Computer Network Security
Home > Computing and Information Technology > Computer networking and communications > Network security > Computer Network Security
Computer Network Security

Computer Network Security


     0     
5
4
3
2
1



International Edition


X
About the Book

Developed in collaboration with a training and certification team from Cisco, Computer Network Security is an exploration of the state-of-the-art and good practices in setting up a secure computer system. Concrete examples are offered in each chapter, to help the reader to master the concept and apply the security configuration. This book is intended for students preparing for the CCNA Security Exam (210-260 IINS) ? whether at professional training centers, technical faculties, or training centers associated with the �Cisco Academy� program. It is also relevant to anyone interested in computer security, be they professionals in this field or users who want to identify the threats and vulnerabilities of a network to ensure better security.

Table of Contents:
Preface xi Introduction xiii Chapter 1. Fundamentals of Network Security 1 1.1. Introduction 1 1.1.1. The main objectives of securing a network 2 1.1.2. Information security terminology 2 1.2. Types of network security 4 1.2.1. Physical security 4 1.2.2. Logical security 4 1.2.3. Administrative security 5 1.3. The main risks related to the logical security of the network 5 1.3.1. Different kinds of network attacks 5 1.3.2. Network security measures 7 1.3.3. Vulnerability audit measures 8 1.4. Exercises to test learning 8 Chapter 2. Securing Network Devices 15 2.1. Types of network traffic 15 2.2. Securing the management plan 16 2.3. Securing passwords 16 2.4. Implementing connection restrictions 17 2.4.1. Configuring a login banner 17 2.4.2. Configuring connection parameters 17 2.5. Securing access through console lines, VTY and auxiliaries 18 2.5.1. Securing access through the console line and deactivating the auxiliary line 18 2.5.2. Securing VTY access with ssh 18 2.6. Allocation of administrative roles 19 2.6.1. Privilege levels of the IOS system 19 2.6.2. Configuring a privilege level 19 2.6.3. Setting a privilege level per user 20 2.6.4. Setting a privilege level for console, VTY, and auxiliary line access 20 2.6.5. Securing access with the management of “views” and “super-views” 21 2.6.6. Securing configuration files and the IOS system 22 2.6.7. Using automated security features 23 2.7. Securing the control plane 24 2.7.1. Introduction 24 2.7.2. MD5 authentication 24 2.7.3. Configuring OSPF protocol authentication 24 2.7.4. Configuring EIGRP protocol authentication 25 2.7.5. Configuring RIP authentication 26 2.8. Exercises for application 26 Chapter 3. Supervising a Computer Network 41 3.1. Introduction 41 3.2. Implementing an NTP server 42 3.2.1. Introduction to the NTP 42 3.2.2. How the NTP works 42 3.2.3. NTP configuration 43 3.3. Implementing a Syslog server 44 3.3.1. Introduction to the Syslog 44 3.3.2. How Syslog works 45 3.3.3. Configuring a Syslog client 46 3.4. Implementing the Simple Network Management Protocol (SNMP) 46 3.4.1. Introducing the SNMP 46 3.4.2. How SNMP works 47 3.4.3. SNMP configuration 49 3.5. Exercises for application 50 Chapter 4. Securing Access Using AAA 67 4.1. Introduction 67 4.2. AAA authentication 68 4.2.1. Local AAA authentication 68 4.2.2. AAA authentication based on a server 69 4.3. AAA authorizations 71 4.4. AAA traceability 71 4.5. Exercises for application 72 Chapter 5. Using Firewalls 79 5.1. Introducing firewalls 80 5.2. Types of firewalls 80 5.3. Setting up a firewall 80 5.4. Different firewall strategies 81 5.5. ACL-based firewalls 81 5.5.1. Introduction 81 5.5.2. The location of ACLs 81 5.5.3. IPv4 ACLs 81 5.5.4. IPv6 ACLs 82 5.5.5. ACL recommendation 83 5.6. Zone-based firewalls 84 5.6.1. Introduction 84 5.6.2. Types of security zones in a network 84 5.6.3. Rules applied to interzone traffic 85 5.6.4. Terminology 86 5.6.5. Configuring a ZFW 86 5.7. Creating zones 86 5.8. Creating Class-Maps 86 5.9. Creating the Policy-Map to apply the Class-Maps 87 5.10. Defining the zone pairs 87 5.11. Applying the policy maps to the zone pairs 87 5.12. Assigning interfaces to zones 87 5.13. Exercises for application 88 Chapter 6. Putting in Place an Intrusion Prevention System (IPS) 101 6.1. Introduction to a detector 102 6.2. The differences between an IDS and an IPS 102 6.3. Types of IPS 103 6.4. Cisco IP solutions 103 6.5. Modes of deploying IPS 103 6.6. Types of alarms 104 6.7. Detecting malicious traffic 104 6.7.1. Modes of detection 104 6.7.2. Signature-based detection 104 6.7.3. Other modes of detecting malicious traffic 105 6.8. Signature micro-engines 106 6.9. Severity levels of the signatures 107 6.10. Monitoring and managing alarms and alerts 108 6.11. List of actions to be taken during an attack 108 6.12. Configuration of an IOS IPS 109 6.13. Recommended practices 111 6.14. Exercises for application 112 Chapter 7. Securing a Local Network 125 7.1. Introduction 125 7.2. Types of attacks on Layer 2 126 7.2.1. MAC address flooding attacks 126 7.2.2. MAC spoofing attack 127 7.2.3. The DHCP starvation attack 127 7.2.4. VLAN hopping attacks 128 7.2.5. STP-based attacks 130 7.3. The best security practices for protecting Layer 2 131 7.4. Exercises for application 132 Chapter 8. Cryptography 143 8.1. Basic concepts in cryptography 143 8.1.1. Definition 143 8.1.2. Terminology 144 8.2. The different classifications of cryptology 144 8.2.1. Traditional cryptography 145 8.2.2. Modern cryptography 146 8.2.3. Symmetric and asymmetric encryption 147 8.3. Key management 149 8.3.1. Introduction 149 8.3.2. Diffie-Hellman key exchange 149 8.4. Hash functions 151 8.5. HMAC codes 151 8.6. Asymmetric cryptography 151 8.6.1. Introduction 151 8.6.2. How it works 152 8.6.3. Digital signatures 153 8.6.4. Public key infrastructure 155 8.7. Exercises for application 159 Chapter 9. IPsec VPNs 173 9.1. The IPsec protocol 173 9.1.1. Objectives of IPsec 173 9.1.2. Basic IPsec protocols 174 9.1.3. The IPsec framework 174 9.1.4. The IPsec security association 175 9.1.5. IPsec modes 175 9.2. IKE protocol 176 9.2.1. Introduction 176 9.2.2. Components of IKE 176 9.2.3. IKE phases 176 9.3. The site-to-site VPN configuration 178 9.3.1. Introduction 178 9.3.2. Configuration of IPsec VPN 179 9.4. Exercises for application 181 Chapter 10. Studying Advanced Firewalls 189 10.1. Cisco ASA firewalls 189 10.1.1. Introduction 189 10.1.2. ASA models 190 10.1.3. Modes for using ASA devices 190 10.1.4. An overview of ASA 5505 191 10.1.5. ASA levels of security 192 10.1.6. Configuring an ASA with CLI 193 10.2. Exercises for application 198 10.3. Configuring Cisco elements with graphical tools 210 10.3.1. An overview of the CCP 210 10.3.2. An overview of the ASDM 210 10.3.3. Using CCP and ASDM 210 10.4. The TMG 2010 firewall 211 10.4.1. Introduction 211 10.4.2. Installation and configuration 211 References 243 Index 245

About the Author :
Ali Sadiqui is a trainer-researcher at the Office de la Formation Professionnelle et de la Promotion du Travail (OFPPT), Morocco. He is a member of several research laboratories and obtained his doctorate from the Sidi Mohamed Ben Abdellah University, Morocco.


Best Sellers


Product Details
  • ISBN-13: 9781786305275
  • Publisher: ISTE Ltd and John Wiley & Sons Inc
  • Publisher Imprint: ISTE Ltd and John Wiley & Sons Inc
  • Height: 241 mm
  • No of Pages: 272
  • Returnable: N
  • Weight: 567 gr
  • ISBN-10: 1786305275
  • Publisher Date: 24 Jul 2020
  • Binding: Hardback
  • Language: English
  • Returnable: N
  • Spine Width: 19 mm
  • Width: 165 mm


Similar Products

Add Photo
Add Photo

Customer Reviews

REVIEWS      0     
Click Here To Be The First to Review this Product
Computer Network Security
ISTE Ltd and John Wiley & Sons Inc -
Computer Network Security
Writing guidlines
We want to publish your review, so please:
  • keep your review on the product. Review's that defame author's character will be rejected.
  • Keep your review focused on the product.
  • Avoid writing about customer service. contact us instead if you have issue requiring immediate attention.
  • Refrain from mentioning competitors or the specific price you paid for the product.
  • Do not include any personally identifiable information, such as full names.

Computer Network Security

Required fields are marked with *

Review Title*
Review
    Add Photo Add up to 6 photos
    Would you recommend this product to a friend?
    Tag this Book Read more
    Does your review contain spoilers?
    What type of reader best describes you?
    I agree to the terms & conditions
    You may receive emails regarding this submission. Any emails will include the ability to opt-out of future communications.

    CUSTOMER RATINGS AND REVIEWS AND QUESTIONS AND ANSWERS TERMS OF USE

    These Terms of Use govern your conduct associated with the Customer Ratings and Reviews and/or Questions and Answers service offered by Bookswagon (the "CRR Service").


    By submitting any content to Bookswagon, you guarantee that:
    • You are the sole author and owner of the intellectual property rights in the content;
    • All "moral rights" that you may have in such content have been voluntarily waived by you;
    • All content that you post is accurate;
    • You are at least 13 years old;
    • Use of the content you supply does not violate these Terms of Use and will not cause injury to any person or entity.
    You further agree that you may not submit any content:
    • That is known by you to be false, inaccurate or misleading;
    • That infringes any third party's copyright, patent, trademark, trade secret or other proprietary rights or rights of publicity or privacy;
    • That violates any law, statute, ordinance or regulation (including, but not limited to, those governing, consumer protection, unfair competition, anti-discrimination or false advertising);
    • That is, or may reasonably be considered to be, defamatory, libelous, hateful, racially or religiously biased or offensive, unlawfully threatening or unlawfully harassing to any individual, partnership or corporation;
    • For which you were compensated or granted any consideration by any unapproved third party;
    • That includes any information that references other websites, addresses, email addresses, contact information or phone numbers;
    • That contains any computer viruses, worms or other potentially damaging computer programs or files.
    You agree to indemnify and hold Bookswagon (and its officers, directors, agents, subsidiaries, joint ventures, employees and third-party service providers, including but not limited to Bazaarvoice, Inc.), harmless from all claims, demands, and damages (actual and consequential) of every kind and nature, known and unknown including reasonable attorneys' fees, arising out of a breach of your representations and warranties set forth above, or your violation of any law or the rights of a third party.


    For any content that you submit, you grant Bookswagon a perpetual, irrevocable, royalty-free, transferable right and license to use, copy, modify, delete in its entirety, adapt, publish, translate, create derivative works from and/or sell, transfer, and/or distribute such content and/or incorporate such content into any form, medium or technology throughout the world without compensation to you. Additionally,  Bookswagon may transfer or share any personal information that you submit with its third-party service providers, including but not limited to Bazaarvoice, Inc. in accordance with  Privacy Policy


    All content that you submit may be used at Bookswagon's sole discretion. Bookswagon reserves the right to change, condense, withhold publication, remove or delete any content on Bookswagon's website that Bookswagon deems, in its sole discretion, to violate the content guidelines or any other provision of these Terms of Use.  Bookswagon does not guarantee that you will have any recourse through Bookswagon to edit or delete any content you have submitted. Ratings and written comments are generally posted within two to four business days. However, Bookswagon reserves the right to remove or to refuse to post any submission to the extent authorized by law. You acknowledge that you, not Bookswagon, are responsible for the contents of your submission. None of the content that you submit shall be subject to any obligation of confidence on the part of Bookswagon, its agents, subsidiaries, affiliates, partners or third party service providers (including but not limited to Bazaarvoice, Inc.)and their respective directors, officers and employees.

    Accept

    New Arrivals


    Inspired by your browsing history


    Your review has been submitted!

    You've already reviewed this product!