Ali Sadiqui
Computer Network Security
Ali Sadiqui
Computer Network Security
- Gebundenes Buch
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung
Developed in collaboration with a training and certification team from Cisco, Computer Network Security is an exploration of the state-of-the-art and good practices in setting up a secure computer system. Concrete examples are offered in each chapter, to help the reader to master the concept and apply the security configuration.
This book is intended for students preparing for the CCNA Security Exam (210-260 IINS) ? whether at professional training centers, technical faculties, or training centers associated with the ?Cisco Academy? program. It is also relevant to anyone interested in…mehr
Andere Kunden interessierten sich auch für
- Philippe DarcheMicroprocessor 4186,99 €
- Philippe DarcheMicroprocessor 3184,99 €
- Patrick DuvautInternet of Augmented Me, I.Am186,99 €
- The¿re¿se HardinConcepts and Semantics of Programming Languages 1186,99 €
- Safwan El AssadDigital Communications 1184,99 €
- Philippe DarcheMicroprocessor 2184,99 €
- Philippe DarcheMicroprocessor 1184,99 €
-
-
-
Developed in collaboration with a training and certification team from Cisco, Computer Network Security is an exploration of the state-of-the-art and good practices in setting up a secure computer system. Concrete examples are offered in each chapter, to help the reader to master the concept and apply the security configuration.
This book is intended for students preparing for the CCNA Security Exam (210-260 IINS) ? whether at professional training centers, technical faculties, or training centers associated with the ?Cisco Academy? program. It is also relevant to anyone interested in computer security, be they professionals in this field or users who want to identify the threats and vulnerabilities of a network to ensure better security.
Hinweis: Dieser Artikel kann nur an eine deutsche Lieferadresse ausgeliefert werden.
This book is intended for students preparing for the CCNA Security Exam (210-260 IINS) ? whether at professional training centers, technical faculties, or training centers associated with the ?Cisco Academy? program. It is also relevant to anyone interested in computer security, be they professionals in this field or users who want to identify the threats and vulnerabilities of a network to ensure better security.
Hinweis: Dieser Artikel kann nur an eine deutsche Lieferadresse ausgeliefert werden.
Produktdetails
- Produktdetails
- Verlag: Wiley & Sons / Wiley-ISTE
- Artikelnr. des Verlages: 1W786305270
- 1. Auflage
- Seitenzahl: 272
- Erscheinungstermin: 16. Juni 2020
- Englisch
- Abmessung: 236mm x 157mm x 23mm
- Gewicht: 588g
- ISBN-13: 9781786305275
- ISBN-10: 1786305275
- Artikelnr.: 58585755
- Verlag: Wiley & Sons / Wiley-ISTE
- Artikelnr. des Verlages: 1W786305270
- 1. Auflage
- Seitenzahl: 272
- Erscheinungstermin: 16. Juni 2020
- Englisch
- Abmessung: 236mm x 157mm x 23mm
- Gewicht: 588g
- ISBN-13: 9781786305275
- ISBN-10: 1786305275
- Artikelnr.: 58585755
Ali Sadiqui is a trainer-researcher at the Office de la Formation Professionnelle et de la Promotion du Travail (OFPPT), Morocco. He is a member of several research laboratories and obtained his doctorate from the Sidi Mohamed Ben Abdellah University, Morocco.
Preface xi
Introduction xiii
Chapter 1. Fundamentals of Network Security 1
1.1. Introduction 1
1.1.1. The main objectives of securing a network 2
1.1.2. Information security terminology 2
1.2. Types of network security 4
1.2.1. Physical security 4
1.2.2. Logical security 4
1.2.3. Administrative security 5
1.3. The main risks related to the logical security of the network 5
1.3.1. Different kinds of network attacks 5
1.3.2. Network security measures 7
1.3.3. Vulnerability audit measures 8
1.4. Exercises to test learning 8
Chapter 2. Securing Network Devices 15
2.1. Types of network traffic 15
2.2. Securing the management plan 16
2.3. Securing passwords 16
2.4. Implementing connection restrictions 17
2.4.1. Configuring a login banner 17
2.4.2. Configuring connection parameters 17
2.5. Securing access through console lines, VTY and auxiliaries 18
2.5.1. Securing access through the console line and deactivating the auxiliary line 18
2.5.2. Securing VTY access with ssh 18
2.6. Allocation of administrative roles 19
2.6.1. Privilege levels of the IOS system 19
2.6.2. Configuring a privilege level 19
2.6.3. Setting a privilege level per user 20
2.6.4. Setting a privilege level for console, VTY, and auxiliary line access 20
2.6.5. Securing access with the management of "views" and "super-views" 21
2.6.6. Securing configuration files and the IOS system 22
2.6.7. Using automated security features 23
2.7. Securing the control plane 24
2.7.1. Introduction 24
2.7.2. MD5 authentication 24
2.7.3. Configuring OSPF protocol authentication 24
2.7.4. Configuring EIGRP protocol authentication 25
2.7.5. Configuring RIP authentication 26
2.8. Exercises for application 26
Chapter 3. Supervising a Computer Network 41
3.1. Introduction 41
3.2. Implementing an NTP server 42
3.2.1. Introduction to the NTP 42
3.2.2. How the NTP works 42
3.2.3. NTP configuration 43
3.3. Implementing a Syslog server 44
3.3.1. Introduction to the Syslog 44
3.3.2. How Syslog works 45
3.3.3. Configuring a Syslog client 46
3.4. Implementing the Simple Network Management Protocol (SNMP) 46
3.4.1. Introducing the SNMP 46
3.4.2. How SNMP works 47
3.4.3. SNMP configuration 49
3.5. Exercises for application 50
Chapter 4. Securing Access Using AAA 67
4.1. Introduction 67
4.2. AAA authentication 68
4.2.1. Local AAA authentication 68
4.2.2. AAA authentication based on a server 69
4.3. AAA authorizations 71
4.4. AAA traceability 71
4.5. Exercises for application 72
Chapter 5. Using Firewalls 79
5.1. Introducing firewalls 80
5.2. Types of firewalls 80
5.3. Setting up a firewall 80
5.4. Different firewall strategies 81
5.5. ACL-based firewalls 81
5.5.1. Introduction 81
5.5.2. The location of ACLs 81
5.5.3. IPv4 ACLs 81
5.5.4. IPv6 ACLs 82
5.5.5. ACL recommendation 83
5.6. Zone-based firewalls 84
5.6.1. Introduction 84
5.6.2. Types of security zones in a network 84
5.6.3. Rules applied to interzone traffic 85
5.6.4. Terminology 86
5.6.5. Configuring a ZFW 86
5.7. Creati
Introduction xiii
Chapter 1. Fundamentals of Network Security 1
1.1. Introduction 1
1.1.1. The main objectives of securing a network 2
1.1.2. Information security terminology 2
1.2. Types of network security 4
1.2.1. Physical security 4
1.2.2. Logical security 4
1.2.3. Administrative security 5
1.3. The main risks related to the logical security of the network 5
1.3.1. Different kinds of network attacks 5
1.3.2. Network security measures 7
1.3.3. Vulnerability audit measures 8
1.4. Exercises to test learning 8
Chapter 2. Securing Network Devices 15
2.1. Types of network traffic 15
2.2. Securing the management plan 16
2.3. Securing passwords 16
2.4. Implementing connection restrictions 17
2.4.1. Configuring a login banner 17
2.4.2. Configuring connection parameters 17
2.5. Securing access through console lines, VTY and auxiliaries 18
2.5.1. Securing access through the console line and deactivating the auxiliary line 18
2.5.2. Securing VTY access with ssh 18
2.6. Allocation of administrative roles 19
2.6.1. Privilege levels of the IOS system 19
2.6.2. Configuring a privilege level 19
2.6.3. Setting a privilege level per user 20
2.6.4. Setting a privilege level for console, VTY, and auxiliary line access 20
2.6.5. Securing access with the management of "views" and "super-views" 21
2.6.6. Securing configuration files and the IOS system 22
2.6.7. Using automated security features 23
2.7. Securing the control plane 24
2.7.1. Introduction 24
2.7.2. MD5 authentication 24
2.7.3. Configuring OSPF protocol authentication 24
2.7.4. Configuring EIGRP protocol authentication 25
2.7.5. Configuring RIP authentication 26
2.8. Exercises for application 26
Chapter 3. Supervising a Computer Network 41
3.1. Introduction 41
3.2. Implementing an NTP server 42
3.2.1. Introduction to the NTP 42
3.2.2. How the NTP works 42
3.2.3. NTP configuration 43
3.3. Implementing a Syslog server 44
3.3.1. Introduction to the Syslog 44
3.3.2. How Syslog works 45
3.3.3. Configuring a Syslog client 46
3.4. Implementing the Simple Network Management Protocol (SNMP) 46
3.4.1. Introducing the SNMP 46
3.4.2. How SNMP works 47
3.4.3. SNMP configuration 49
3.5. Exercises for application 50
Chapter 4. Securing Access Using AAA 67
4.1. Introduction 67
4.2. AAA authentication 68
4.2.1. Local AAA authentication 68
4.2.2. AAA authentication based on a server 69
4.3. AAA authorizations 71
4.4. AAA traceability 71
4.5. Exercises for application 72
Chapter 5. Using Firewalls 79
5.1. Introducing firewalls 80
5.2. Types of firewalls 80
5.3. Setting up a firewall 80
5.4. Different firewall strategies 81
5.5. ACL-based firewalls 81
5.5.1. Introduction 81
5.5.2. The location of ACLs 81
5.5.3. IPv4 ACLs 81
5.5.4. IPv6 ACLs 82
5.5.5. ACL recommendation 83
5.6. Zone-based firewalls 84
5.6.1. Introduction 84
5.6.2. Types of security zones in a network 84
5.6.3. Rules applied to interzone traffic 85
5.6.4. Terminology 86
5.6.5. Configuring a ZFW 86
5.7. Creati
Preface xi
Introduction xiii
Chapter 1. Fundamentals of Network Security 1
1.1. Introduction 1
1.1.1. The main objectives of securing a network 2
1.1.2. Information security terminology 2
1.2. Types of network security 4
1.2.1. Physical security 4
1.2.2. Logical security 4
1.2.3. Administrative security 5
1.3. The main risks related to the logical security of the network 5
1.3.1. Different kinds of network attacks 5
1.3.2. Network security measures 7
1.3.3. Vulnerability audit measures 8
1.4. Exercises to test learning 8
Chapter 2. Securing Network Devices 15
2.1. Types of network traffic 15
2.2. Securing the management plan 16
2.3. Securing passwords 16
2.4. Implementing connection restrictions 17
2.4.1. Configuring a login banner 17
2.4.2. Configuring connection parameters 17
2.5. Securing access through console lines, VTY and auxiliaries 18
2.5.1. Securing access through the console line and deactivating the auxiliary line 18
2.5.2. Securing VTY access with ssh 18
2.6. Allocation of administrative roles 19
2.6.1. Privilege levels of the IOS system 19
2.6.2. Configuring a privilege level 19
2.6.3. Setting a privilege level per user 20
2.6.4. Setting a privilege level for console, VTY, and auxiliary line access 20
2.6.5. Securing access with the management of "views" and "super-views" 21
2.6.6. Securing configuration files and the IOS system 22
2.6.7. Using automated security features 23
2.7. Securing the control plane 24
2.7.1. Introduction 24
2.7.2. MD5 authentication 24
2.7.3. Configuring OSPF protocol authentication 24
2.7.4. Configuring EIGRP protocol authentication 25
2.7.5. Configuring RIP authentication 26
2.8. Exercises for application 26
Chapter 3. Supervising a Computer Network 41
3.1. Introduction 41
3.2. Implementing an NTP server 42
3.2.1. Introduction to the NTP 42
3.2.2. How the NTP works 42
3.2.3. NTP configuration 43
3.3. Implementing a Syslog server 44
3.3.1. Introduction to the Syslog 44
3.3.2. How Syslog works 45
3.3.3. Configuring a Syslog client 46
3.4. Implementing the Simple Network Management Protocol (SNMP) 46
3.4.1. Introducing the SNMP 46
3.4.2. How SNMP works 47
3.4.3. SNMP configuration 49
3.5. Exercises for application 50
Chapter 4. Securing Access Using AAA 67
4.1. Introduction 67
4.2. AAA authentication 68
4.2.1. Local AAA authentication 68
4.2.2. AAA authentication based on a server 69
4.3. AAA authorizations 71
4.4. AAA traceability 71
4.5. Exercises for application 72
Chapter 5. Using Firewalls 79
5.1. Introducing firewalls 80
5.2. Types of firewalls 80
5.3. Setting up a firewall 80
5.4. Different firewall strategies 81
5.5. ACL-based firewalls 81
5.5.1. Introduction 81
5.5.2. The location of ACLs 81
5.5.3. IPv4 ACLs 81
5.5.4. IPv6 ACLs 82
5.5.5. ACL recommendation 83
5.6. Zone-based firewalls 84
5.6.1. Introduction 84
5.6.2. Types of security zones in a network 84
5.6.3. Rules applied to interzone traffic 85
5.6.4. Terminology 86
5.6.5. Configuring a ZFW 86
5.7. Creati
Introduction xiii
Chapter 1. Fundamentals of Network Security 1
1.1. Introduction 1
1.1.1. The main objectives of securing a network 2
1.1.2. Information security terminology 2
1.2. Types of network security 4
1.2.1. Physical security 4
1.2.2. Logical security 4
1.2.3. Administrative security 5
1.3. The main risks related to the logical security of the network 5
1.3.1. Different kinds of network attacks 5
1.3.2. Network security measures 7
1.3.3. Vulnerability audit measures 8
1.4. Exercises to test learning 8
Chapter 2. Securing Network Devices 15
2.1. Types of network traffic 15
2.2. Securing the management plan 16
2.3. Securing passwords 16
2.4. Implementing connection restrictions 17
2.4.1. Configuring a login banner 17
2.4.2. Configuring connection parameters 17
2.5. Securing access through console lines, VTY and auxiliaries 18
2.5.1. Securing access through the console line and deactivating the auxiliary line 18
2.5.2. Securing VTY access with ssh 18
2.6. Allocation of administrative roles 19
2.6.1. Privilege levels of the IOS system 19
2.6.2. Configuring a privilege level 19
2.6.3. Setting a privilege level per user 20
2.6.4. Setting a privilege level for console, VTY, and auxiliary line access 20
2.6.5. Securing access with the management of "views" and "super-views" 21
2.6.6. Securing configuration files and the IOS system 22
2.6.7. Using automated security features 23
2.7. Securing the control plane 24
2.7.1. Introduction 24
2.7.2. MD5 authentication 24
2.7.3. Configuring OSPF protocol authentication 24
2.7.4. Configuring EIGRP protocol authentication 25
2.7.5. Configuring RIP authentication 26
2.8. Exercises for application 26
Chapter 3. Supervising a Computer Network 41
3.1. Introduction 41
3.2. Implementing an NTP server 42
3.2.1. Introduction to the NTP 42
3.2.2. How the NTP works 42
3.2.3. NTP configuration 43
3.3. Implementing a Syslog server 44
3.3.1. Introduction to the Syslog 44
3.3.2. How Syslog works 45
3.3.3. Configuring a Syslog client 46
3.4. Implementing the Simple Network Management Protocol (SNMP) 46
3.4.1. Introducing the SNMP 46
3.4.2. How SNMP works 47
3.4.3. SNMP configuration 49
3.5. Exercises for application 50
Chapter 4. Securing Access Using AAA 67
4.1. Introduction 67
4.2. AAA authentication 68
4.2.1. Local AAA authentication 68
4.2.2. AAA authentication based on a server 69
4.3. AAA authorizations 71
4.4. AAA traceability 71
4.5. Exercises for application 72
Chapter 5. Using Firewalls 79
5.1. Introducing firewalls 80
5.2. Types of firewalls 80
5.3. Setting up a firewall 80
5.4. Different firewall strategies 81
5.5. ACL-based firewalls 81
5.5.1. Introduction 81
5.5.2. The location of ACLs 81
5.5.3. IPv4 ACLs 81
5.5.4. IPv6 ACLs 82
5.5.5. ACL recommendation 83
5.6. Zone-based firewalls 84
5.6.1. Introduction 84
5.6.2. Types of security zones in a network 84
5.6.3. Rules applied to interzone traffic 85
5.6.4. Terminology 86
5.6.5. Configuring a ZFW 86
5.7. Creati