Appendix E. Resources

This appendix lists resources that you may find useful when securing your routers, systems, and networks. It also provides links to sites where you can find more detailed information on topics that are out of the scope of this book—including IPSec, RADIUS/TACACS+, and intrusion detection.

Web Sites

http://www.cisco.com

This site provides the most current information on Cisco routers and products. Cisco’s online technical documentation is excellent and should usually be the first stop for questions involving Cisco routers.

http://www.cisco.com/go/psirt

A direct link to Cisco’s Product Security Incident Response Team (PSIRT) and a list of all Cisco IOS vulnerabilities.

http://www.cisco.com/cgi-bin/Support/FeatureNav/FN.pl

Cisco’s feature navigator. It helps determine what IOS versions and hardware support features such as IPSec and SSH.

http://nsa1.www.conxion.com/cisco

NSA-recommended guides for securing Cisco routers.

http://nsa1.www.conxion.com

Additional NSA-recommended security guides.

http://www.securityfocus.com

A security site with excellent news, articles, tools, and vulnerability listings. SecurityFocus is also home to the Bugtraq vulnerability forum.

http://www.cert.org

The original Computer Emergency Response Team (CERT) based out of Carnegie Mellon. CERT is an excellent resource on vulnerabilities, fixes, and incident response.

http://www.sans.org

The System Administrator and Network Security web site. It is an excellent source for research and education in the area of information security.

http://www.gocsi.com

The Computer Security Institute web site. he source of the annual FBI/CSI computer crime and security survey.

http://web.mit.edu/kerberos/www

The MIT Kerberos web site.

http://www.de.easynet.net/tacacs-faq

The TACACS frequently asked questions web site (with a focus on Cisco).

http://www.ietf.org/html.charters/OLD/radius-charter.html

The IETF RADIUS workgroup with links to RFCs and RADIUS information.

http://www.ietf.org/html.charters/ipsec-charter.html

The IETF IPSec working group page with links to IPSec drafts and RFCs.

http://www.rfc-editor.org

A site where you can search RFCs by number, topic, and keyword.

http://www.simpleweb.org

A site with links to more information about SNMP.

http://net-snmp.sourceforge.net

A web site for the Net-SNMP open source SNMP server and client software.

http://www.liquifried.com/docs/security/reservednets.html

A large listing of IANA-reserved networks that can be included in antispoofing filters.

http://www.ietf.org/html.charters/syslog-charter.html

The IETF syslog working group with links to drafts and RFCs.

http://www.isaca.org

The Information Systems Audit and Control Association web site. This organization sponsors the Certified Information Systems Auditor (CISA) certification.

Books

  1. Boney, James. Cisco IOS in a Nutshell. O’Reilly & Associates, 2001.

  2. This book consolidates the most important commands and features of IOS into a single volume.

  3. Garfinkel, Simson and Gene Spafford. Practical Unix and Internet Security, Second Edition. O’Reilly & Associates, 1996.

  4. This classic reference is the definitive source of information on securing both standalone Unix systems and those connected to the Internet.

  5. Kaeo, Merike. Designing Network Security. Cisco Press, 1999.

  6. Cisco’s book on the fundamentals of Cisco network security.

  7. Norberg, Stefan. Securing Windows NT/2000 Servers for the Internet. O’Reilly & Associates, 2000.

  8. This concise guide simplifies the job of securing a Windows server by paring down installation and configuration instructions into a series of checklists.

  9. Schneier, Bruce. Applied Cryptography. John Wiley & Sons, 1995.

  10. An excellent reference and introduction to cryptography and standard encryption techniques and formulas.

  11. Sedayao, Jeff. Cisco IOS Access Lists. O’Reilly & Associates, 2001.

  12. This book focuses on a critical aspect of the Cisco IOS—access lists, which are central to securing routers and networks.

  13. van Wyk, Kenneth and Richard Forno. Incident Response. O’Reilly & Associates, 2001.

  14. This book combines technical information with guidelines for administrative planning so that organizations can map out their responses to computer incidents.

  15. Wenstrom, Michael. Managing Cisco Network Security. Cisco Press, 2001.

  16. Cisco’s overview of network security using Cisco products by Cisco Systems

  17. Zwicky, Elizabeth, Simon Cooper, and Brent Chapman. Building Internet Firewalls, Second Edition. O’Reilly & Associates, 2000.

  18. An excellent book on the complexities of designing and building firewalls.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
3.145.50.206