16. 9. Dedication
10. Acknowledgments
11. About the Technical Reviewers
12. We Want to Hear from You!
13. Reader Services
14. Chapter 1: Introduction to Network Security
1. Introduction
2. The Basics of a Network
1. Basic Network Structure
2. Data Packets
3. IP Addresses
4. Uniform Resource Locators
5. MAC Addresses
6. Protocols
3. Basic Network Utilities
3
1. ipconfig
2. ping
3. tracert
4. netstat
4. The OSI Model
5. What Does This Mean for Security?
6. Assessing Likely Threats to the Network
7. Classifications of Threats
1. Malware
2. Compromising System Security—Intrusions
17. 3. Denial of Service
8. Likely Attacks
9. Threat Assessment
10. Understanding Security Terminology
1. Hacking Terminology
2. Security Terminology
11. Choosing a Network Security Approach
1. Perimeter Security Approach
2. Layered Security Approach
3. Hybrid Security Approach
12. Network Security and the Law
13. Using Security Resources
14. Summary
15. Chapter 2: Types of Attacks
4
1. Introduction
2. Understanding Denial of Service Attacks
1. DoS in Action
2. SYN Flood
3. Smurf Attack
4. Ping of Death
5. UDP Flood
6. ICMP Flood
7. DHCP Starvation
18. 8. HTTP Post DoS
9. PDoS
10. Distributed Reflection Denial of Service
11. DoS Tools
12. Real-World Examples
13. Defending Against DoS Attacks
3. Defending Against Buffer Overflow Attacks
4. Defending Against IP Spoofing
5. Defending Against Session Hijacking
6. Blocking Virus and Trojan Horse Attacks
1. Viruses
2. Types of Viruses
3. Trojan Horses
7. Summary
16. Chapter 3: Fundamentals of Firewalls
1. Introduction
2. What Is a Firewall?
5
1. Types of Firewalls
2. Packet Filtering Firewall
3. Stateful Packet Inspection
4. Application Gateway
5. Circuit Level Gateway
6. Hybrid Firewalls
7. Blacklisting/Whitelisting
19. 3. Implementing Firewalls
1. Host-Based
2. Dual-Homed Hosts
3. Router-Based Firewall
4. Screened Hosts
4. Selecting and Using a Firewall
1. Using a Firewall
5. Using Proxy Servers
1. The WinGate Proxy Server
2. NAT
6. Summary
17. Chapter 4: Firewall Practical Applications
1. Introduction
2. Using Single Machine Firewalls
3. Windows 10 Firewall
4. User Account Control
6
5. Linux Firewalls
1. Iptables
2. Symantec Norton Firewall
3. McAfee Personal Firewall
6. Using Small Office/Home Office Firewalls
20. 1. SonicWALL
2. D-Link DFL-2560 Office Firewall
7. Using Medium-Sized Network Firewalls
1. Check Point Firewall
2. Cisco Next-Generation Firewalls
8. Using Enterprise Firewalls
9. Summary
18. Chapter 5: Intrusion-Detection Systems
1. Introduction
2. Understanding IDS Concepts
1. Preemptive Blocking
2. Anomaly Detection
3. IDS Components and Processes
4. Understanding and Implementing IDSs
1. Snort
2. Cisco Intrusion-Detection and Prevention
7
5. Understanding and Implementing Honeypots
1. Specter
2. Symantec Decoy Server
3. Intrusion Deflection
4. Intrusion Deterrence
21. 6. Summary
19. Chapter 6: Encryption Fundamentals
1. Introduction
2. The History of Encryption
1. The Caesar Cipher
2. ROT 13
3. Atbash Cipher
4. Multi-Alphabet Substitution
5. Rail Fence
6. Vigenère
7. Enigma
8. Binary Operations
3. Learning About Modern Encryption Methods
1. Symmetric Encryption
2. Key Stretching
3. PRNG
4. Public Key Encryption
5. Digital Signatures
4. Identifying Good Encryption
5. Understanding Digital Signatures and Certificates
8
1. Digital Certificates
2. PGP Certificates
3. MD5
4. SHA
22. 5. RIPEMD
6. HAVAL
6. Understanding and Using Decryption
7. Cracking Passwords
1. John the Ripper
2. Using Rainbow Tables
3. Using Other Password Crackers
4. General Cryptanalysis
8. Steganography
9. Steganalysis
10. Quantum Computing and Quantum Cryptography
11. Summary
20. Chapter 7: Virtual Private Networks
1. Introduction
2. Basic VPN Technology
3. Using VPN Protocols for VPN Encryption
1. PPTP
2. PPTP Authentication
3. L2TP
4. L2TP Authentication
5. L2TP Compared to PPTP
4. IPSec
9