honeypots.

Essentials First: Intrusion Detection. IDS Functional Overview. Host Intrusion Detection System (HIDS). How Are Intrusions Detected? Protocol Analysis. Anomaly Detection. Signature/Pattern Matching. Log Analysis. Combining Methods. Intrusion Prevention. IPS Responses and Actions. IDS Products. Essentials First: Honeypots. Honeypot Limitations. Chapter Summary. Chapter Review Questions.



10. Tools of the Trade.

Essentials First: Vulnerability Analysis. Fundamental Attacks. Packet Sniffers. Denial of Service (DoS) Attacks. Man-in-the-Middle Attacks. Back Doors. Miscellaneous Attacks. Security Assessments and Penetration Testing. Internal Vulnerability and Penetration Assessment. External Penetration and Vulnerability Assessment. Physical Security Assessment. Miscellaneous Assessments. Vulnerability Scanners. Features and Benefits of Vulnerability Scanners. Nessus. In Their Own Words. Scan and Detection Accuracy. Documentation and Support. Reporting. Vulnerability Updates. Retina. Scan and Detection Accuracy. Documentation and Support. Reporting. Vulnerability Updates. Penetration Testing Products. Scan and Detection Accuracy. Documentation. Documentation and Support. Vulnerability Updates. Core Impact In Action. Chapter Summary. Chapter Review Questions.



Appendix A: Answers to Chapter Review Questions

Downloadable Sample Chapter

Download - 1.14 MB -- Chapter 8: Wireless Security

Best Value

Book + eBook Bundle $62.91 $37.75

Book Price: $27.96
eBook Price: $9.79

Buy

This book includes free shipping!

Buy

Book  $34.95  $27.96

Usually ships in 24 hours.

This book includes free shipping!

Buy

eBook (Watermarked)  $27.96  $22.37

About Watermarked eBooks

This PDF will be accessible from your Account page after purchase and requires the free Adobe® Reader® software to read it.

The eBook requires no passwords or activation to read. We customize your eBook by discretely watermarking it with your name, making it uniquely yours.

Watermarked eBook FAQ

Purchase Reward: One Month Free Subscription
By completing any purchase on Cisco Press, you become eligible for an unlimited access one-month subscription to Safari Books Online.

Get access to thousands of books and training videos about technology, professional development and digital media from more than 40 leading publishers, including Addison-Wesley, Prentice Hall, Cisco Press, IBM Press, O'Reilly Media, Wrox, Apress, and many more. If you continue your subscription after your 30-day trial, you can receive 30% off a monthly subscription to the Safari Library for up to 12 months. That's a total savings of $199.