๐”– Scriptorium
โœฆ   LIBER   โœฆ

๐Ÿ“

End-To-End Network Security: Defense-In-Depth

โœ Scribed by Santos, Omar


Publisher
Cisco Press; Pearson Education Inc
Year
2007
Tongue
English
Leaves
471
Category
Library

โฌ‡  Acquire This Volume

No coin nor oath required. For personal study only.

โœฆ Synopsis


End-to-End Network SecurityDefense-in-DepthBest practices for assessing and improving network defenses and responding to security incidents Omar Santos Information security practices have evolved from Internet perimeter protection to an in-depth defense model in which multiple countermeasures are layered throughout the infrastructure to address vulnerabilities and attacks. This is necessary due to increased attack frequency, diverse attack sophistication, and the rapid nature of attack velocity--all blurring the boundaries between the network and perimeter.End-to-End Network Securityis designed to counter the new generation of complex threats. Adopting this robust security strategy defends against highly sophisticated attacks that can occur at multiple locations in your network. The ultimate goal is to deploy a set of security capabilities that together create an intelligent, self-defending network that identifies attacks as they occur, generates alerts as appropriate, and then automatically responds.End-to-End Network Securityprovides you with a comprehensive look at the mechanisms to counter threats to each part of your network. The book starts with a review of network security technologies then covers the six-step methodology for incident response and best practices from proactive security frameworks. Later chapters cover wireless network security, IP telephony security, data center security, and IPv6 security. Finally, several case studies representing small, medium, and large enterprises provide detailed example configurations and implementation strategies of best practices learned in earlier chapters. Adopting the techniques and strategies outlined in this book enables you to prevent day-zero attacks, improve your overall security posture, build strong policies, and deploy intelligent, self-defending networks. "Within these pages, you will find many practical tools, both process related and technology related, that you can draw on to improve your risk mitigation strategies." --Bruce Murphy, Vice President, World Wide Security Practices, Cisco Omar Santos is a senior network security engineer at Cisco(R). Omar has designed, implemented, and supported numerous secure networks for Fortune 500 companies and the U.S. government. Prior to his current role, he was a technical leader within the World Wide Security Practice and the Cisco Technical Assistance Center (TAC), where he taught, led, and mentored many engineers within both organizations.
Guard your network with firewalls, VPNs, and intrusion prevention systems
Control network access with AAA
Enforce security policies with Cisco Network Admission Control (NAC)
Learn how to perform risk and threat analysis
Harden your network infrastructure, security policies, and procedures against security threats
Identify and classify security threats
Trace back attacks to their source
Learn how to best react to security incidents
Maintain visibility and control over your network with the SAVE framework
Apply Defense-in-Depth principles to wireless networks, IP telephony networks, data centers, and IPv6 networks This security book is part of the Cisco Press(R) Networking Technology Series. Security titles from Cisco Press help networking professionals secure critical data and resources, prevent and mitigate network attacks, and build end-to-end self-defending networks. Category: Networking: Security Covers: Network security and incident response

โœฆ Table of Contents


Cover......Page 1
Contents......Page 10
Foreword......Page 20
Introduction......Page 21
Part I: Introduction to Network Security Solutions......Page 26
Firewalls......Page 28
Virtual Private Networks (VPN)......Page 35
Intrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS)......Page 42
Anomaly Detection Systems......Page 45
Authentication, Authorization, and Accounting (AAA) and Identity Management......Page 46
Network Admission Control......Page 50
Routing Mechanisms as Security Tools......Page 59
Summary......Page 62
Part II: Security Lifestyle: Frameworks and Methodologies......Page 64
Risk Analysis......Page 66
Social Engineering......Page 72
Security Intelligence......Page 73
Creating a Computer Security Incident Response Team (CSIRT)......Page 75
Building Strong Security Policies......Page 77
Infrastructure Protection......Page 80
Endpoint Security......Page 113
Network Admission Control......Page 117
Summary......Page 120
Chapter 3 Identifying and Classifying Security Threats......Page 122
Network Visibility......Page 124
Telemetry and Anomaly Detection......Page 131
Intrusion Detection and Intrusion Prevention Systems (IDS/IPS)......Page 154
Summary......Page 162
Chapter 4 Traceback......Page 164
Traceback in the Service Provider Environment......Page 165
Traceback in the Enterprise......Page 170
Summary......Page 174
Adequate Incident-Handling Policies and Procedures......Page 176
Laws and Computer Crimes......Page 178
Security Incident Mitigation Tools......Page 179
Forensics......Page 183
Summary......Page 188
Collected Incident Data......Page 190
Root-Cause Analysis and Lessons Learned......Page 194
Building an Action Plan......Page 196
Summary......Page 197
Chapter 7 Proactive Security Framework......Page 200
SAVE Versus ITU-T X.805......Page 201
Identity and Trust......Page 206
Visibility......Page 212
Correlation......Page 215
Instrumentation and Management......Page 216
Isolation and Virtualization......Page 219
Policy Enforcement......Page 225
Visualization Techniques......Page 226
Summary......Page 230
Part III: Defense-In-Depth Applied......Page 232
Chapter 8 Wireless Security......Page 234
Overview of Cisco Unified Wireless Network Architecture......Page 235
Authentication and Authorization of Wireless Users......Page 239
Lightweight Access Point Protocol (LWAPP)......Page 259
Wireless Intrusion Prevention System Integration......Page 262
Management Frame Protection (MFP)......Page 266
Precise Location Tracking......Page 267
Network Admission Control (NAC) in Wireless Networks......Page 268
Summary......Page 282
Chapter 9 IP Telephony Security......Page 284
Protecting the IP Telephony Infrastructure......Page 285
Securing the IP Telephony Applications......Page 298
Protecting Against Eavesdropping Attacks......Page 316
Summary......Page 318
Protecting the Data Center Against Denial of Service (DoS) Attacks and Worms......Page 320
Data Center Segmentation and Tiered Access Control......Page 326
Deploying Network Intrusion Detection and Prevention Systems......Page 345
Deploying the Cisco Security Agent (CSA) in the Data Center......Page 348
Summary......Page 350
Chapter 11 IPv6 Security......Page 352
Reconnaissance......Page 353
Filtering in IPv6......Page 354
Header Manipulation and Fragmentation......Page 356
IPv6 Routing Security......Page 357
IPsec and IPv6......Page 358
Summary......Page 360
Part IV Case Studies......Page 362
Case Study of a Small Business......Page 364
Case Study of a Medium-Sized Enterprise......Page 412
Case Study of a Large Enterprise......Page 424
Summary......Page 443
A......Page 446
C......Page 448
E......Page 451
F......Page 452
I......Page 453
L......Page 457
N......Page 458
P......Page 459
R......Page 460
S......Page 462
T......Page 464
V......Page 466
Z......Page 467


๐Ÿ“œ SIMILAR VOLUMES


End-to-End Network Security: Defense-in-
โœ Omar Santos ๐Ÿ“‚ Library ๐Ÿ“… 2007 ๐Ÿ› Cisco Press ๐ŸŒ English

<P style="MARGIN: 0px"> <I>End-to-End Network Security</I> </P> <P style="MARGIN: 0px"> <I>Defense-in-Depth</I> </P> <P style="MARGIN: 0px">ย </P> <P style="MARGIN: 0px">Best practices for assessing and improving network defenses and responding to security incidents</P> <P style="MARGIN: 0px">ย </

End-to-End Network Security: Defense-in-
โœ Omar Santos ๐Ÿ“‚ Library ๐Ÿ“… 2007 ๐Ÿ› Cisco Press ๐ŸŒ English

<P style="MARGIN: 0px"> <I>End-to-End Network Security</I> </P> <P style="MARGIN: 0px"> <I>Defense-in-Depth</I> </P> <P style="MARGIN: 0px">ย </P> <P style="MARGIN: 0px">Best practices for assessing and improving network defenses and responding to security incidents</P> <P style="MARGIN: 0px">ย </

End-to-end Network Security: Defense-in-
โœ Omar Santos ๐Ÿ“‚ Library ๐Ÿ› Cisco Systems ๐ŸŒ English

This title teaches readers how to counter the new generation of complex threats. Adopting this robust security strategy defends against highly sophisticated attacks that can occur at multiple locations in an organization's network.

End-to-End Network Security: Defense-in-
โœ Omar Santos ๐Ÿ“‚ Library ๐Ÿ“… 2007 ๐ŸŒ English

End-to-End Network Security is designed to counter the new generation of complex threats. Adopting this robust security strategy defends against highly sophisticated attacks that can occur at multiple locations in your network. The ultimate goal is to deploy a set of security capabilities that toget

End-to-End Network Security: Defense-in-
โœ Omar Santos ๐Ÿ“‚ Library ๐Ÿ“… 2008 ๐Ÿ› Cisco Press ๐ŸŒ English

End-to-End Network Security is designed to counter the new generation of complex threats. Adopting this robust security strategy defends against highly sophisticated attacks that can occur at multiple locations in your network. The ultimate goal is to deploy a set of security capabilities that toget

Network Perimeter Security: Building Def
โœ Cliff Riggs ๐Ÿ“‚ Library ๐Ÿ“… 2003 ๐Ÿ› Unknown ๐ŸŒ English

Network Perimeter Security: Building Defense In-Depth reveals how readers can evaluate the security needs of their networks, develop a security policy for their companies, and create a budget based upon that policy. It assists them in designing the security model and outlines the testing process. Th