41. | - Creating Custom Policies for the Cisco Security Agent
- Jul 14, 2006
- Creating your own policies is a major part of operating a successful CSA deployment. To accomplish this, you must thoroughly understand the components available to you and the methods of research available. Understanding the rule types and the events caused by those rules helps you move forward in your deployment and perform day-to-day support. A solid grasp of the fundamentals and advanced components not only makes you an effective administrator but also an efficient one. This chapter will help you get started with this.
|
42. | - Creating Your Own VPN
- Oct 23, 2012
- Security expert Eric Geier shows you how to set up a VPN to securely access your PC or network when you’re away, and to secure your Internet connection when using Wi-Fi hotspots.
|
43. | - Deploying Secure Internet Connectivity with Cisco ASA and PIX Firewalls
- Aug 5, 2005
- This chapter provides you with the necessary information to use the ASDM Startup Wizard to perform the initial configuration of your network. It provides a step-by-step procedure explaining how to use the ASDM Startup Wizard to set up the initial configuration for your ASA/PIX Security Appliance.
|
44. | - Developing Network Security Strategies
- Oct 4, 2010
- To help you handle the difficulties inherent in designing network security for complex networks, this chapter teaches a systematic, top-down approach that focuses on planning and policy development before the selection of security products.
|
45. | - EAP Authentication Protocols for WLANs
- Feb 18, 2005
- This chapter examines the authentication methods: EAP, PEAP, LEAP, and the newer, emerging paradigm EAP-FAST, and weighs the pros and cons of each, in terms of standardization maturity and effectiveness.
|
46. | - Firesheep, Fireshepherd, and Facebook: Understanding Session Hijacking
- Feb 22, 2011
- Mike Chapple shows you how web authentication makes session hijacking possible, how Firesheep exploits these vulnerabilities, and the measures that website administrators, web developers, and end users can take to protect against session hijacking attacks.
|
47. | - Five Applications to Secure Your Wi-Fi Hotspot Connections
- May 13, 2010
- Don't risk eavesdroppers capturing your email, passwords, and other sensitive info! Eric Geier reviews five helpful apps that encrypt your wireless traffic.
|
48. | - General Design Considerations for Secure Networks
- Jun 18, 2004
|
49. | - Getting Familiar with Cisco Secure Access Control Server
- Dec 3, 2004
- This chapter covers the basics of the Cisco Secure Access Control Server interface, and familiarizes you with the very simplest of actions in this medium.
|
50. | - Getting Owned: The USB Keystroke Injection Attack
- Oct 6, 2010
- What do you call a USB-based device that can bypass all AV and autorun policies? Although most would consider it a perfect mischievous attack vector, Hyundai has used it as a tool to build customer loyalty. This leaves Seth Fogie wondering: Are people are planning to maliciously use this technology?
|
51. | - Getting Started with the Cisco PIX Firewall
- Apr 11, 2003
|
52. | - Home Network Router Security Secrets
- Apr 7, 2006
- Ever delve inside your home network routers and use the hidden security settings that can lock down a network nice and tight? Most people never do. Andy Walker reveals 10 secrets on how to easily access your router's security settings.
|
53. | - Host Intrusion Prevention Systems: Defense-in-Depth's Best Friend
- Jul 1, 2005
- Chad Sullivan takes a look at common security issues and how host Intrusion Prevention Systems (IPS) can become the most crucial piece of your corporate layered security plan.
|
54. | - Identifying and Classifying Network Security Threats
- Jun 26, 2008
- This chapter presents several best practices and methodologies you can use to successfully and quickly identify and classify security threats and anomalies in the network.
|
55. | - Improve Your Network's Security Using Network Admission Control
- Aug 26, 2005
- Is there a place for security focused on the good guys in networking? There is, and one of the latest additions to this area of security is called Network Admission Control (NAC). Sean Convery introduces NAC, a security measure built around the idea that asking specific questions of an organization's end hosts can improve the overall security of a network by improving the compliance of end systems to a given admission policy.
|
56. | - Intrusion Detection Systems
- Feb 15, 2002
- Intrusion Detection Systems (IDSs) are basically burglar alarms for your computer network. Earl Carter shows you that understanding how they operate can enable you to determine if and how you can use an IDS to protect your network.
|
57. | - Intrusion Detection: Cisco IDS Overview
- Dec 28, 2001
- Cisco Secure IDS is a network-based intrusion detection system that uses a signature database to trigger intrusion alarms.
|
58. | - Intrusion Prevention: Signatures and Actions
- May 26, 2006
- Attack signatures have been around for long enough that the definition should be universally understood, but that's not the case. Simply put, an IPS signature is any distinctive characteristic that identifies something. Using this definition, all IPS products use signatures of some kind, regardless of what the product descriptions claim. To find something and stop it, you must be able to identify it, and for you to identify it, it must display a distinct characteristic. This chapter introduces you to the concept of signatures.
|
59. | - IP Network Traffic Plane Security Concepts
- Jun 18, 2008
- This chapter introduces the concepts of defense in depth and breadth as applied to IP traffic plane security.
|
60. | - IPSec Authentication and Authorization Models
- Oct 21, 2005
- This chapter covers IPSec features and mechanisms that are primarily targeted at the authentication of remote access users. You'll learn about XAUTH, which provides extended authentication for IPSec telecommuters by using authentication schemes such as RADIUS. MODECFG uses a push model to push attributes to the IPSec client.
|