Want to Read. Delete Note Save Note. Check nearby libraries Library. Share this book Facebook. Last edited by ImportBot. August 21, History. An edition of Network Security Bible Subjects Computer Technology , Computer networks , Nonfiction , Computer security , Security measures , Computer networks, security measures. Not in Library. Libraries near you: WorldCat. Borrow Listen. Download for print-disabled.
Where are the cookies stored? Web bugs URL tracking Hidden frames Hidden fields Attacking Web Servers Account harvesting Enumerating directories Investigative searching Faulty authorization SQL injection Web Services Web service standards and protocols Service transport XML messaging Service description Service discovery Electronic mail E-mail Security The E-mail Risk Data vulnerabilities Simple e-mail vs.
Attacks involving malcode Privacy data Data integrity E-mail man-in-the-middle attacks E-mail replay attack The bottom line Spam Spam DoS Blacklisting Spam filters Maintaining e-mail confidentiality Maintaining e-mail integrity E-mail availability issues The E-mail Protocols SMTP IMAP E-mail Authentication Plain login Login authentication APOP Operating Safely When Using E-mail Be paranoid Mail client configurations Application versions Architectural considerations SSH tunnel Establish SSH session Configure e-mail clients SSH advantages and disadvantages Domain Name System DNS Basics Purpose of DNS Forward lookups Reverse lookups Handling Reverse Lookups Alternative approaches to name resolution Setting Up DNS Security Issues with DNS Misconfigurations Zone transfers Historical problems Specifying transfer sites TSIG for requiring certificates DNS Security Extensions Zone transfer alternatives Predictable query Ids Recursion and iterative queries DNS Attacks Simple DNS attacks Cache poisoning Designing DNS Split DNS Split-split DNS Master Slave DNS Detailed DNS Architecture Trust anchors and authentication chains Disadvantages or shortfalls Server Security General Server Risks Security by Design Maintain a security mindset Risk-based security controls Defense in depth Keep it simple and secure Respect the adversary Security awareness Business impact Establishing a secure development environment Management Configuration Control Board Network support for development Secure development practices Handling data Keeping code clean Choosing the language Input validation and content injection Cross-site scripting Stored procedures Dynamic scripting Screen for all unusual input Use encryption Test, test, test Operating Servers Safely Controlling the server configuration Physical security of the system Minimizing services System backups Controlling users and access Passwords Monitoring, auditing, and logging Server Applications Data sharing FTP servers LDAP Peer to peer Instant messaging and chat Background The challenges of information control Building systems for information control Summary IV.
Network Security Fundamentals Network Protocols Protocols The Open Systems Interconnect Model The OSI Layers The Application layer The Presentation layer The Session layer The Transport layer The Network layer The Data Link layer The Physical layer Internet Protocol History of the Internet Protocol CIDR NAT IPv6 solution IPv6 multicast IPv6 anycast IPv6 address autoconfiguration IPv6 transition IPv6 header IPv7 and IPv8 solutions VoIP Using VoIP ATA IP phones Computer to computer The standard phone system: Circuit switching VoIP uses packet switching Deciding to use VoIP Security issues Risk factors Network design Use of softphones vs.
Voice and data crossover requirements VoIP server environments VoIP protocols Session-Initiated Protocol Wireless Security Electromagnetic Spectrum The Cellular Phone Network Placing a Cellular Telephone Call Cellular network evolution and transition to 4G System infrastructure Location discovery and handoff Synergy between local area and cellular networks Fault tolerance and network security Wireless Transmission Systems Time Division Multiple Access Frequency Division Multiple Access Code Division Multiple Access Wireless transmission system types Advanced Mobile Phone System Global System for Mobile Communications Cellular Digital Packet Data Personal Digital Cellular Total Access Communication System Nordic Mobile Telephone International Mobile Telephone Standard Universal Mobile Telecommunications Systems Pervasive Wireless Data Network Technologies Spread spectrum Spread spectrum basics Direct sequence spread spectrum Frequency Hopping Spread Spectrum Orthogonal Frequency Division Multiplexing The PHY layer The MAC layer IEEE Wireless channels Deployment and management Operational features The wireless network security stack Physical security and Wired Equivalent Privacy Extensible Authentication Protocol Key management Lightweight Extensible Authentication Protocol Wireless WAN security WEP WEP open authentication WEP shared key authentication WEP security upgrades Temporal Key Integrity Protocol Per-packet mixing function IV sequencing discipline Message Integrity Codes against forgery Rekeying against key reuse Application of AES in Additional Tools for testing and security wireless Bluetooth Wireless Application Protocol Future of Wireless Broadband wireless—Wimax WiMax and 3G cellular technologies Beyond the future: IEEE Network Architecture Fundamentals Network Segments Public networksxs Semi-private networks Private networks Perimeter Defense Network Address Translation Basic Architecture Issues Zero Configuration Networks Details of zero configuration networks What is required for zero configuration networks?
When should zero configuration networks be used? When should zero configuration networks not be used? Security issues with zero configuration networks Ways to exploit zero configuration networks Architecture and design Common Attacks Firewalls Packet-filtering firewalls Stateful packet filtering Proxy firewalls Disadvantages of firewalls Firewall rules Tiered architecture Multiple entry points Automated modification of rules Products for Managing Multiple Heterogeneous Rulesets Policy conflict examples in tiered architectures The Use of Personal Firewalls Corporate vs.
Iptables Blocking incoming traffic Blocking outgoing traffic Logging blocked traffic Advanced blocking techniques Intrusion Detection Systems Types of intrusion detection systems Host-based intrusion detection systems Network-based intrusion detection systems Intrusion prevention systems Methods and modes of intrusion detection Anomaly detection Pattern matching or misuse detection Detection issues Responses to Intrusion Detection Emerging Technologies in Intrusion Detection Systems Packet inspection methods Current packet inspection methods Emerging packet inspection methods Standards compliance Protocol anomaly detection Detecting malicious data Controlling operations Content matching Emerging security architecture and hardware Next generation packet inspection What's next in anomaly detection?
Intrusion prevention Summary V. Communication Secret Communication What is Cryptography? Why is crypto important? When is crypto good? When is crypto bad? Goals of Cryptography Confidentiality Integrity Availability Sub-goals Authentication Non-repudiation General Terms Principles of Cryptography You can't prove something is secure, only that it's not secure Algorithms and implementations aren't the same Never trust proprietary algorithms Strength of algorithm is based on secrecy of the key, not the algorithm Cryptography is more than SSL Cryptography must be built in — like electricity All cryptography is crackable; it's just a matter of time Secure today does not mean secure tomorrow Historic Cryptography Substitution ciphers Vigenere cipher XOR and random number generators Ciphers that shaped history The Four Cryptographic Primitives Random number generation Algorithms for pseudorandom number generation Using user input to generate numbers Whitening functions Cast Introduction Symmetric Encryption Stream ciphers Block ciphers Sharing keys Asymmetric encryption two-key encryption Using a certificate authority Using a web of trust Digital signatures Hash functions Keyed hash functions The Difference Between Algorithm and Implementation Difference between cryptographic primitives and protocols Proprietary Versus Open Source Algorithms Attacks on Hash Functions Attacks on MD4 Attacks on MD5 Attacks on SHA-0 Attacks on SHA-1 The future of hash functions Quantum Cryptography Quantum bits and quantum computation Secure communication channel Results Citations.
Figures and Tables from this paper. Citation Type. Has PDF. Publication Type. More Filters. View 1 excerpt, cites background. Cyber-security in smart grid: Survey and challenges. Highly Influenced. View 5 excerpts, cites background and methods. Patch Management Security.
0コメント