Contents

Introduction

Chapter 1 There Be Hackers Here!

Essentials First: Looking for a Target

Hacking Motivations

Targets of Opportunity

Are You a Target of Opportunity?

Targets of Choice

Are You a Target of Choice?

The Process of an Attack

Reconnaissance

Footprinting (aka Casing the Joint)

Scanning

Enumeration

Enumerating Windows

Gaining Access

Operating System Attacks

Application Attacks

Misconfiguration Attacks

Scripted Attacks

Escalating Privilege

Covering Tracks

Where Are Attacks Coming From?

Common Vulnerabilities, Threats, and Risks

Overview of Common Attacks and Exploits

Network Security Organizations

CERT Coordination Center

SANS

Center for Internet Security (CIS)

SCORE

Internet Storm Center

National Vulnerability Database

Security Focus

Learning from the Network Security Organizations

Chapter Summary

Chapter Review

Chapter 2 Security Policies

Responsibilities and Expectations

A Real-World Example

Who Is Responsible? You Are!

Legal Precedence

Internet Lawyers

Evolution of the Legal System

Criminal Prosecution

Real-World Example

Individuals Being Prosecuted

International Prosecution

Corporate Policies and Trust

Relevant Policies

User Awareness Education

Coming to a Balance

Corporate Policies

Acceptable Use Policy

Policy Overview

Purpose

Scope

General Use and Ownership

Security and Proprietary Information

Unacceptable Use

System and Network Activities

Email and Communications Activities

Enforcement

Conclusion

Password Policy

Overview

Purpose

Scope

General Policy

General Password Construction Guidelines

Password Protection Standards

Enforcement

Conclusion

Virtual Private Network (VPN) Security Policy

Purpose

Scope

Policy

Conclusion

Wireless Communication Policy

Scope

Policy Statement

General Network Access Requirements

Lab and Isolated Wireless Device Requirements

Home Wireless Device Requirements

Enforcement

Definitions

Revision History

Extranet Connection Policy

Purpose

Scope

Security Review

Third-Party Connection Agreement

Business Case

Point of Contact

Establishing Connectivity

Modifying or Changing Connectivity and Access

Terminating Access

Conclusion

ISO Certification and Security

Delivery

ISO/IEC 27002

Sample Security Policies on the Internet

Industry Standards

Payment Card Industry Data Security Standard (PCI DSS)

Sarbanes-Oxley Act of 2002 (SOX)

Health Insurance Portability and Accounting Act (HIPAA) of 1996

Massachusetts 201: Standards for the Protection of Personal Information of Residents of the Commonwealth

SAS 70 Series

Chapter Summary

Chapter Review

Chapter 3 Processes and Procedures

Security Advisories and Alerts: Getting the Intel You Need to Stay Safe

Responding to Security Advisories

Step 1: Awareness

Step 2: Incident Response

Step 3: Imposing Your Will

Steps 4 and 5: Handling Network Software Updates (Best Practices)

Industry Best Practices

Use a Change Control Process

Read All Related Materials

Apply Updates as Needed

Testing

Uninstall

Consistency

Backup and Scheduled Downtime

Have a Back-Out Plan

Forewarn Helpdesk and Key User Groups

Don’t Get More Than Two Service Packs Behind

Target Noncritical Servers/Users First

Service Pack Best Practices

Hotfix Best Practices

Service Pack Level Consistency

Latest Service Pack Versus Multiple Hotfixes

Security Update Best Practices

Apply Admin Patches to Install Build Areas

Apply Only on Exact Match

Subscribe to Email Notification

Summary

Chapter Review and Questions

Chapter 4 Network Security Standards and Guidelines

Cisco SAFE 2.0

Overview

Purpose

Cisco Validated Design Program

Branch/WAN Design Zone Guides

Campus Design Zone Guides

Data Center Design Zone Guides

Security Design Zone Guides

Cisco Best Practice Overview and Guidelines

Basic Cisco IOS Best Practices

Secure Your Passwords

Limit Administrative Access

Limit Line Access Controls

Limit Access to Inbound and Outbound Telnet (aka vty Port)

Establish Session Timeouts

Make Room Redundancy

Protect Yourself from Common Attacks

Firewall/ASAs

Encrypt Your Privileged User Account

Limit Access Control

Make Room for Redundant Systems

General Best Practices

Configuration Guides

Intrusion Prevention System (IPS) for IOS

NSA Security Configuration Guides

Cisco Systems

Switches Configuration Guide

VoIP/IP Telephony Security Configuration Guides

Microsoft Windows

Microsoft Windows Applications

Microsoft Windows 7/Vista/Server 2008

Microsoft Windows XP/Server 2003

Apple

Microsoft Security

Security Policies

Microsoft Windows XP Professional

Microsoft Windows Server 2003

Microsoft Windows 7

Windows Server 2008

Microsoft Security Compliance Manager

Chapter Summary

Chapter Link Toolbox Summary

Chapter 5 Overview of Security Technologies

Security First Design Concepts

Packet Filtering via ACLs

Grocery List Analogy

Limitations of Packet Filtering

Stateful Packet Inspection

Detailed Packet Flow Using SPI

Limitations of Stateful Packet Inspection

Network Address Translation (NAT)

Increasing Network Security

NAT’s Limitations

Proxies and Application-Level Protection

Limitations of Proxies

Content Filters

Limitations of Content Filtering

Public Key Infrastructure

PKI’s Limitations

Reputation-Based Security

Reactive Filtering Can’t Keep Up

Cisco Web Reputation Solution

AAA Technologies

Authentication

Authorization

Accounting

Remote Authentication Dial-In User Service (RADIUS)

Terminal Access Controller Access Control System (TACACS)

TACACS+ Versus RADIUS

Two-Factor Authentication/Multifactor Authentication

IEEE 802.1x: Network Access Control (NAC)

Network Admission Control

Cisco TrustSec

Solution Overview

Cisco Identity Services Engine

Chapter Summary

Chapter Review Questions

Chapter 6 Security Protocols

Triple DES Encryption

Encryption Strength

Limitations of 3DES

Advanced Encryption Standard (AES)

Different Encryption Strengths

Limitations of AES

Message Digest 5 Algorithm

MD5 Hash in Action

Secure Hash Algorithm (SHA Hash)

Types of SHA

SHA-1

SHA-2

Point-to-Point Tunneling Protocol (PPTP)

PPTP Functionality

Limitations of PPTP

Layer 2 Tunneling Protocol (L2TP)

L2TP Versus PPTP

Benefits of L2TP

L2TP Operation

Secure Shell (SSH)

SSH Versus Telnet

SSH Operation

Tunneling and Port Forwarding

Limitations of SSH

SNMP v3

Security Built In

Chapter Summary

Chapter Review Questions

Chapter 7 Firewalls

Firewall Frequently Asked Questions

Who Needs a Firewall?

Why Do I Need a Firewall?

Do I Have Anything Worth Protecting?

What Does a Firewall Do?

Firewalls Are “The Security Policy”

We Do Not Have a Security Policy

Firewall Operational Overview

Firewalls in Action

Implementing a Firewall

Determine the Inbound Access Policy

Determine Outbound Access Policy

Essentials First: Life in the DMZ

Case Studies

Case Study: To DMZ or Not to DMZ?

Firewall Limitations

Chapter Summary

Chapter Review Questions

Chapter 8 Router Security

Edge Router as a Choke Point

Limitations of Choke Routers

Routers Running Zone Based Firewall

Zone-Based Policy Overview

Zone-Based Policy Configuration Model

Rules for Applying Zone-Based Policy Firewall

Designing Zone-Based Policy Network Security

Using IPsec VPN with Zone-Based Policy Firewall

Intrusion Detection with Cisco IOS

When to Use the FFS IDS

FFS IDS Operational Overview

FFS Limitations

Secure IOS Template

Routing Protocol Security

OSPF Authentication

Benefits of OSPF Neighbor Authentication

When to Deploy OSPF Neighbor Authentication

How OSPF Authentication Works

Chapter Summary

Chapter Review Questions

Chapter 9 IPsec Virtual Private Networks (VPNs)

Analogy: VPNs Securely Connect IsLANds

VPN Overview

VPN Benefits and Goals

VPN Implementation Strategies

Split Tunneling

Overview of IPsec VPNs

Authentication and Data Integrity

Tunneling Data

VPN Deployment with Layered Security

IPsec Encryption Modes

IPsec Tunnel Mode

Transport Mode

IPsec Family of Protocols

Security Associations

ISAKMP Overview

Internet Key Exchange (IKE) Overview

IKE Main Mode

IKE Aggressive Mode

IPsec Security Association (IPsec SA)

IPsec Operational Overview

IKE Phase 1

IKE Phase 2

Perfect Forward Secrecy

Diffie-Hellman Algorithm

Router Configuration as VPN Peer

Configuring ISAKMP

Preshared Keys

Configuring the ISAKMP Protection Suite

Configuring the ISAKMP Key

Configuring IPsec

Step 1: Create the Extended ACL

Step 2: Create the IPsec Transforms

Step 3: Create the Crypto Map

Step 4: Apply the Crypto Map to an Interface

Firewall VPN Configuration for Client Access

Step 1: Define Interesting Traffic

Step 2: IKE Phase 1[udp port 500]

Step 3: IKE Phase 2

Step 4: Data Transfer

Step 5: Tunnel Termination

SSL VPN Overview

Comparing SSL and IPsec VPNs

Which to Deploy: Choosing Between IPsec and SSL VPNs

Remote-Access VPN Security Considerations

Steps to Securing the Remote-Access VPN

Cisco AnyConnect VPN Secure Mobility Solution

Chapter Summary

Chapter Review Questions

Chapter 10 Wireless Security

Essentials First: Wireless LANs

What Is Wi-Fi?

Benefits of Wireless LANs

Wireless Equals Radio Frequency

Wireless Networking

Modes of Operation

Coverage

Bandwidth Availability

WarGames Wirelessly

Warchalking

Wardriving

Warspamming

Warspying

Wireless Threats

Sniffing to Eavesdrop and Intercept Data

Denial-of-Service Attacks

Rogue/Unauthorized Access Points

Misconfiguration and Bad Behavior

AP Deployment Guidelines

Wireless Security

Service Set Identifier (SSID)

Device and Access Point Association

Wired Equivalent Privacy (WEP)

WEP Limitations and Weaknesses

MAC Address Filtering

Extensible Authentication Protocol (EAP)

LEAP

EAP-TLS

EAP-PSK

EAP-TTLS

Essential Wireless Security

Essentials First: Wireless Hacking Tools

NetStumbler

Wireless Packet Sniffers

Aircrack-ng

OmniPeek

Wireshark

Chapter Summary

Chapter Review Questions

Chapter 11 Intrusion Detection and Honeypots

Essentials First: Intrusion Detection

IDS Functional Overview

Host Intrusion Detection System

Network Intrusion Detection System

Wireless IDS

Network Behavior Analysis

How Are Intrusions Detected?

Signature or Pattern Detection

Anomaly-Based Detection

Stateful Protocol Analysis

Combining Methods

Intrusion Prevention

IDS Products

Snort!

Limitations of IDS

Essentials First: Honeypots

Honeypot Overview

Honeypot Design Strategies

Honeypot Limitations

Chapter Summary

Chapter Review Questions

Chapter 12 Tools of the Trade

Essentials First: Vulnerability Analysis

Fundamental Attacks

IP Spoofing/Session Hijacking

Packet Analyzers

Denial of Service (DoS) Attacks

Other Types of Attacks

Back Doors

Security Assessments and Penetration Testing

Internal Vulnerability and Penetration Assessment

Assessment Methodology

External Penetration and Vulnerability Assessment

Assessment Methodology

Physical Security Assessment

Assessment Methodology

Miscellaneous Assessments

Assessment Providers

Security Scanners

Features and Benefits of Vulnerability Scanners

Freeware Security Scanners

Metasploit

NMAP

SAINT

Nessus

Retina Version 5.11.10

CORE IMPACT Pro (a Professional Penetration Testing Product)

In Their Own Words

Scan and Detection Accuracy

Documentation

Documentation and Support

Vulnerability Updates

Chapter Summary

Chapter Review Questions

Appendix A Answers to Review Questions

Index

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
13.59.107.152