Preface |
|
xix | |
Acknowledgments |
|
xxi | |
About the Authors |
|
xxiii | |
|
PART 1 Foundations of Network Security |
|
|
1 | (130) |
|
Chapter 1 Fundamentals Of Network Security |
|
|
3 | (28) |
|
What Is Network Security? |
|
|
4 | (3) |
|
|
5 | (1) |
|
Who---or What---Is Trustworthy? |
|
|
6 | (1) |
|
What Are Security Objectives? |
|
|
6 | (1) |
|
What Are You Trying to Protect? |
|
|
7 | (4) |
|
Seven Domains of a Typical IT Infrastructure |
|
|
8 | (3) |
|
Goals of Network Security |
|
|
11 | (1) |
|
How Can You Measure the Success of Network Security? |
|
|
11 | (1) |
|
Why Are Written Network Security Policies Important? |
|
|
12 | (1) |
|
|
12 | (1) |
|
Who Is Responsible for Network Security? |
|
|
12 | (1) |
|
Enhancing the Security of Wired Versus Wireless LAN Infrastructures |
|
|
13 | (1) |
|
Internal and External Network Issues |
|
|
14 | (3) |
|
Common Network Security Components Used to Mitigate Threats |
|
|
17 | (7) |
|
|
17 | (1) |
|
|
17 | (1) |
|
|
18 | (1) |
|
|
18 | (1) |
|
Network Address Translation |
|
|
19 | (3) |
|
|
22 | (1) |
|
|
22 | (1) |
|
Intrusion Detection Systems and Intrusion Prevention Systems |
|
|
23 | (1) |
|
|
24 | (1) |
|
|
24 | (4) |
|
|
24 | (2) |
|
|
26 | (1) |
|
|
27 | (1) |
|
|
27 | (1) |
|
|
28 | (1) |
|
|
29 | (1) |
|
|
30 | (1) |
|
Chapter 2 Network Security Threats |
|
|
31 | (36) |
|
Hackers and Their Motivation |
|
|
32 | (4) |
|
Favorite Targets of Hackers |
|
|
36 | (1) |
|
Threats from Internal Personnel and External Entities |
|
|
36 | (2) |
|
|
38 | (6) |
|
|
39 | (1) |
|
|
39 | (2) |
|
|
41 | (2) |
|
|
43 | (1) |
|
|
43 | (1) |
|
Common IT Infrastructure Threats |
|
|
44 | (2) |
|
Hardware Failures and Other Physical Threats |
|
|
44 | (1) |
|
|
45 | (1) |
|
|
45 | (1) |
|
|
46 | (3) |
|
Advanced Persistent Threat |
|
|
48 | (1) |
|
|
49 | (1) |
|
|
50 | (1) |
|
|
50 | (1) |
|
Hijack and Replay Attacks |
|
|
51 | (1) |
|
|
52 | (1) |
|
|
53 | (1) |
|
|
53 | (1) |
|
Session Hijacking, Spoofing, and Man-in-the-Middle Attacks |
|
|
54 | (3) |
|
|
54 | (1) |
|
|
55 | (1) |
|
Man-in-the-Middle Attacks |
|
|
56 | (1) |
|
|
57 | (2) |
|
Network and Resource Availability Threats |
|
|
59 | (3) |
|
|
59 | (1) |
|
Distributed Denial of Service (DDoS) |
|
|
60 | (2) |
|
|
62 | (1) |
|
|
62 | (1) |
|
|
63 | (1) |
|
|
64 | (1) |
|
|
65 | (2) |
|
Chapter 3 Common Network Topologies End Infrastructures |
|
|
67 | (30) |
|
What Is a Network Topology? |
|
|
68 | (1) |
|
|
68 | (8) |
|
What Differentiates Logical and Physical Topologies? |
|
|
76 | (8) |
|
Types of Physical Topologies |
|
|
77 | (4) |
|
|
81 | (2) |
|
Creating Logical Topologies |
|
|
83 | (1) |
|
Differences Between Internet Protocol Version 4 (IPv4) and Internet Protocol Version 6 (IPv6) |
|
|
84 | (3) |
|
|
86 | (1) |
|
Examples of Network Infrastructures and Related Security Concerns |
|
|
87 | (8) |
|
|
87 | (2) |
|
|
89 | (1) |
|
|
89 | (1) |
|
|
90 | (1) |
|
Thin Clients and Terminal Services |
|
|
91 | (1) |
|
Remote Control, Remote Access, and VPN |
|
|
91 | (2) |
|
|
93 | (2) |
|
|
95 | (1) |
|
|
95 | (1) |
|
|
96 | (1) |
|
Chapter 4 Network Design Considerations |
|
|
97 | (34) |
|
Network Design and Defense in Depth |
|
|
98 | (4) |
|
Achieving Defense in Depth through Layering |
|
|
99 | (2) |
|
|
101 | (1) |
|
Working with Senior Management |
|
|
102 | (1) |
|
|
102 | (2) |
|
Common Types of Addressing |
|
|
104 | (2) |
|
|
106 | (1) |
|
Controlling Communication Pathways |
|
|
106 | (4) |
|
|
107 | (1) |
|
|
107 | (1) |
|
Physical Access Management |
|
|
107 | (1) |
|
|
108 | (2) |
|
Intrusion Detection Systems and Intrusion Prevention Systems |
|
|
110 | (3) |
|
|
113 | (1) |
|
|
114 | (1) |
|
Authentication, Authorization, and Accounting |
|
|
115 | (3) |
|
|
118 | (1) |
|
Hosts: Local-Only or Remote and Mobile |
|
|
118 | (2) |
|
|
120 | (1) |
|
|
121 | (4) |
|
|
121 | (1) |
|
|
122 | (1) |
|
|
123 | (1) |
|
|
124 | (1) |
|
|
124 | (1) |
|
Risk Assessment and Management |
|
|
125 | (1) |
|
|
126 | (2) |
|
|
128 | (1) |
|
|
128 | (1) |
|
|
129 | (2) |
|
PART 2 Securing the Perimeter with Firewalls |
|
|
131 | (120) |
|
Chapter 5 Firewall Fundamentals |
|
|
133 | (40) |
|
|
134 | (7) |
|
|
138 | (3) |
|
Why Do You Need a Firewall? |
|
|
141 | (2) |
|
How Firewalls Work and What Firewalls Do |
|
|
143 | (5) |
|
|
148 | (2) |
|
Individual and SOHO Firewall Options |
|
|
150 | (7) |
|
Managing the Firewall on an ISP Connection Device |
|
|
152 | (1) |
|
Converting a Home Router into a Firewall |
|
|
153 | (4) |
|
Uses for Host Software Firewalls |
|
|
157 | (3) |
|
Examples of Software Firewall Products |
|
|
157 | (1) |
|
Using Windows 10's Host Software Firewall |
|
|
158 | (2) |
|
Using a Linux Host Software Firewall |
|
|
160 | (1) |
|
Uses for Commercial Software Network Firewalls |
|
|
160 | (1) |
|
Uses for Hardware/Appliance Firewalls |
|
|
161 | (1) |
|
Next-Generation Firewalls |
|
|
162 | (1) |
|
What Are Virtual Firewalls? |
|
|
162 | (1) |
|
Dual-Homed and Triple-Homed Firewalls |
|
|
163 | (1) |
|
Ingress and Egress Filtering |
|
|
164 | (1) |
|
|
164 | (3) |
|
|
164 | (1) |
|
Stateful Inspection and Dynamic Packet Filtering |
|
|
165 | (1) |
|
Network Address Translation |
|
|
166 | (1) |
|
|
166 | (1) |
|
|
167 | (1) |
|
|
167 | (1) |
|
Selecting the Right Firewall for Your Needs |
|
|
167 | (2) |
|
The Difference Between Buying and Building a Firewall |
|
|
169 | (1) |
|
|
170 | (1) |
|
|
170 | (1) |
|
|
171 | (2) |
|
Chapter 6 Firewall Implementation |
|
|
173 | (18) |
|
Examining Your Network and Its Security Needs |
|
|
174 | (3) |
|
|
174 | (1) |
|
|
175 | (2) |
|
Proper Firewall Implementation Procedure |
|
|
177 | (3) |
|
Constructing, Configuring, and Managing a Firewall |
|
|
180 | (1) |
|
|
180 | (1) |
|
|
181 | (1) |
|
Planning a Firewall Implementation with pfSense |
|
|
182 | (1) |
|
Firewalling a Small Organization: Packet Filtering or Application-Level Firewall, a Proxy Implementation |
|
|
182 | (1) |
|
Firewalling Medium and Large Organizations: Application-Level Firewall and Packet Filtering, a Hybrid System |
|
|
182 | (1) |
|
Firewalling in a Subnet Architecture |
|
|
183 | (1) |
|
Installing the pfSense Firewall |
|
|
183 | (3) |
|
Configuring a Firewall with pfSense |
|
|
186 | (1) |
|
Elements of Firewall Deployment |
|
|
186 | (1) |
|
Testing and Troubleshooting |
|
|
187 | (1) |
|
|
188 | (1) |
|
|
189 | (1) |
|
|
189 | (2) |
|
Chapter 7 Firewall Deployment Considerations |
|
|
191 | (32) |
|
Common Security Strategies for Firewall Deployments |
|
|
192 | (10) |
|
Security Through Obscurity |
|
|
192 | (2) |
|
|
194 | (1) |
|
|
195 | (1) |
|
|
195 | (1) |
|
|
196 | (3) |
|
|
199 | (1) |
|
|
199 | (1) |
|
|
200 | (1) |
|
Forced Universal Participation |
|
|
200 | (2) |
|
Authentication, Authorization, and Accounting |
|
|
202 | (2) |
|
Placement of Network Hardware Firewalls |
|
|
204 | (1) |
|
Benefit and Purpose of Reverse Proxy |
|
|
205 | (1) |
|
Use and Benefit of Port Forwarding |
|
|
206 | (1) |
|
Considerations for Selecting a Bastion Host OS |
|
|
207 | (1) |
|
|
208 | (2) |
|
Understanding and Interpreting Firewall Logs and Alerts |
|
|
210 | (4) |
|
Intrusion Detection Systems and Intrusion Prevention Systems |
|
|
214 | (1) |
|
Security Event and Information Management |
|
|
215 | (1) |
|
Evaluating Needs and Solutions in Designing Security |
|
|
216 | (2) |
|
What Happens When Security Gets in the Way of Doing Business? |
|
|
218 | (1) |
|
|
219 | (1) |
|
|
220 | (1) |
|
|
220 | (3) |
|
Chapter 8 Configuring Firewalls |
|
|
223 | (28) |
|
|
224 | (3) |
|
Inbound and Outbound Communications |
|
|
226 | (1) |
|
|
227 | (1) |
|
|
227 | (5) |
|
|
232 | (2) |
|
What Should You Allow and What Should You Block? |
|
|
234 | (2) |
|
Essential Elements of a Firewall Policy |
|
|
236 | (2) |
|
|
238 | (2) |
|
|
240 | (2) |
|
The Downside of Encryption with Firewalls |
|
|
242 | (2) |
|
|
244 | (1) |
|
|
245 | (3) |
|
|
248 | (1) |
|
|
248 | (1) |
|
|
249 | (2) |
|
PART 3 Establishing Remote Access with VPNs |
|
|
251 | (100) |
|
Chapter 9 Vpn Fundamentals |
|
|
253 | (30) |
|
What Is a Virtual Private Network? |
|
|
254 | (5) |
|
What Are the Benefits of Deploying a VPN? |
|
|
259 | (2) |
|
What Are the Limitations of a VPN? |
|
|
261 | (2) |
|
What Are Effective VPN Policies? |
|
|
263 | (1) |
|
VPN Deployment Models and Architecture |
|
|
263 | (4) |
|
|
263 | (2) |
|
|
265 | (2) |
|
Tunnel Versus Transport Mode |
|
|
267 | (1) |
|
The Relationship Between Encryption and VPNs |
|
|
268 | (10) |
|
|
269 | (1) |
|
|
270 | (4) |
|
|
274 | (1) |
|
Establishing VPN Connections with Cryptography |
|
|
275 | (3) |
|
|
278 | (1) |
|
What Is VPN Authentication? |
|
|
278 | (1) |
|
What Is VPN Authorization? |
|
|
279 | (1) |
|
|
280 | (1) |
|
|
281 | (1) |
|
|
281 | (2) |
|
Chapter 10 Vpn Management |
|
|
283 | (26) |
|
VPN Management Best Practices |
|
|
284 | (6) |
|
|
285 | (1) |
|
Choose the Right VPN Product for Your Environment |
|
|
285 | (1) |
|
|
286 | (1) |
|
|
286 | (1) |
|
|
286 | (1) |
|
Practice Vulnerability Management |
|
|
287 | (1) |
|
Use Multifactor Authentication |
|
|
288 | (1) |
|
Document Your Implementation Plan |
|
|
288 | (1) |
|
|
288 | (1) |
|
Perform Regular Reviews, Backups, and Updates |
|
|
289 | (1) |
|
|
290 | (1) |
|
Developing a VPN Deployment Plan |
|
|
291 | (5) |
|
|
292 | (1) |
|
Internally Connected Deployment |
|
|
293 | (1) |
|
|
294 | (2) |
|
|
296 | (4) |
|
Commercial Versus Open-Source VPNs |
|
|
300 | (1) |
|
Differences Between Personal and Enterprise VPNs |
|
|
301 | (1) |
|
Balancing Anonymity and Privacy |
|
|
301 | (1) |
|
Protecting VPN Security to Support Availability |
|
|
301 | (1) |
|
The Importance of User Training |
|
|
302 | (1) |
|
|
303 | (4) |
|
|
307 | (1) |
|
|
308 | (1) |
|
|
308 | (1) |
|
Chapter 11 Vpn Technologies |
|
|
309 | (18) |
|
Differences Between Software and Hardware Solutions |
|
|
310 | (2) |
|
|
310 | (1) |
|
|
311 | (1) |
|
Differences Between Layer 2 and Layer 3 VPNs |
|
|
312 | (1) |
|
Internet Protocol Security (IPSec) |
|
|
312 | (2) |
|
Layer 2 Tunneling Protocol (L2TP) |
|
|
314 | (1) |
|
Secure Sockets Layer (SSL)/Transport Layer Security (TLS) |
|
|
315 | (3) |
|
|
317 | (1) |
|
Secure Shell (SSH) Protocol |
|
|
318 | (2) |
|
Establishing Performance and Stability for VPNs |
|
|
320 | (2) |
|
|
320 | (1) |
|
|
321 | (1) |
|
Using VPNs with Network Address Translation (NAT) |
|
|
322 | (1) |
|
|
323 | (2) |
|
|
323 | (1) |
|
|
324 | (1) |
|
|
325 | (1) |
|
|
325 | (1) |
|
|
325 | (2) |
|
Chapter 12 Vpn Implementation |
|
|
327 | (24) |
|
Operating System-Based VPNs |
|
|
328 | (2) |
|
|
330 | (1) |
|
Configuring a Typical VPN Appliance |
|
|
331 | (1) |
|
Client-Side Configuration |
|
|
331 | (1) |
|
|
331 | (2) |
|
Using Remote Control Tools |
|
|
333 | (1) |
|
|
333 | (2) |
|
The Technology for Remote Use |
|
|
334 | (1) |
|
Choosing Between IPSec and SSL/TLS Remote Access VPNs |
|
|
335 | (1) |
|
|
335 | (1) |
|
|
335 | (1) |
|
|
335 | (1) |
|
|
336 | (1) |
|
|
336 | (1) |
|
DMZ, Extranet, and Intranet VPN Solutions |
|
|
337 | (2) |
|
|
337 | (1) |
|
|
338 | (1) |
|
|
339 | (1) |
|
Online Remote VPN Options |
|
|
339 | (1) |
|
|
339 | (1) |
|
|
339 | (1) |
|
|
340 | (1) |
|
|
340 | (1) |
|
Mac and Mobile Device Support |
|
|
340 | (1) |
|
|
340 | (1) |
|
Planning a VPN Implementation |
|
|
341 | (6) |
|
Download and Verify Installation Files |
|
|
342 | (1) |
|
|
342 | (1) |
|
|
342 | (2) |
|
|
344 | (1) |
|
Testing and Troubleshooting |
|
|
344 | (2) |
|
|
346 | (1) |
|
VPN Implementation Best Practices |
|
|
347 | (1) |
|
|
348 | (1) |
|
|
348 | (1) |
|
|
348 | (3) |
|
PART 4 Implementing Network Security |
|
|
351 | (76) |
|
Chapter 13 Firewall Security Management |
|
|
353 | (20) |
|
Best Practices for Firewall Management |
|
|
354 | (3) |
|
Security Measures in Addition to a Firewall |
|
|
357 | (1) |
|
Mitigating Firewall Threats and Exploits |
|
|
358 | (3) |
|
Concerns Related to Tunneling Through or Across a Firewall |
|
|
361 | (2) |
|
Testing Firewall Security |
|
|
363 | (1) |
|
Important Tools for Managing and Monitoring a Firewall |
|
|
364 | (2) |
|
Troubleshooting Firewalls |
|
|
366 | (3) |
|
Detecting Firewall Threats and Responding to Incidents |
|
|
369 | (1) |
|
|
370 | (1) |
|
|
370 | (1) |
|
|
370 | (3) |
|
Chapter 14 Best Practices For Network Security Management |
|
|
373 | (32) |
|
Essentials of Network Security Management |
|
|
374 | (4) |
|
Network Security Management Tools |
|
|
378 | (3) |
|
Security Plan and Security Policy |
|
|
379 | (1) |
|
|
380 | (1) |
|
Limiting Network Access and Implementing Encryption |
|
|
381 | (1) |
|
|
382 | (1) |
|
Techniques for Preventing and Deterring Incidents |
|
|
383 | (8) |
|
Imposing Compartmentalization |
|
|
384 | (1) |
|
Using Honeypots, Honeynets, and Padded Cells |
|
|
384 | (2) |
|
Antivirus, Monitoring, and Other Host Security Controls |
|
|
386 | (1) |
|
|
387 | (1) |
|
User Training, Security Awareness, and Ongoing Education |
|
|
388 | (3) |
|
|
391 | (3) |
|
|
392 | (1) |
|
|
393 | (1) |
|
|
393 | (1) |
|
|
393 | (1) |
|
|
393 | (1) |
|
|
393 | (1) |
|
Fail-Secure, Fail-Open, and Fail-Close Options |
|
|
394 | (1) |
|
Network Security Assessments and Testing |
|
|
395 | (3) |
|
|
396 | (1) |
|
|
396 | (1) |
|
|
396 | (1) |
|
|
397 | (1) |
|
Post-Mortem Assessment Review |
|
|
398 | (1) |
|
|
398 | (1) |
|
|
399 | (1) |
|
Network Security Troubleshooting |
|
|
400 | (2) |
|
|
402 | (1) |
|
|
403 | (1) |
|
|
403 | (2) |
|
Chapter 15 Emerging Technology And Regulatory Considerations |
|
|
405 | (22) |
|
What the Future Holds for Network Security, Firewalls, and VPNs |
|
|
406 | (5) |
|
|
407 | (1) |
|
|
407 | (1) |
|
|
407 | (1) |
|
|
408 | (1) |
|
|
409 | (1) |
|
|
409 | (1) |
|
|
410 | (1) |
|
|
410 | (1) |
|
|
410 | (1) |
|
|
411 | (1) |
|
Bring Your Own Device (BYOD) |
|
|
411 | (1) |
|
Resource Sites for Network Security, Firewalls, and VPNs |
|
|
411 | (1) |
|
|
411 | (1) |
|
Virtual Private Network Vendors |
|
|
411 | (1) |
|
Network Security Websites |
|
|
412 | (1) |
|
Network Security Magazine Websites |
|
|
412 | (1) |
|
Tools for Network Security, Firewalls, and VPNs |
|
|
412 | (1) |
|
Commercial Off-the-Shelf (COTS) Software |
|
|
412 | (1) |
|
Open-Source Applications and Tools |
|
|
413 | (1) |
|
The Vanishing Network Perimeter |
|
|
413 | (2) |
|
The Impact of Ubiquitous Wireless and Mobile Connectivity |
|
|
414 | (1) |
|
Making Wireless and Mobile Connectivity More Secure |
|
|
415 | (1) |
|
Potential Uses of Security Technologies |
|
|
415 | (2) |
|
Regulations and Compliance |
|
|
417 | (2) |
|
Specialized Firewalls Available |
|
|
419 | (2) |
|
Emerging Network Security Technologies |
|
|
421 | (2) |
|
|
421 | (1) |
|
|
421 | (1) |
|
|
421 | (1) |
|
|
422 | (1) |
|
VPNs, Firewalls, and Visualization |
|
|
422 | (1) |
|
|
423 | (1) |
|
|
424 | (1) |
|
|
424 | (3) |
Appendix A Answer Key |
|
427 | (2) |
Appendix B Standard Acronyms |
|
429 | (6) |
Glossary of Key Terms |
|
435 | (28) |
References |
|
463 | (6) |
Index |
|
469 | |