Page 12 - StudyBook.pdf
P. 12
xviii Foreword
This section also addresses packet sniffing, the capture and examination of individual communi-
cations packets using protocol analyzer tools.
■ Communications Security:Wireless This section goes into detail about various protocols
used in wireless communication and security, including the Wireless Transport Layer Security
(WTLS) protocol and the Wired Equivalent Privacy (WEP) protocol. We also discuss the
Wireless Application Protocol (WAP), which is used for communications by wireless mobile
devices such as mobile phones, and the 802.1x standards for port-based authentication.
■ Infrastructure Security: Devices This section provides an overview of the plethora of hard-
ware devices that are involved in implementing network security, including firewalls, routers,
switches, wireless access points, modems, Remote Access Services (RAS) servers, telecom/PBX
equipment, hardware-based VPNs, Intrusion Detection Systems (IDSes), network monitoring
and diagnostic equipment, workstations, servers, and mobile communications devices.The role
each plays in network security will be examined.
■ Infrastructure Security: Media This section reviews the types of physical media over which
network communications can take place, including coaxial cable, unshielded and shielded
twisted pair (UTP/STP), and fiber optic cabling. We also look at removable media on which
computer data can be stored, including tape, recordable CD/DVD, hard disks, floppy diskettes,
flash media (Compact Flash, SD cards, MMC, SmartMedia, and memory sticks), and smart cards
(credit card sized devices that contain a tiny “computer on a chip” and are capable of both
storing and processing information.
■ Infrastructure Security: Security Topologies This section explores the ways in which
topological structure can impact security issues on a network, and it examines the concept of
security zones and how the network can be divided into areas (including the DMZ, intranet,
and extranet) for application of differing security levels. We also take a look at how virtual
LANs (VLANs) can be used in a security context, and the advantages of Network Address
Translation (NAT) and tunneling in creating an overall security plan.
■ Infrastructure Security: Intrusion Detection This section deals with IDS devices, both
network-based and host-based. Readers will learn the differences between active and passive
detection and where each fits into the security plan. We also discuss the role of honeypots and
honeynets in distracting, detecting, and identifying attackers, and we provide information on
incident response in relation to network intrusions and attacks.
■ Infrastructure Security: Security Baselines This section takes a three-pronged approach to
overall system hardening. We discuss how to harden (secure) computer/network operating sys-
tems, including the file system.The importance of applying hot fixes, service packs, patches, and
other security updates is emphasized. Next, we discuss hardening of the network, with a focus
on the importance of configuration/settings and use of access control lists (ACLs). Finally, we
discuss application hardening, with specifics on how to secure Web servers, e-mail servers, FTP
servers, DNS servers, Network News Transport Protocol (NNTP) servers, file and print servers,
Dynamic Host Configuration Protocol (DHCP) servers, and data repositories (including direc-
tory services and databases).
■ Basics of Cryptography This section introduces the concepts upon which encryption tech-
nologies are based, including symmetric and asymmetric algorithms and hashing algorithms.
Readers will learn how encryption can provide confidentiality, integrity, authentication, and
nonrepudiation.The use of digital signatures is discussed. We show readers how cryptographic
algorithms and digital certificates are used to create a Public Key Infrastructure (PKI) for vali-
www.syngress.com