Firewalls 24Seven

Скачать в pdf «Firewalls 24Seven»



Firewalls 24Seven, Second Edition


Firewalls 24Seven, Second Edition…………………………………………………………………………………….1


Introduction………………………………………………………………………………………………………………………3


About This Book……………………………………………………………………………………………………….3


How This Book is Organized………………………………………………………………………………………4


Part I: The Internet……………………………………………………………………………………………….4


Part II: Firewall Technology……………………………………………………………………………………4


Part III: Additional Security Tools……………………………………………………………………………4


Part IV: Operating System Support for Firewalling……………………………………………………4


Part V: Commercial Firewalls………………………………………………………………………………..4


Where to Go From Here…………………………………………………………………………………………….4


Part I: The Internet,…………………………………………………………………………………………………………….6


Chapter List……………………………………………………………………………………………………………..6


Part Overview………………………………………………………………………………………………………6


Chapter 1: Understanding Firewalls……………………………………………………………………………………7


Overview………………………………………………………………………………………………………………….7


Firewall Elements……………………………………………………………………………………………………..7


Packet Filters………………………………………………………………………………………………………8


Network Address Translation……………………………………………………………………………….13


Proxies……………………………………………………………………………………………………………..13


Virtual Private Networks……………………………………………………………………………………..15


Encrypted Authentication…………………………………………………………………………………….16


Creating Effective Border Security……………………………………………………………………………..17


Comparing Firewall Functionality………………………………………………………………………….18


Problems Firewalls Can’t Solve……………………………………………………………………………19


Border Security Options………………………………………………………………………………………21


Chapter 2: Hackers…………………………………………………………………………………………………………..28


Overview………………………………………………………………………………………………………………..28


Hacker Species……………………………………………………………………………………………………….28


Security Experts…………………………………………………………………………………………………28


Script Kiddies…………………………………………………………………………………………………….29


Underemployed Adult Hackers…………………………………………………………………………….30


Ideological Hackers……………………………………………………………………………………………31


Criminal Hackers……………………………………………………………………………………………….31


Corporate Spies…………………………………………………………………………………………………32


Disgruntled Employees……………………………………………………………………………………….33


Vectors of Attack…………………………………………………………………………………………………….33


Physical Intrusion……………………………………………………………………………………………….34


Dial-up…………………………………………………………………………………………………………….34


Internet…………………………………………………………………………………………………………….35


Direct Connection……………………………………………………………………………………………….35


Hacking Techniques………………………………………………………………………………………………..36


Eavesdropping and Snooping………………………………………………………………………………36


Denial of Service………………………………………………………………………………………………..41


Protocol Exploitation…………………………………………………………………………………………..44


Impersonation……………………………………………………………………………………………………46


Man-in-the-Middle……………………………………………………………………………………………48


Chapter 2: Hackers


Hijacking…………………………………………………………………………………………………………..49


Chapter 3: TCP/IP from a Security Viewpoint…………………………………………………………………….51


Overview………………………………………………………………………………………………………………..51


You Need to Be a TCP/IP Guru…………………………………………………………………………………51


TCP/IP Rules………………………………………………………………………………………………………….52


The Bit Bucket Brigade…………………………………………………………………………………………….53


Layer 1: Physical……………………………………………………………………………………………….54


Layer 2: Data Link……………………………………………………………………………………………..58


Layer 3: Network………………………………………………………………………………………………..61


Chapter 4: Sockets and Services from a Security Point of View…………………………………………77


Overview………………………………………………………………………………………………………………..77


Evaluating Socket-Based Services……………………………………………………………………………77


How Complex Is the Service?………………………………………………………………………………77


How Might the Service Be Abused?………………………………………………………………………78

Скачать в pdf «Firewalls 24Seven»