Beschreibung
InhaltsangabeIntroduction to Internet Security.- Establishing Your Organization's Security.- Developing Your Security Policy.- Securing the Web Client.- Network Interconnections: A Major Point of Vulnerability.- Deterring Masqueraders and Ensuring Authenticity.- Preventing Eavesdropping to Protect your Privacy.- Thwarting Counterfeiters and Forgery to Retain Integrity.- Avoiding Disruption of Service to Maintain Availability.- Configuring Operating System and Network Security.- Enhancing Web Server Security.- Issuing and Managing Certificates.- Firewalls and Firewall Topologies.- Security Management Solutions and Future Directions.- Appendices.- Glossary.- Index.
Autorenportrait
Inhaltsangabeto Internet Security.- Internet Technologies.- Basic Security Issues.- Establishing Your Organization's Security.- Real Threats That Impact Security.- A Security Policy: The Foundation of Your Protection.- Developing Your Security Policy.- Steps to Take Now.- Responding to Attacks.- Securing the Web Client.- Threats and Vulnerabilities.- Protecting Your Web Browser.- Network Interconnections: A Majorpoint of Vulnerability.- Basic Operating System and TCP/IP Concepts.- Early System Security Improvements.- Deterring Masqueraders and Ensuring Authenticity.- Impersonating Users.- How Masqueraders Infiltrate a System.- Holding Your Defensive Line.- Preventing Eavesdropping to Protect Your Privacy.- Unauthorized Listening and Looking.- Countering or not Countering the Eavesdropper: That's the Question?.- Thwarting Counterfeiters and Forgery to Retain Integrity.- The Forger's Arsenal.- Shielding your Assets.- Avoiding Disruption of Service to Maintain Availability.- Denial-of-Service Attacks.- Constructing Your Bastions.- The Importance of Firewalls.- Configuring Operating System and Network Security.- Operating Systems that Pose Security Risks.- Network Security.- Enhancing Web Server Security.- Controlling Access.- Extended Web Site Security Functionality.- Securing Web Communications with SSL VPNS.- Issuing and Managing Certificates.- Why Digital Certificates are Used.- Certificate Authorities.- Trusting SSL CAs in Servers and Browsers.- Firewalls and Firewall Topologies.- Protecting Servers and Clients with Firewalls.- Choosing the Right Firewall.- Firewall Topologies.- Selecting Firewall Security Topology Policy.- Security Management Solutions and Future Directions.- Identifying and Responding to Security Violations.- Real-Time Monitoring and Auditing.- Limiting Damage.- Keeping Up to Date on New Threats.- Emerging Technologies.- Summary, Conclusions and Recommendations.
Leseprobe
Leseprobe