Preface |
|
viii | |
|
Executive Management Overview |
|
|
1 | (4) |
|
|
2 | (3) |
|
|
5 | (16) |
|
Attaining a Level of Security |
|
|
6 | (1) |
|
The Importance of Checks and Balances |
|
|
7 | (1) |
|
|
7 | (1) |
|
Communication and Training |
|
|
8 | (1) |
|
Attaining a Level of Security |
|
|
8 | (1) |
|
|
9 | (1) |
|
|
10 | (1) |
|
|
10 | (1) |
|
Employee or Human Resources Security |
|
|
10 | (1) |
|
|
11 | (1) |
|
|
12 | (1) |
|
|
13 | (1) |
|
Responsibility and Accountability |
|
|
14 | (1) |
|
Internal Systems Control Structures |
|
|
14 | (1) |
|
General Process for Change Management |
|
|
15 | (2) |
|
|
17 | (2) |
|
|
19 | (2) |
|
What Is a Security Policy? |
|
|
21 | (6) |
|
Steps to a Security Policy |
|
|
21 | (2) |
|
Why Is a Security Policy Needed? |
|
|
23 | (1) |
|
What Does a Security Policy Do? |
|
|
24 | (3) |
|
Implementing a Security Policy |
|
|
27 | (24) |
|
Involving and Informing Management |
|
|
29 | (2) |
|
Communication of the Security Policy |
|
|
31 | (1) |
|
|
32 | (6) |
|
|
38 | (7) |
|
|
44 | (1) |
|
Corporate Security Mandate |
|
|
45 | (1) |
|
|
45 | (1) |
|
Security Return on Investment |
|
|
46 | (5) |
|
Internet Connection Type and Speed |
|
|
47 | (1) |
|
Router and Communications Support Equipment |
|
|
47 | (1) |
|
|
48 | (1) |
|
|
48 | (1) |
|
|
49 | (1) |
|
Software and Hardware Support |
|
|
49 | (1) |
|
Monitoring and Management Services |
|
|
49 | (2) |
|
Perimeter Security Scenarios |
|
|
51 | (6) |
|
Basic Bastion Host (Dual-Homed Host) |
|
|
51 | (2) |
|
|
53 | (1) |
|
Hybrid Multi-Homed Bastion Host |
|
|
54 | (3) |
|
|
57 | (6) |
|
|
57 | (2) |
|
|
59 | (1) |
|
Intrusion Detection Systems |
|
|
60 | (1) |
|
|
61 | (1) |
|
|
62 | (1) |
|
Corporate Security Requirements for Conducting Business over the Internet |
|
|
63 | (10) |
|
|
65 | (1) |
|
|
66 | (1) |
|
The Mobile Workforce and VPNs |
|
|
66 | (1) |
|
Systems Management and Security |
|
|
67 | (3) |
|
|
70 | (3) |
|
Implementing Check Point FireWall-1/VPN-1 with Windows NT and Windows 2000 |
|
|
73 | (108) |
|
Performing Background Preparation |
|
|
74 | (1) |
|
|
75 | (1) |
|
|
76 | (1) |
|
|
76 | (4) |
|
|
80 | (1) |
|
|
80 | (1) |
|
|
81 | (1) |
|
Communications and Protocol Selections |
|
|
81 | (1) |
|
|
82 | (1) |
|
|
82 | (1) |
|
Installing the Operating System |
|
|
82 | (2) |
|
Microsoft Windows NT 4.0 Server |
|
|
84 | (14) |
|
|
85 | (7) |
|
|
92 | (5) |
|
|
97 | (1) |
|
Installing Check Point FireWall-1 |
|
|
98 | (34) |
|
|
99 | (1) |
|
Check Point FireWall-1 Installation Process |
|
|
100 | (32) |
|
Configuration for a Multi-Homed Host or DMZ Configuration |
|
|
132 | (3) |
|
|
135 | (7) |
|
|
142 | (3) |
|
Windows 2000 Server Setup, Installation, and Configuration for Check Point FireWall-1/VPN-1 |
|
|
145 | (33) |
|
Configuring Check Point FireWall-1/VPN-1 for Windows 2000 |
|
|
155 | (23) |
|
Check Point FireWall-1/VPN-1 Operating Notes |
|
|
178 | (3) |
|
Enhancing the Security Infrastructure |
|
|
181 | (8) |
|
|
182 | (1) |
|
Fault Tolerance and Load Balancing |
|
|
182 | (3) |
|
|
183 | (1) |
|
|
183 | (2) |
|
|
185 | (1) |
|
|
185 | (1) |
|
Public Key Infrastructure |
|
|
185 | (1) |
|
|
186 | (1) |
|
|
186 | (1) |
|
|
186 | (3) |
Appendices |
|
189 | (62) |
|
A DoD Security Classifications |
|
|
189 | (2) |
|
|
191 | (2) |
|
C Windows NT 4.0 SP6a Post Security Rollup Patch List |
|
|
193 | (4) |
|
D Letter Issued to Customers of the Egghead E-Commerce Site and Press Release |
|
|
197 | (4) |
|
|
201 | (4) |
|
F Sample Systems Operations Procedures Manual |
|
|
205 | (8) |
|
G Systems Policies and Guidelines |
|
|
213 | (14) |
|
H Computer Security and Usage Policy |
|
|
227 | (20) |
|
|
247 | (4) |
Index |
|
251 | |