Preface |
|
xv | |
Acknowledgements |
|
xviii | |
|
|
1 | (18) |
|
Rationale for security measures |
|
|
2 | (13) |
|
No organization may be safe |
|
|
2 | (1) |
|
|
3 | (1) |
|
|
4 | (1) |
|
|
5 | (1) |
|
|
6 | (5) |
|
|
11 | (2) |
|
The Computer Fraud and Abuse Act |
|
|
13 | (1) |
|
|
14 | (1) |
|
|
15 | (4) |
|
The TCP/IP protocol suite |
|
|
15 | (1) |
|
|
16 | (1) |
|
The security role of the router |
|
|
16 | (1) |
|
|
17 | (1) |
|
The role of virus scanners and encryption |
|
|
17 | (1) |
|
|
17 | (1) |
|
|
18 | (1) |
|
|
18 | (1) |
|
The TCP/IP protocol suite |
|
|
19 | (66) |
|
Comparison to the ISO Reference Model |
|
|
19 | (1) |
|
|
20 | (1) |
|
|
21 | (1) |
|
|
21 | (1) |
|
|
21 | (1) |
|
|
22 | (1) |
|
|
22 | (1) |
|
Application data delivery |
|
|
22 | (1) |
|
|
23 | (41) |
|
|
24 | (1) |
|
|
24 | (1) |
|
Hlen and Total Length fields |
|
|
25 | (1) |
|
|
25 | (1) |
|
|
26 | (1) |
|
|
27 | (1) |
|
|
27 | (1) |
|
|
28 | (1) |
|
|
28 | (1) |
|
|
28 | (3) |
|
Source and Destination address fields |
|
|
31 | (1) |
|
Options and Padding fields |
|
|
32 | (1) |
|
|
32 | (1) |
|
|
32 | (1) |
|
The basic addressing scheme |
|
|
33 | (1) |
|
|
34 | (2) |
|
|
36 | (1) |
|
Address composition and notation |
|
|
36 | (1) |
|
|
37 | (1) |
|
|
38 | (1) |
|
|
39 | (1) |
|
|
39 | (1) |
|
|
40 | (1) |
|
|
41 | (1) |
|
|
41 | (1) |
|
Subnetting and the subnet mask |
|
|
42 | (3) |
|
Host addresses on subnets |
|
|
45 | (1) |
|
|
46 | (2) |
|
|
48 | (3) |
|
|
51 | (3) |
|
|
54 | (1) |
|
|
54 | (1) |
|
|
54 | (1) |
|
|
55 | (1) |
|
|
55 | (1) |
|
|
56 | (1) |
|
Need for address resolution |
|
|
57 | (2) |
|
|
59 | (1) |
|
|
59 | (1) |
|
|
60 | (1) |
|
|
60 | (1) |
|
|
61 | (1) |
|
|
61 | (1) |
|
Sender Hardware Address field |
|
|
61 | (1) |
|
|
61 | (1) |
|
Target Hardware Address field |
|
|
61 | (1) |
|
|
61 | (2) |
|
|
63 | (1) |
|
|
64 | (21) |
|
|
65 | (1) |
|
|
65 | (1) |
|
Source and destination port fields |
|
|
66 | (1) |
|
|
67 | (1) |
|
|
67 | (2) |
|
|
69 | (1) |
|
|
69 | (1) |
|
|
69 | (1) |
|
Acknowledgment number field |
|
|
70 | (1) |
|
|
70 | (1) |
|
|
71 | (1) |
|
|
71 | (1) |
|
|
71 | (1) |
|
|
72 | (1) |
|
|
72 | (1) |
|
|
72 | (1) |
|
|
72 | (1) |
|
|
72 | (1) |
|
|
72 | (1) |
|
|
73 | (1) |
|
|
73 | (1) |
|
|
73 | (1) |
|
|
74 | (1) |
|
|
75 | (1) |
|
|
75 | (1) |
|
|
76 | (2) |
|
|
78 | (1) |
|
The window field and flow control |
|
|
78 | (1) |
|
|
79 | (1) |
|
|
79 | (1) |
|
|
80 | (1) |
|
|
80 | (1) |
|
|
80 | (1) |
|
Slow start and congestion avoidance |
|
|
80 | (2) |
|
|
82 | (1) |
|
|
82 | (1) |
|
Source and destination port fields |
|
|
83 | (1) |
|
|
83 | (1) |
|
|
83 | (1) |
|
|
83 | (2) |
|
|
85 | (20) |
|
|
85 | (7) |
|
|
86 | (1) |
|
Obtaining an IP address to spoof |
|
|
86 | (1) |
|
Reconfiguring the protocol stack |
|
|
87 | (1) |
|
|
88 | (2) |
|
Why address hiding is difficult to locate |
|
|
90 | (1) |
|
|
91 | (1) |
|
General software-based attacks |
|
|
92 | (3) |
|
|
92 | (1) |
|
|
93 | (1) |
|
|
94 | (1) |
|
Application-based attacks |
|
|
95 | (5) |
|
|
95 | (2) |
|
|
97 | (1) |
|
|
98 | (2) |
|
|
100 | (2) |
|
|
100 | (1) |
|
|
101 | (1) |
|
|
102 | (2) |
|
|
104 | (1) |
|
The security role of the router |
|
|
105 | (50) |
|
|
105 | (9) |
|
Address and message identity |
|
|
106 | (1) |
|
|
106 | (1) |
|
|
107 | (1) |
|
|
108 | (1) |
|
|
109 | (1) |
|
Using the enable secret command |
|
|
110 | (1) |
|
|
110 | (1) |
|
Protecting the hardwired connection |
|
|
111 | (2) |
|
|
113 | (1) |
|
|
114 | (41) |
|
|
114 | (2) |
|
|
116 | (1) |
|
|
116 | (1) |
|
|
116 | (1) |
|
|
116 | (1) |
|
|
117 | (1) |
|
|
118 | (1) |
|
|
118 | (1) |
|
|
118 | (1) |
|
|
119 | (1) |
|
|
120 | (1) |
|
|
120 | (1) |
|
Source address and wildcard-mask fields |
|
|
120 | (1) |
|
|
121 | (1) |
|
Destination address and wildcard-mask fields |
|
|
121 | (1) |
|
|
121 | (1) |
|
|
121 | (1) |
|
|
122 | (1) |
|
|
123 | (1) |
|
|
123 | (1) |
|
|
123 | (1) |
|
|
124 | (1) |
|
|
124 | (1) |
|
|
124 | (1) |
|
|
124 | (1) |
|
Creating and applying an access list |
|
|
124 | (1) |
|
|
125 | (1) |
|
Using the ip access-group command |
|
|
125 | (2) |
|
|
127 | (2) |
|
|
129 | (1) |
|
|
129 | (1) |
|
Considering destination unreachable |
|
|
129 | (1) |
|
|
130 | (1) |
|
New capabilities in access lists |
|
|
131 | (1) |
|
|
131 | (1) |
|
|
131 | (1) |
|
Standard named IP access lists |
|
|
131 | (1) |
|
Extended named IP access lists |
|
|
132 | (1) |
|
|
133 | (1) |
|
|
133 | (1) |
|
|
134 | (1) |
|
|
134 | (3) |
|
|
137 | (1) |
|
|
138 | (1) |
|
|
138 | (1) |
|
|
138 | (2) |
|
|
140 | (1) |
|
|
141 | (1) |
|
|
141 | (1) |
|
|
142 | (1) |
|
|
142 | (1) |
|
Context-based access control |
|
|
142 | (1) |
|
|
143 | (1) |
|
|
144 | (1) |
|
|
144 | (1) |
|
|
145 | (1) |
|
|
146 | (3) |
|
Applying the inspection rules |
|
|
149 | (1) |
|
|
150 | (3) |
|
|
153 | (2) |
|
|
155 | (28) |
|
|
155 | (3) |
|
|
156 | (1) |
|
|
157 | (1) |
|
|
158 | (9) |
|
|
159 | (1) |
|
|
160 | (4) |
|
|
164 | (2) |
|
|
166 | (1) |
|
|
167 | (12) |
|
The Technologic Interceptor |
|
|
167 | (1) |
|
|
167 | (2) |
|
|
169 | (1) |
|
|
170 | (3) |
|
|
173 | (1) |
|
The Graphic User Interface |
|
|
173 | (1) |
|
|
174 | (1) |
|
|
175 | (2) |
|
|
177 | (2) |
|
|
179 | (1) |
|
Network address translation |
|
|
179 | (4) |
|
Types of address translation |
|
|
180 | (1) |
|
|
180 | (1) |
|
|
181 | (1) |
|
|
181 | (2) |
|
The role of the virus scanner and encryption |
|
|
183 | (22) |
|
|
183 | (15) |
|
|
183 | (1) |
|
|
184 | (1) |
|
|
184 | (1) |
|
|
184 | (1) |
|
|
185 | (1) |
|
|
185 | (1) |
|
|
186 | (1) |
|
|
186 | (1) |
|
|
186 | (1) |
|
|
187 | (1) |
|
|
187 | (1) |
|
|
187 | (1) |
|
|
188 | (2) |
|
|
190 | (1) |
|
|
191 | (1) |
|
|
191 | (2) |
|
Controlling the virus scan |
|
|
193 | (1) |
|
|
193 | (1) |
|
Protecting the enterprise |
|
|
194 | (2) |
|
|
196 | (1) |
|
|
197 | (1) |
|
|
197 | (1) |
|
|
198 | (7) |
|
|
199 | (2) |
|
Leased line versus switched network operations |
|
|
201 | (1) |
|
|
202 | (1) |
|
|
203 | (1) |
|
|
203 | (1) |
|
|
204 | (1) |
|
|
205 | (20) |
|
The Microsoft Security Advisor |
|
|
206 | (1) |
|
|
207 | (5) |
|
|
207 | (1) |
|
|
208 | (1) |
|
|
208 | (1) |
|
|
209 | (1) |
|
|
209 | (2) |
|
|
211 | (1) |
|
|
212 | (1) |
|
|
212 | (1) |
|
|
212 | (7) |
|
|
215 | (1) |
|
|
216 | (1) |
|
|
216 | (1) |
|
|
216 | (1) |
|
|
216 | (1) |
|
|
216 | (1) |
|
|
217 | (1) |
|
|
217 | (1) |
|
|
217 | (2) |
|
Other registry changes to consider |
|
|
219 | (2) |
|
Displaying a legal notice |
|
|
220 | (1) |
|
Remove OS/2 and POSIX subsystems |
|
|
220 | (1) |
|
|
221 | (1) |
|
Remove the Shutdown button at logon |
|
|
221 | (1) |
|
Restrict anonymous network access |
|
|
221 | (1) |
|
Other attack methods to consider |
|
|
221 | (4) |
|
|
222 | (1) |
|
|
222 | (1) |
|
|
223 | (1) |
|
Screen saver vulnerability |
|
|
223 | (1) |
|
|
224 | (1) |
|
|
225 | (38) |
|
General security-related considerations |
|
|
225 | (12) |
|
|
226 | (1) |
|
|
226 | (1) |
|
|
227 | (1) |
|
|
227 | (1) |
|
Built-in accounts to consider |
|
|
228 | (1) |
|
|
229 | (2) |
|
|
231 | (1) |
|
|
232 | (1) |
|
|
233 | (1) |
|
|
233 | (1) |
|
|
234 | (1) |
|
|
235 | (1) |
|
Managing security policies |
|
|
235 | (1) |
|
|
236 | (1) |
|
|
237 | (11) |
|
|
239 | (4) |
|
|
243 | (1) |
|
Auditing files and directories |
|
|
244 | (3) |
|
|
247 | (1) |
|
|
248 | (7) |
|
|
249 | (1) |
|
|
249 | (1) |
|
|
249 | (1) |
|
|
250 | (1) |
|
|
251 | (1) |
|
|
252 | (1) |
|
Controlling access via IP address |
|
|
253 | (2) |
|
Internet Information Server |
|
|
255 | (8) |
|
|
256 | (1) |
|
|
257 | (1) |
|
|
258 | (1) |
|
|
259 | (2) |
|
|
261 | (1) |
|
|
262 | (1) |
|
|
263 | (24) |
|
Intrusion detection versus scanning software |
|
|
264 | (2) |
|
Intrusion detection operation |
|
|
264 | (1) |
|
|
264 | (1) |
|
|
265 | (1) |
|
|
266 | (9) |
|
|
266 | (1) |
|
|
266 | (3) |
|
|
269 | (1) |
|
cgi script considerations |
|
|
270 | (1) |
|
|
271 | (4) |
|
Other types of scanning programs |
|
|
275 | (1) |
|
|
275 | (12) |
|
|
276 | (2) |
|
|
278 | (1) |
|
|
279 | (2) |
|
Selecting exploits for the scanner |
|
|
281 | (1) |
|
Considering account lockout |
|
|
282 | (1) |
|
|
283 | (4) |
Index |
|
287 | |