Introduction |
Security Fundamentals / I: |
Basic Cryptography / 1: |
Cryptography |
Authentication and Authorization |
Namespace |
Key Management |
Key Escrow |
Summary |
Review Questions |
Security Technologies / 2: |
Identity Technologies |
Application Layer Security Protocols |
Transport Layer Security Protocols |
Network Layer Security |
Link-Layer Security Technologies |
Public Key Infrastructure and Distribution Models |
Applying Security Technologies to Real Networks / 3: |
Virtual Private Networks (VPNs) |
Wireless Networks |
Voice over IP (VoIP) Networks |
Routing Protocol Security / 4: |
Routing Basics |
Routing Protocol Security Details |
The Corporate Security Policy / II: |
Threats in an Enterprise Network / 5: |
Types of Threats |
Motivation of Threat |
Common Protocol Vulnerabilities |
Common Network Scenario Threats and Vulnerabilities |
Routing Protocols |
Social Engineering |
Considerations for a Site Security Policy / 6: |
Where to Begin |
Risk Management |
A Security Policy Framework |
Design and Implementation of the Corporate Security Policy / 7: |
Physical Security Controls |
Logical Security Controls |
Infrastructure and Data Integrity |
Data Confidentiality |
Security Policy Verification and Monitoring |
Policies and Procedures for Staff |
Security Awareness Training |
Incident Handling / 8: |
Building an Incident Response Team |
Detecting an Incident |
Handling an Incident |
Incident Vulnerability Mitigation |
Responding to the Incident |
Recovering from an Incident |
Practical Implementation / III: |
Securing the Corporate Network Infrastructure / 9: |
Identity - Controlling Network Device Access |
Integrity |
Network Availability |
Audit |
Implementation Examples |
Securing Internet Access / 10: |
Internet Access Architecture |
External Screening Router Architecture |
Advanced Firewall Architecture |
Securing Remote Dial-In Access / 11: |
Dial-In Security Concerns |
Authenticating Dial-In Users and Devices |
Authorization |
Accounting and Billing |
Using AAA with Specific Features |
Encryption for Virtual Dial-In Environments |
Securing VPN, Wireless, and VoIP Networks / 12: |
Virtual Private Networks |
Voice over IP Networks |
Review |
Questions |
Appendixes / IV: |
Sources of Technical Information / Appendix A: |
Reporting and Prevention Guidelines: Industrial Espionage and Network Intrusions / Appendix B: |
Port Numbers / Appendix C: |
Mitigating Distributed Denial-of-Service Attacks / Appendix D: |
Answers to Review Questions / Appendix E: |
Glossary |
Index |
Introduction |
Security Fundamentals / I: |
Basic Cryptography / 1: |
Cryptography |
Authentication and Authorization |
Namespace |