Muutke küpsiste eelistusi

E-raamat: Securing Windows NT/2000: From Policies to Firewalls [Taylor & Francis e-raamat]

(Stonewall'em, Etobicoke, Ontario, Canada)
  • Formaat: 272 pages, 61 Illustrations, black and white
  • Ilmumisaeg: 29-Apr-2002
  • Kirjastus: Auerbach
  • ISBN-13: 9780429132759
  • Taylor & Francis e-raamat
  • Hind: 438,53 €*
  • * hind, mis tagab piiramatu üheaegsete kasutajate arvuga ligipääsu piiramatuks ajaks
  • Tavahind: 626,48 €
  • Säästad 30%
  • Formaat: 272 pages, 61 Illustrations, black and white
  • Ilmumisaeg: 29-Apr-2002
  • Kirjastus: Auerbach
  • ISBN-13: 9780429132759
In today's business environment it is no longer safe to conduct any business on the Internet without first protecting it. Small, medium, and large corporations require a massive dose of security to protect themselves and their digital assets from unwanted intruders. A managerial guide and practical technical tutorial, Securing Windows NT/2000: From Policies to Firewalls provides viable security solutions for your organization.

The author presents in-depth knowledge on how, why, and where these operating systems must be tuned in order to use them securely to connect to the Internet. The book includes the steps required to define a corporate security policy, how to implement that policy, and how to structure the project plan. Tables, charts, and work templates provide a starting point to begin assessing and implementing a solution that will fit the unique needs of your organization. Part two provides the reader with practical hands-on applications for the preparation, installation, and tuning of Windows NT/2000 operating systems.

Securing Windows NT/2000 provides step-by-step instructions that guide you through performing a secure installation and in preparing the system for secure operation on the Internet. Although a multitude of firewall application software can be used in conjunction with the sections detailing the securing of the operating system, Check Point FireWall-1/VPN-1 is used as it best demonstrates the effectiveness of translating the corporate security policy into a practical reality.

About the Author:

Michael Simonyi (www.stonewallem.com) is an IT professional working for private sector enterprise organizations. He has over 12 years of practical and theoretical experience, from mainframe systems to PC client/server networks. His areas of expertise center on practical systems management, networking, databases, and application architecture, with emphasis on quality.
Preface viii
Executive Management Overview
1(4)
A Need for Security
2(3)
What Is Security?
5(16)
Attaining a Level of Security
6(1)
The Importance of Checks and Balances
7(1)
Access Controls
7(1)
Communication and Training
8(1)
Attaining a Level of Security
8(1)
Identifying Risks
9(1)
Physical Security
10(1)
Logical Security
10(1)
Employee or Human Resources Security
10(1)
Assessing Risk
11(1)
Establishing Controls
12(1)
Monitoring Controls
13(1)
Responsibility and Accountability
14(1)
Internal Systems Control Structures
14(1)
General Process for Change Management
15(2)
Operations Control Log
17(2)
System Work Log
19(2)
What Is a Security Policy?
21(6)
Steps to a Security Policy
21(2)
Why Is a Security Policy Needed?
23(1)
What Does a Security Policy Do?
24(3)
Implementing a Security Policy
27(24)
Involving and Informing Management
29(2)
Communication of the Security Policy
31(1)
Internal Controls
32(6)
Scenario Example
38(7)
The XYZ Company
44(1)
Corporate Security Mandate
45(1)
Sample Security Policies
45(1)
Security Return on Investment
46(5)
Internet Connection Type and Speed
47(1)
Router and Communications Support Equipment
47(1)
Hardware Selection
48(1)
Software Selection
48(1)
Training
49(1)
Software and Hardware Support
49(1)
Monitoring and Management Services
49(2)
Perimeter Security Scenarios
51(6)
Basic Bastion Host (Dual-Homed Host)
51(2)
Multi-Homed Bastion Host
53(1)
Hybrid Multi-Homed Bastion Host
54(3)
Directions in Security
57(6)
Perimeter Security
57(2)
Trusted Systems
59(1)
Intrusion Detection Systems
60(1)
Intrinsic Security
61(1)
Honey Pots
62(1)
Corporate Security Requirements for Conducting Business over the Internet
63(10)
Internal Corporate VPNs
65(1)
Business Partner VPNs
66(1)
The Mobile Workforce and VPNs
66(1)
Systems Management and Security
67(3)
The Virtual Workforce
70(3)
Implementing Check Point FireWall-1/VPN-1 with Windows NT and Windows 2000
73(108)
Performing Background Preparation
74(1)
Assembling the Hardware
75(1)
Materials List
76(1)
Network Settings
76(4)
Password Selection
80(1)
Documentation
80(1)
Software Patches
81(1)
Communications and Protocol Selections
81(1)
Registry Tuning
82(1)
System Policies
82(1)
Installing the Operating System
82(2)
Microsoft Windows NT 4.0 Server
84(14)
Installation Phase 1
85(7)
Installation Phase 2
92(5)
Installation Phase 3
97(1)
Installing Check Point FireWall-1
98(34)
Environmental Setup
99(1)
Check Point FireWall-1 Installation Process
100(32)
Configuration for a Multi-Homed Host or DMZ Configuration
132(3)
Defining the VPN
135(7)
SecuRemote
142(3)
Windows 2000 Server Setup, Installation, and Configuration for Check Point FireWall-1/VPN-1
145(33)
Configuring Check Point FireWall-1/VPN-1 for Windows 2000
155(23)
Check Point FireWall-1/VPN-1 Operating Notes
178(3)
Enhancing the Security Infrastructure
181(8)
Virus Protection
182(1)
Fault Tolerance and Load Balancing
182(3)
Fault Tolerance
183(1)
Load Balancing
183(2)
Reporting and Management
185(1)
Encryption Acceleration
185(1)
Public Key Infrastructure
185(1)
Authentication
186(1)
Intrusion Detection
186(1)
Backup and Recovery
186(3)
Appendices 189(62)
A DoD Security Classifications
189(2)
B Asset Inventory List
191(2)
C Windows NT 4.0 SP6a Post Security Rollup Patch List
193(4)
D Letter Issued to Customers of the Egghead E-Commerce Site and Press Release
197(4)
E Virus Memo
201(4)
F Sample Systems Operations Procedures Manual
205(8)
G Systems Policies and Guidelines
213(14)
H Computer Security and Usage Policy
227(20)
I References
247(4)
Index 251
Michael A. Simonyi