All you need to know about defending networks, in one book
Clearly explains concepts, terminology, challenges, tools, and skills
Covers key security standards and models for business and government
The perfect introduction for all network/computer security professionals and students
Welcome to today's most useful and practical introduction to defending modern networks. Drawing on decades of experience, Chuck Easttom brings together updated coverage of all the concepts, terminology, techniques, and solutions you'll need to be effective.
Easttom thoroughly introduces the core technologies of modern network security, including firewalls, intrusion-detection systems, and VPNs. Next, he shows how encryption can be used to safeguard data as it moves across networks.
You'll learn how to harden operating systems, defend against malware and network attacks, establish robust security policies, and assess network security using industry-leading standards and models. You'll also find thorough coverage of key issues such as physical security, forensics, and cyberterrorism.
Throughout, Easttom blends theory and application, helping you understand both what to do and why. In every chapter, quizzes, exercises, projects, and web resources deepen your understanding and help you use what you've learned—in the classroom and in your career.
Students will learn how to:
Evaluate key network risks and dangers
Choose the right network security approach for your organization
Anticipate and counter widespread network attacks, including those based on "social engineering"
Successfully deploy and apply firewalls and intrusion detection systems
Secure network communication with virtual private networks
Protect data with cryptographic public/private key systems, digital signatures, and certificates
Defend against malware, including ransomware, Trojan horses, and spyware
Harden operating systems and keep their security up to date
Define and implement security policies that reduce risk
Explore leading security standards and models, including International Organization for
Standardization (ISO) and National Institute of Technology (NIST) standards
Prepare for an investigation if your network has been attacked
Understand the growing risks of espionage and cyberterrorism
Preface xxiii
CHAPTER 1: INTRODUCTION TO NETWORK SECURITY 2
Introduction
The Basics of a Network
Basic Network Utilities
The OSI Model
What Does This Mean for Security?
Assessing Likely Threats to the Network
Classifications of Threats
Likely Attacks
Threat Assessment
Understanding Security Terminology
Choosing a Network Security Approach
Network Security and the Law
Using Security Resources
Summary
Endnotes
Chapter 2: Types of Attacks 42
Introduction
Understanding Denial of Service Attacks
Defending Against Buffer Overflow Attacks
Defending Against IP Spoofing
Defending Against Session Hijacking
Blocking Virus and Trojan Horse Attacks
Summary
Endnotes
CHAPTER 3: FUNDAMENTALS OF FIREWALLS 82
Introduction
What Is a Firewall?
Implementing Firewalls
Firewall Deployment
Selecting and Using a Firewall
Using Proxy Servers
Summary
CHAPTER 4: FIREWALL PRACTICAL APPLICATIONS 106
Introduction
Using Single Machine Firewalls
Windows 10 Firewall
User Account Control
Linux Firewalls
Using Small Office/Home Office Firewalls
Using Medium-Sized Network Firewalls
Using Enterprise Firewalls
Summary
Endnotes
CHAPTER 5: INTRUSION-DETECTION SYSTEMS 132
Introduction
Understanding IDS Concepts
IDS Components and Processes
SIEM
Evasion Techniques
Understanding and Implementing IDSs
Understanding and Implementing Honeypots
Summary
CHAPTER 6: ENCRYPTION FUNDAMENTALS 152
Introduction
The History of Encryption
Learning About Modern Encryption Methods
Identifying Good Encryption
Understanding Digital Signatures and Certificates
MAC and HMAC
Understanding and Using Decryption
Cracking Passwords
Steganography
Steganalysis
Quantum Computing and Quantum Cryptography
Summary
Endnote
CHAPTER 7: VIRTUAL PRIVATE NETWORKS 194
Introduction
Basic VPN Technology
Using VPN Protocols for VPN Encryption
IPsec
SSL/TLS
Other VPN Protocols
Implementing VPN Solutions
Summary
Endnotes
CHAPTER 8: OPERATING SYSTEM HARDENING 222
Introduction
Configuring Windows Properly
Configuring Linux Properly
Patching the Operating System
Configuring Browsers
Summary
CHAPTER 9: DEFENDING AGAINST VIRUS ATTACKS 260
Introduction
Understanding Virus Attacks
Virus Scanners
Virus Scanning Techniques
When Antivirus Causes a Problem
Commercial Antivirus Software
Antivirus Policies and Procedures
Additional Methods for Defending Your System
What to Do If Your System Is Infected by a Virus
Summary
Endnotes
CHAPTER 10: DEFENDING AGAINST TROJAN HORSES AND PHISHING 296
Introduction
Trojan Horses
Phishing
Summary
Endnotes
CHAPTER 11: SECURITY POLICIES 318
Introduction
ISO 27002
Important Standards
Defining User Policies
Defining System Administration Policies
Defining Access Control
Defining Developmental Policies
Disaster Recovery
Summary
CHAPTER 12: ASSESSING SYSTEM SECURITY 346
Introduction
Risk Assessment Concepts
Evaluating the Security Risk
Conducting the Initial Assessment
Probing the Network
Vulnerabilities
McCumber Cube
Security Documentation
Summary
CHAPTER 13: SECURITY STANDARDS 394
Introduction
COBIT
ISO Standards
NIST Standards
U.S. DoD Standards
Using the Common Criteria
Using Security Models
U.S. Federal Regulations, Guidelines, and Standards
Summary
Endnotes
CHAPTER 14: PHYSICAL SECURITY AND DISASTER RECOVERY 422
Introduction
Physical Security
Disaster Recovery
Ensuring Fault Tolerance
Summary
CHAPTER 15: TECHNIQUES USED BY ATTACKERS 438
Introduction
Preparing to Hack
The Attack Phase
Session Hijacking
Wi-Fi Hacking
Bluetooth Hacking
Summary
CHAPTER 16: INTRODUCTION TO FORENSICS 466
Introduction
General Forensics Guidelines
FBI Forensics Guidelines
Imaging a Drive
Finding Evidence on the PC
Gathering Evidence from a Cell Phone
Forensic Tools to Use
AccessData Forensic Toolkit
EnCase
The Sleuth Kit
OSForensics
Forensic Science
To Certify or Not to Certify?
Expert Witnesses
Additional Types of Forensics
Summary
Endnote
CHAPTER 17: CYBER WARFARE AND TERRORISM 504
Introduction
Defending Against Computer-Based Espionage
Defending Against Computer-Based Terrorism
Choosing Defense Strategies
Summary
Endnotes
Appendix A: Answers530
Glossary 542
William Easttom
Georgetown University and Vanderbilt University
Dr. Chuck Easttom is the author of 41 books, including several on computer security, forensics, and cryptography. He is also an inventor with 25 patents and the author of over 70 research papers. He holds a Doctor of Science in cybersecurity, a Ph.D. in nanotechnology, a Ph.D. in computer science, and three master's degrees (one in applied computer science, one in education, and one in systems engineering). He is a senior member of both the Institute of Electrical and Electronics Engineers (IEEE )and the Association of Computing Machinery (ACM). He is also a Distinguished Speaker of the ACM and a Distinguished Visitor of the IEEE. Dr. Easttom is currently an adjunct professor for Georgetown University and for Vanderbilt University.
This program is available in a variety of formats. You can review the individual prices for each ISBN in our catalog. All access codes are for use by 1 student, for 1 course, for up to 1 year, and are non-transferable.
Format
ISBN-13
Network Defense and Countermeasures
9780138200589
Not seeing what you’re looking for?
Check out our catalog
Review our leading CTE programs, including available formats, prices, and ISBNs. If you still don’t see what you’re looking for, our dedicated Pearson team can help.
Review our leading CTE programs, including available formats, prices, and ISBNs. If you still don’t see what you’re looking for, our dedicated Pearson team can help.