You are previewing Network Defense and Countermeasures: Principles and Practices, Second Edition.
O'Reilly logo
Network Defense and Countermeasures: Principles and Practices, Second Edition

Book Description

Network Defense and Countermeasures:

Principles and Practices

Everything you need to know about modern network attacks and defense, in one book

Clearly explains core network security concepts, challenges, technologies, and skills

Thoroughly updated for the latest attacks and countermeasures

The perfect beginner’s guide for anyone interested in a network security career

Security is the IT industry’s hottest topic–and that’s where the hottest opportunities are, too. Organizations desperately need professionals who can help them safeguard against the most sophisticated attacks ever created–attacks from well-funded global criminal syndicates, and even governments.

Today, security begins with defending the organizational network. Network Defense and Countermeasures, Second Edition is today’s most complete, easy-to-understand introduction to modern network attacks and their effective defense.

From malware and DDoS attacks to firewalls and encryption, Chuck Easttom blends theoretical foundations with up-to-the-minute best-practice techniques. Starting with the absolute basics, he discusses crucial topics many security books overlook, including the emergence of network-based espionage and terrorism.

If you have a basic understanding of networks, that’s all the background you’ll need to succeed with this book: no math or advanced computer science is required. You’ll find projects, questions, exercises, case studies, links to expert resources, and a complete glossary–all designed to deepen your understanding and prepare you to defend real-world networks.

Chuck Easttom has worked in all aspects of IT, including network administration, software engineering, and IT management. For several years, he has taught IT topics in college and corporate environments, worked as an independent IT consultant, and served as an expert witness in court cases involving computers. He holds 28 industry certifications, including CISSP, ISSAP, Certified Ethical Hacker, Certified Hacking Forensics Investigator, EC Council Certified Security Administrator, and EC Council Certified Instructor. He served as subject matter expert for CompTIA in its development or revision of four certification tests, including Security+. He recently assisted the EC Council in developing its new advanced cryptography course. Easttom has authored 13 books on topics including computer security and crime.

Learn how to

  n  Understand essential network security concepts, challenges, and careers

  n  Learn how modern attacks work

  n  Discover how firewalls, intrusion detection systems (IDS), and virtual private networks (VPNs) combine to protect modern networks

  n  Select the right security technologies for any network environment

  n  Use encryption to protect information

  n  Harden Windows and Linux systems and keep them patched

  n  Securely configure web browsers to resist attacks

  n  Defend against malware

  n  Define practical, enforceable security policies

  n  Use the “6 Ps” to assess technical and human aspects of system security

  n  Detect and fix system vulnerability

  n  Apply proven security standards and models, including Orange Book, Common Criteria, and Bell-LaPadula

  n  Ensure physical security and prepare for disaster recovery

  n  Know your enemy: learn basic hacking, and see how to counter it

  n  Understand standard forensic techniques and prepare for investigations of digital crime

Table of Contents

  1. About This eBook
  2. Title Page
  3. Copyright Page
  4. Contents at a Glance
  5. Table of Contents
  6. About the Author
  7. Dedication
  8. Acknowledgments
  9. We Want to Hear from You!
  10. Reader Services
  11. Preface
    1. Audience
    2. Overview of the Book
  12. Chapter 1. Introduction to Network Security
    1. Introduction
    2. The Basics of a Network
    3. Basic Network Utilities
    4. The OSI Model
    5. What Does This Mean for Security?
    6. Assessing Likely Threats to the Network
    7. Classifications of Threats
    8. Likely Attacks
    9. Threat Assessment
    10. Understanding Security Terminology
    11. Choosing a Network Security Approach
    12. Network Security and the Law
    13. Using Security Resources
    14. Summary
    15. Test Your Skills
  13. Chapter 2. Types of Attacks
    1. Introduction
    2. Understanding Denial of Service Attacks
    3. Defending Against Buffer Overflow Attacks
    4. Defending Against IP Spoofing
    5. Defending Against Session Hacking
    6. Blocking Virus and Trojan Horse Attacks
    7. Summary
    8. Test Your Skills
  14. Chapter 3. Fundamentals of Firewalls
    1. Introduction
    2. What Is a Firewall?
    3. Implementing Firewalls
    4. Selecting and Using a Firewall
    5. Using Proxy Servers
    6. Summary
    7. Test Your Skills
  15. Chapter 4. Firewall Practical Applications
    1. Introduction
    2. Using Single Machine Firewalls
    3. Windows 7
    4. User Account Control
    5. Linux Firewalls
    6. Using Small Office/Home Office Firewalls
    7. Using Medium-Sized Network Firewalls
    8. Using Enterprise Firewalls
    9. Summary
    10. Test Your Skills
  16. Chapter 5. Intrusion-Detection Systems
    1. Introduction
    2. Understanding IDS Concepts
    3. Understanding and Implementing IDS Systems
    4. Understanding and Implementing Honey Pots
    5. Summary
    6. Test Your Skills
  17. Chapter 6. Encryption Fundamentals
    1. Introduction
    2. The History of Encryption
    3. Learning About Modern Encryption Methods
    4. Identifying Good Encryption
    5. Understanding Digital Signatures and Certificates
    6. Understanding and Using Decryption
    7. Cracking Passwords
    8. Steganography
    9. Steganalysis
    10. Exploring the Future of Encryption
    11. Summary
    12. Test Your Skills
  18. Chapter 7. Virtual Private Networks
    1. Introduction
    2. Basic VPN Technology
    3. Using VPN Protocols for VPN Encryption
    4. IPSec
    5. SSL
    6. Implementing VPN Solutions
    7. Summary
    8. Test Your Skills
  19. Chapter 8. Operating System Hardening
    1. Introduction
    2. Configuring Windows Properly
    3. Configuring Linux Properly
    4. Patching the Operating System
    5. Configuring Browsers
    6. Summary
    7. Test Your Skills
  20. Chapter 9. Defending Against Virus Attacks
    1. Introduction
    2. Understanding Virus Attacks
    3. Virus Scanners
    4. Antivirus Policies and Procedures
    5. Additional Methods for Defending Your System
    6. What to Do If Your System Is Infected by a Virus
    7. Summary
    8. Test Your Skills
  21. Chapter 10. Defending Against Trojan Horses, Spyware, and Adware
    1. Introduction
    2. Trojan Horses
    3. Spyware and Adware
    4. Summary
    5. Test Your Skills
  22. Chapter 11. Security Policies
    1. Introduction
    2. Defining User Policies
    3. Defining System Administration Policies
    4. Defining Access Control
    5. Defining Developmental Policies
    6. Summary
    7. Test Your Skills
  23. Chapter 12. Assessing System Security
    1. Introduction
    2. Evaluating the Security Risk
    3. Making the Initial Assessment
    4. Probing the Network
    5. Security Documentation
    6. Summary
    7. Test Your Skills
  24. Chapter 13. Security Standards
    1. Introduction
    2. Using the Orange Book
    3. Using the Rainbow Series
    4. Using the Common Criteria
    5. Using Security Models
    6. U.S. Federal Regulations, Guidelines, and Standards
    7. Summary
    8. Test Your Skills
  25. Chapter 14. Physical Security and Disaster Recovery
    1. Introduction
    2. Physical Security
    3. Disaster Recovery
    4. Ensuring Fault Tolerance
    5. Test Your Skills
  26. Chapter 15. Techniques Used by Attackers
    1. Introduction
    2. Preparing to Hack
    3. The Attack Phase
    4. Summary
    5. Test Your Skills
  27. Chapter 16. Introduction to Forensics
    1. Introduction
    2. General Forensics Guidelines
    3. FBI Forensics Guidelines
    4. Finding Evidence on the PC
    5. Gathering Evidence from a Cell Phone
    6. Forensic Tools to Use
    7. Summary
    8. Test Your Skills
  28. Chapter 17. Cyber Terrorism
    1. Introduction
    2. Defending Against Computer-Based Espionage
    3. Defending Against Computer-Based Terrorism
    4. Choosing Defense Strategies
    5. Summary
    6. Test Your Skills
  29. Appendix A. References
    1. Chapter 1
    2. Chapter 2
    3. Chapter 4
    4. Chapter 6
    5. Chapter 7
    6. Chapter 9
    7. Chapter 10
    8. Chapter 14
  30. Glossary
  31. Index