AcknowledgmentsIcons Used in This BookCommand Syntax ConventionsForewordIntroductionPart I. IntroductionChapter 1. Network Security OverviewDefining TrustWeaknesses and VulnerabilitiesResponsibilities for Network SecuritySecurity ObjectivesConclusionQ&AChapter 2. Understanding VulnerabilitiesThe Need for SecurityRisk and VulnerabilityTCP/IP Suite WeaknessesBuffer OverflowsSpoofing TechniquesSocial EngineeringConclusionQ&AChapter 3. Understanding DefensesDigital IDsIntrusion Detection SystemPC CardBased SolutionsPhysical SecurityEncrypted LoginFirewallsReusable PasswordsAntivirus SoftwareEncrypted FilesBiometricsConclusionQ&APart II. Building BlocksChapter 4. CryptographyCryptography versus CryptanalysisModern-Day TechniquesConclusionQ&AChapter 5. Security PoliciesDefining a Security Policy?Importance of a Security PolicyDevelopment ProcessIncident Handling ProcessSecurity WheelSample Security PolicyConclusionQ&AChapter 6. Secure DesignNetwork DesignPrinciplesNetwork DesignMethodologyReturn on InvestmentPhysical Security IssuesSwitches and HubsConclusionQ&APart III. Tools and TechniquesChapter 7. Web SecurityHardeningCase StudyConclusionQ&AChapter 8. Router SecurityBasic Router SecurityRouter Security to Protect the NetworkCBACCase StudyConclusionQ&AReferences in This ChapterChapter 9. FirewallsFirewall BasicsDifferent Types of FirewallsEnhancements for FirewallsCase Study: Placing Filtering Routers and FirewallsSummaryQ&AChapter 10. Intrusion Detection System ConceptsIntroduction to Intrusion DetectionHost-Based IDSsNetwork-Based IDSsIDS Management CommunicationsMonitoring the NetworkSensor MaintenanceCase Study: Deployment of IDS Sensors in the Organization and Their Typical PlacementConclusionQ&AChapter 11. Remote AccessAAA ModelAAA ServersLock-and-Key FeatureTwo-Factor IdentificationCase Study: Configuring Secure Remote AccessSummaryQ&AChapter 12. Virtual Private NetworksGeneric Routing Encapsulation TunnelsIP SecurityVPNs with IPSecCase Study: Remote Access VPNConclusionQ&AChapter 13. Public Key InfrastructurePublic Key DistributionTrusted Third PartyPKI TopologyEnrollment ProcedureRevocation ProcedureCase Study: Creating Your Own CAConclusionQ&AChapter 14. Wireless SecurityDifferent WLAN ConfigurationsWhat Is a WLAN?How Wireless WorksRisks of Open Wireless PortsWar-Driving and War-ChalkingSAFE WLAN Design Techniques and ConsiderationsCase Study: Adding Wireless Solutions to a Secure NetworkConclusionQ&AChapter 15. Logging and AuditingLoggingSYSLOGSimple Network Management ProtocolRemote MonitoringService Assurance AgentCase StudyConclusionQ&APart IV. AppendixesAppendix A. SAFE BlueprintIntroduction to the SAFE BlueprintSAFE Blueprint: Overview of the ArchitectureSummaryReferences in This AppendixAppendix B. SANS PoliciesSANS OverviewSANS Initiatives and ProgramsSecurity Policy ProjectIs It a Policy, a Standard, or a Guideline?References in This AppendixAppendix C. NSA GuidelinesSecurity GuidesReferences in This AppendixAppendix D. Answers to Chapter Q&AChapter 1 Q&AChapter 2 Q&AChapter 3 Q&AChapter 4 Q&AChapter 5 Q&AChapter 6 Q&AChapter 7 Q&AChapter 8 Q&AChapter 9 Q&AChapter 10 Q&AChapter 11 Q&AChapter 12 Q&AChapter 13 Q&AChapter 14 Q&AChapter 15 Q&ABibliographyBooksWebsite ReferencesIndex