Network and System Security, Second Edition
Format: PDF / Kindle (mobi) / ePub
Network and System Security provides focused coverage of network and system security technologies. It explores practical solutions to a wide range of network and systems security issues. Chapters are authored by leading experts in the field and address the immediate and long-term challenges in the authors’ respective areas of expertise. Coverage includes building a secure organization, cryptography, system intrusion, UNIX and Linux security, Internet security, intranet security, LAN security; wireless network security, cellular network security, RFID security, and more.
- Chapters contributed by leaders in the field covering foundational and practical aspects of system and network security, providing a new level of technical expertise not found elsewhere
- Comprehensive and updated coverage of the subject area allows the reader to put current technologies to work
- Presents methods of analysis and problem solving techniques, enhancing the reader’s grasp of the material and ability to implement practical solutions
network security systems. Select systems that are easy to install and implement, are adaptable and quickly configurable, can be customized to suit your needs of today as well as tomorrow, and are supported by companies that keep pace with current trends in cracker technology. Contributors Tom Chen and Patrick Walsh (Chapter 4, “Guarding Against Network Intrusions”) continue by showing how to guard against network intrusions, by understanding the variety of attacks from exploits to malware to
Chunming Rong, Erdal Cayirci, Gansen Zhao and Laing Yan (Chapter 13, “RFID Security”) describe the RFID tags and RFID reader and back-end database in detail. Radio frequency identification (RFID) systems use RFID tags to annotate and identify objects. When objects are processed, an RFID reader is used to read information from the tags attached to the objects. The information will then be used with the data stored in the back-end databases to support the handling of business transactions.
www.syngress.com Preventing System Intrusions 73 intrusion is too late. And if an intrusion does occur, there should be a clear-cut system for determining the extent of damage; isolation of the exploited application, port, or machine; and a rapid response to closing the hole against further incursions. Recovery Your plan should also address the issue of recovery after an attack has occurred. You need to address issues such as how the network will be reconfigured to close off the exploited
such as a token’s cryptographic key, password length, whether a PIN is required, and whether it generates passwords based on internal clock timing or user PIN input are written into the token’s memory. When programming is complete, a file containing this information and the token’s serial number are imported into the authentication server so that the token’s characteristics are known. A token is assigned to a user by linking its serial number to the user’s record, stored in the system database.
on rights, translations, and bulk sales, contact Matt Pedersen, Commercial Sales Director and Rights; email firstname.lastname@example.org For information on all Syngress publications visit our Web site at www.syngress.com This book is dedicated to my wife Bee v This page intentionally left blank Contents Foreword ........................................................................................................XV Acknowledgments