Network Security First-Step, Rough Cuts, 2nd Edition

Rough Cuts

  • Available to Safari Subscribers
  • About Rough Cuts
  • Rough Cuts are manuscripts that are developed but not yet published, available through Safari. Rough Cuts provide you access to the very latest information on a given topic and offer you the opportunity to interact with the author to influence the final publication.

Not for Sale

Also available in other formats.

  • Description
  • Sample Content
  • Updates
  • Copyright 2012
  • Dimensions: 7-3/8" x 9-1/8"
  • Pages: 552
  • Edition: 2nd
  • Rough Cuts
  • ISBN-10: 1-58720-415-0
  • ISBN-13: 978-1-58720-415-9

This is the Rough Cut version of the printed book.

Network Security first-step

Second Edition

Tom Thomas and Donald Stoddard

Your first step into the world of network security

  • No security experience required
  • Includes clear and easily understood explanations
  • Makes learning easy

Your first step to network security begins here!

  • Learn how hacker attacks work, from start to finish
  • Choose the right security solution for each type of risk
  • Create clear and enforceable security policies, and keep them up to date
  • Establish reliable processes for responding to security advisories
  • Use encryption effectively, and recognize its limitations
  • Secure your network with firewalls, routers, and other devices
  • Prevent attacks aimed at wireless networks

No security experience required!

Computer networks are indispensible, but they also are not secure. With the proliferation of security threats, many people and companies are looking for ways to increase the security of their networks and data. Before you can effectively implement security technologies and techniques, you need to make sense of this complex and quickly evolving world of hackers and malware, as well as the tools to combat them.

Network Security First-Step, Second Edition explains the basics of network security in easy-to-grasp language that all of us can understand. This book takes you on a guided tour of the core technologies that make up and control network security. Whether you are looking to take your first step into a career in network security or simply are interested in gaining knowledge of the technology, this book is for you!

Table of Contents

Introduction xxii

Chapter 1 There Be Hackers Here! 1

Essentials First: Looking for a Target 2

Hacking Motivations 3

Targets of Opportunity 4

    Are You a Target of Opportunity? 6

Targets of Choice 7

    Are You a Target of Choice? 7

The Process of an Attack 9

    Reconnaissance 9

    Footprinting (aka Casing the Joint) 11

    Scanning 18

    Enumeration 23

        Enumerating Windows 24

    Gaining Access 26

        Operating System Attacks 27

        Application Attacks 27

        Misconfiguration Attacks 28

        Scripted Attacks 29

    Escalating Privilege 30

    Covering Tracks 31

Where Are Attacks Coming From? 32

Common Vulnerabilities, Threats, and Risks 33

Overview of Common Attacks and Exploits 36

Network Security Organizations 39

    CERT Coordination Center 40

    SANS 40

    Center for Internet Security (CIS) 40

    SCORE 41

    Internet Storm Center 41

    National Vulnerability Database 41

    Security Focus 42

    Learning from the Network Security Organizations 42

Chapter Summary 43

Chapter Review 43

Chapter 2 Security Policies 45

Responsibilities and Expectations 50

    A Real-World Example 50

    Who Is Responsible? You Are! 50

        Legal Precedence 50

        Internet Lawyers 51

        Evolution of the Legal System 51

    Criminal Prosecution 52

        Real-World Example 52

        Individuals Being Prosecuted 53

        International Prosecution 53

Corporate Policies and Trust 53

    Relevant Policies 54

    User Awareness Education 54

    Coming to a Balance 55

    Corporate Policies 55

Acceptable Use Policy 57

    Policy Overview 57

    Purpose 58

    Scope 58