Page 12 - StudyBook.pdf
P. 12

xviii  Foreword
                   This section also addresses packet sniffing, the capture and examination of individual communi-
                   cations packets using protocol analyzer tools.
                ■  Communications Security:Wireless This section goes into detail about various protocols
                   used in wireless communication and security, including the Wireless Transport Layer Security
                   (WTLS) protocol and the Wired Equivalent Privacy (WEP) protocol. We also discuss the
                   Wireless Application Protocol (WAP), which is used for communications by wireless mobile
                   devices such as mobile phones, and the 802.1x standards for port-based authentication.
                ■  Infrastructure Security: Devices This section provides an overview of the plethora of hard-
                   ware devices that are involved in implementing network security, including firewalls, routers,
                   switches, wireless access points, modems, Remote Access Services (RAS) servers, telecom/PBX
                   equipment, hardware-based VPNs, Intrusion Detection Systems (IDSes), network monitoring
                   and diagnostic equipment, workstations, servers, and mobile communications devices.The role
                   each plays in network security will be examined.
                ■  Infrastructure Security: Media This section reviews the types of physical media over which
                   network communications can take place, including coaxial cable, unshielded and shielded
                   twisted pair (UTP/STP), and fiber optic cabling. We also look at removable media on which
                   computer data can be stored, including tape, recordable CD/DVD, hard disks, floppy diskettes,
                   flash media (Compact Flash, SD cards, MMC, SmartMedia, and memory sticks), and smart cards
                   (credit card sized devices that contain a tiny “computer on a chip” and are capable of both
                   storing and processing information.
                ■  Infrastructure Security: Security Topologies This section explores the ways in which
                   topological structure can impact security issues on a network, and it examines the concept of
                   security zones and how the network can be divided into areas (including the DMZ, intranet,
                   and extranet) for application of differing security levels. We also take a look at how virtual
                   LANs (VLANs) can be used in a security context, and the advantages of Network Address
                   Translation (NAT) and tunneling in creating an overall security plan.
                ■  Infrastructure Security: Intrusion Detection This section deals with IDS devices, both
                   network-based and host-based. Readers will learn the differences between active and passive
                   detection and where each fits into the security plan. We also discuss the role of honeypots and
                   honeynets in distracting, detecting, and identifying attackers, and we provide information on
                   incident response in relation to network intrusions and attacks.
                ■  Infrastructure Security: Security Baselines This section takes a three-pronged approach to
                   overall system hardening. We discuss how to harden (secure) computer/network operating sys-
                   tems, including the file system.The importance of applying hot fixes, service packs, patches, and
                   other security updates is emphasized. Next, we discuss hardening of the network, with a focus
                   on the importance of configuration/settings and use of access control lists (ACLs). Finally, we
                   discuss application hardening, with specifics on how to secure Web servers, e-mail servers, FTP
                   servers, DNS servers, Network News Transport Protocol (NNTP) servers, file and print servers,
                   Dynamic Host Configuration Protocol (DHCP) servers, and data repositories (including direc-
                   tory services and databases).
                ■  Basics of Cryptography This section introduces the concepts upon which encryption tech-
                   nologies are based, including symmetric and asymmetric algorithms and hashing algorithms.
                   Readers will learn how encryption can provide confidentiality, integrity, authentication, and
                   nonrepudiation.The use of digital signatures is discussed. We show readers how cryptographic
                   algorithms and digital certificates are used to create a Public Key Infrastructure (PKI) for vali-



       www.syngress.com
   7   8   9   10   11   12   13   14   15   16   17