万本电子书0元读

万本电子书0元读

顶部广告

Practical Network Scanning电子书

售       价:¥

1人正在读 | 0人评论 9.8

作       者:Ajay Singh Chauhan

出  版  社:Packt Publishing

出版时间:2018-05-24

字       数:28.9万

所属分类: 进口书 > 外文原版书 > 电脑/网络

温馨提示:数字商品不支持退换货,不提供源文件,不支持导出打印

为你推荐

  • 读书简介
  • 目录
  • 累计评论(0条)
  • 读书简介
  • 目录
  • 累计评论(0条)
Get more from your network by securing its infrastructure and increasing its effectiveness About This Book ? Learn to choose the best network scanning toolset for your system ? Implement different concepts of network scanning such as port scanning and OS detection ? Adapt a practical approach to securing your network Who This Book Is For If you are a security professional who is responsible for securing an organization's infrastructure, then this book is for you. What You Will Learn ? Achieve an effective security posture to design security architectures ? Learn vital security aspects before moving to the Cloud ? Launch secure applications with Web Application Security and SQL Injection ? Explore the basics of threat detection/response/ mitigation with important use cases ? Learn all about integration principles for PKI and tips to secure it ? Design a WAN infrastructure and ensure security over a public WAN In Detail Network scanning is the process of assessing a network to identify an active host network; same methods can be used by an attacker or network administrator for security assessment. This procedure plays a vital role in risk assessment programs or while preparing a security plan for your organization. Practical Network Scanning starts with the concept of network scanning and how organizations can benefit from it. Then, going forward, we delve into the different scanning steps, such as service detection, firewall detection, TCP/IP port detection, and OS detection. We also implement these concepts using a few of the most prominent tools on the market, such as Nessus and Nmap. In the concluding chapters, we prepare a complete vulnerability assessment plan for your organization. By the end of this book, you will have hands-on experience in performing network scanning using different tools and in choosing the best tools for your system. Style and approach A practical guide that offers a simple way to easily understand network security concepts and apply them to strengthen your network.
目录展开

Title Page

Copyright and Credits

Practical Network Scanning

Packt Upsell

Why subscribe?

PacktPub.com

Contributors

About the author

About the reviewer

Packt is searching for authors like you

Preface

Who this book is for

What this book covers

To get the most out of this book

Download the color images

Conventions used

Get in touch

Reviews

Fundamental Security Concepts

Why security?

Building blocks of information security

Computer security

Network security

Firewalls

Intrusion detection systems / intrusion prevention systems

Multitier topology

Internet security

Password

System upgrade and updates

Phishing

Beware of phishing phone calls

Phishing protection

Security issues, threats, and attacks

IoT security risk

Computer security risk

Security Risk-Border Gateway Protocol

Security and threats

Natural disasters

Human threats

Security vulnerabilities

Technology weaknesses

Configuration weaknesses

Security policy weaknesses

Using unencrypted or weak encryption for a website

Summary

Questions

Further reading

Secure Network Design

Access control

Asset classification and physical security

Authentication, authorization, and accounting

Network management and security design

Network segmentation

Segmentation strategy steps

Network protection consideration and design

Hardening your TCP/IP stack

DoS and DDoS attacks

Volume-based attacks

Application layer attacks

Low-rate attacks

IP spoofing

Anti-spoofing using access lists

Encryption

Anti-spoofing using RPF checks

Ping sweeps and Port scans

Mitigation

DNS vulnerabilities

How does DNS work?

DNS protocol attacks

Mitigation

Two factor authentication

Summary

Questions

Further reading

Server-Level Security

Classification of data

Physical security

Disk encryption

Full-disk encryption

Bitlocker

Virtual Trusted Platform Module – vTPM

Encrypt your Hyper-V Guest VMs

Cloud VM disk encryption

What is encryption at rest?

Hardening server security

Check for open ports or services

System firewall configuration

System update

Disable USB

Hard disk encryption

BIOS protection

Check the installed packages

Password policies

Secure and encrypt remote access

Implement activity logging

Document the host information

Authentication NTLM versus Kerberos

Password policies

Server-level permissions

Server antivirus and malware protection

Local security policies

Summary

Questions

Further reading

Cloud Security Design

Cloud offerings

IaaS

PaaS

SaaS

Public versus private

Public IaaS versus private IaaS

Public PaaS versus private PaaS

Public SaaS versus private SaaS

Shared technology and shared danger

Security approach for cloud computing

Traditional enterprise network model

Hybrid data center and cloud network

Network security devices for IaaS

Firewall Virtual Appliance

Virtual TAP vTAP

Virtual Router

Virtual web application firewalls

DDoS attack protection

Data loss prevention

Exploited system vulnerabilities

Summary

Questions

Further reading

Application Security Design

GDPR

Getting consent

Access to data

Encryption

SQL Injection

Prevention of SQL Injection attack on web applications

Employing comprehensive data sanitization

Deploying a Web Application Firewall

Limit database privileges

Finding vulnerabilities

WAFs

WAF protection against common web attacks

Blacklisting and whitelisting

What is blacklisting?

Benefit and disadvantage of blacklisting

What is whitelisting?

Benefit and disadvantage of whitelisting

Which is better?

Using HTTPS for everything

HTTP versus HTTPS

Web application security

SSL/TLS deployment

SSL/TLS key size

Signing algorithm

Secure protocol

Preventing an authentication hacking attack

Use cookies securely

Vulnerabilities scan

Server security

Introduce a bug bounty program

Summary

Questions

Further reading

Threat Detection and Response

Network threat detection

Detection methods

Intrusion detection system

Types of IDSs

Network capture solution

Threat detection with Netflow/IPFIX

NetFlow vs. IPFIX

Endpoint threat detection

What’s an endpoint

Endpoint Detection and Response (EDR) system

Case Study – Why EDR system is required?

Security policy

How to choose an EDR solution ?

Security information and event management

SIEM—Event versus incident and data breach

What is an event?

What is a security incident?

What is a data breach?

How do SIEM systems work?

Event generator sensors

Event and log collection or data aggregation

Correlation

Reporting and Alerting

Dashboards

Automation

Log management

SIEM commercial products

Summary

Questions

Further reading

Vulnerability Assessment

Infrastructure concerns

What is vulnerability assessment?

Plan

Network discovery

Vulnerability scan

Report

Remediation

Why do we need vulnerability assessment?

Types of vulnerability assessment

Network-based assessment

Host-based assessment

Nessus installation, configuration, and vulnerability assessment methodology

Installation

Policies

Sample report

Summary

Questions

Further reading

Remote OS Detection

Reasons for OS detection

Network operating system inventory – trace your infrastructure

Determining vulnerability of target hosts

Tailoring exploits

OS detection technique with Nmap

Nmap tool

Operating system detection

TCP/IP fingerprinting methods supported by Nmap

TCP/UDP/IP basic

The FIN probe

TCP ISN sampling

TCP initial window

Type of service

Time-to-live (TTL)

Don't Fragment (DF) bit

Understanding an Nmap fingerprint

OS matching algorithms

Defense against port scans

Summary

Questions

Further reading

Public Key Infrastructure-SSL

Foundation of SSL

How do I know that SSL is working?

Why no PadLock?

SSL certificate

The evolution of SSL and TLS

Current Supported Standard

Why hasn't TLS 1.3 been implemented yet?

Time to say goodbye to SSL and early TLS

SSL certificate component

Root certificate

Intermediate certificate

SSL certificates classes

TLS versus SSL

Public Key Infrastructure

Symmetric encryption

Asymmetric encryption

Hash function

Attacks against PKI

Microsoft Windows and IIS

OpenSSL

SSL Management tools

Summary

Questions

Further reading

Firewall Placement and Detection Techniques

Technical requirements

Firewall and design considerations

Firewall terminology

Firewall generations

Firewall performance

Firewall placement and design network topology

Single firewall architecture

Single firewall architecture with a single IP subnet

Single firewall architecture with multiple IP subnets

Multilayer firewall architecture

Firewall sandwich design

Demilitarized Zone

DMZ to Internal Access Policy

OSI model versus TCP/IP model

Firewall performance, capabilities, and function

Firewall management

Application proxies

Detecting firewalls

Debugging tools

Summary

Questions

Further Reading

VPN and WAN Encryption

Overview

Classes of VPN

Type of VPN protocol

Point-to-Point tunneling protocol

Layer 2 Tunneling Protocol

Secure Socket Tunneling protocol

Internet Protocol Security

SSL VPN

MPLS VPN

VPN Design

IKE V1 versus IKE V2

WAN Encryption technique

IPsec Layer-3 encryption

MACsec—Layer-2 Encryption

Optical Network—Layer-1 Encryption

Summary

Questions

Further Reading

Summary and Scope of Security Technologies

DDoS protection

Remotely triggered black hole routing (RTBH)

Black hole traffic from the source of the attack

Black hole traffic to the destination of the attack

BGP FlowSpec

DDoS scrubbing

Blockchain Technology for Fighting DDoS Attacks

AI in cyber security

Next Gen SIEM

Software Defined Networking Firewall

Bring-Your-Own-Identity (BYOI)

Summary

Further reading

Assessment

Chapter 1

Chapter 2

Chapter 3

Chapter 4

Chapter 5

Chapter 6

Chapter 7

Chapter 8

Chapter 9

Chapter 10

Chapter 11

Other Books you may enjoy

Leave a review - let other readers know what you think

累计评论(0条) 0个书友正在讨论这本书 发表评论

发表评论

发表评论,分享你的想法吧!

买过这本书的人还买过

读了这本书的人还在读

回顶部