Network Security: The Complete Reference
Format: PDF / Kindle (mobi) / ePub
Teaches end-to-end network security concepts and techniques. Includes comprehensive information on how to design a comprehensive security defense model. Plus, discloses how to develop and deploy computer, personnel, and physical security policies, how to design and manage authentication and authorization methods, and much more.
workstations, as well as access to the network and Internet by most employees. You will also want to have a separate AUP that addresses the practices of IT administrative staff. For example, IT pros have a higher level of access to systems than others and might not be held to the same restrictions of use as most employees. So a separate AUP should dictate what constitutes acceptable use of systems by them. Likewise, a more severe enforcement clause will lay out punishment for noncompliance. IT
Network Address Translation (NAT) Auditing and Logging Virtual Private Networks Summary References 12 Virtual Private Network Security How a VPN Works VPN Protocols IPSec Tunnel Mode Products L2TP over IPSec PPTP SSL VPNs Client/Server Remote Access Vulnerabilities and Threats Remote Dial-In Server Security Remote Client Security Site-to-Site Networking Vulnerabilities and Threats Summary 13 Wireless Network Security Radio Frequency Security Basics Layer 1 Security Solutions
spring leaks due to changing conditions. Proper consideration of how the security tools will be used to facilitate the business requirements improves the likelihood that the security tools will remain effective and adequate. Examples of security tools that should adhere to this principle include change management, security monitoring and management, and management of people and communication. More examples are shown in Figure 1-10. FIGURE 1-10 Business processes drive tool selection Before
performance monitoring, and the creation and deletion of databases. In some cases, users with server login permissions may be able to grant these permissions to other users. Therefore, it’s very important to fully understand the security architecture of the database server platform you’re depending on to keep your information safe. Another important consideration to keep in mind is that most relational database server platforms allow operating system administrators to have many implicit
records and equipment, 119 .pif files, description of and threat caused by, 733 PIN as weakness in Bluetooth security systems, explanation of, 286 ping, relationship to ICMP, 224–226 PKI (Public Key Infrastructure) CA hierarchy of, 518 certificate templates and enrollment in, 518 cross-certification in, 519 overview of, 517–518 revocation of certificates in, 519 role separation in, 519 structure and function of, 518 plaintext authentication, advisory about, 369 plaintext e-mail,