Hardening Network Infrastructure
Bulletproof your system before you are hacked! From the publisher of the international best-seller, Hacking Exposed. No More Twinkies ®! Most networks are hard on the outside and soft and gooey on the inside. Once the outer shell is penetrated, the insides are relatively unprotected. Hardening Network Infrastructure delivers proactive—instead of reactive—guidance on how to secure the perimiter as well as the internal network core.· No “it depends” information. IT Pros don’t want to wade through reams of paper to figure out what is right for their system/configuration. Hardening Network Infrastructure provides declarative information on how to harden your Perimeter and Internal Network, Routers and Switches, Intrusion Detection/Prevention Systems, and WLAN connections how and where to use Content Filters and Application Proxies- Finally, a unique approach that takes the guess work out of Windows® security. “Do This Now!”-Checklist of 5-8 tasks to complete first, “Take It From The Top” provides systematic Windows® hardening steps, followed by “Once Is Never Enough!” because security is iterative—it must be an ongoing process, finally, for the first time, readers find out how to diplomatically and politically navigate the “Soft Issues” of securing financial support, management buy-in and employee acceptance of their security strategy
3 pages matching optivity in this book
What people are saying - Write a review
We haven't found any reviews in the usual places.
access module allow apply authentication certificate change control CIRT Cisco Cisco PIX click OK client Console content filtering database default define disable e-mail egress filtering enable encryption ensure environment example firewall firewall(config following command functionality global configuration mode hardening your network host identify IDS/IPS implement incident response interface internal network Internet IP address IPsec lOS-based devices MAC addresses method Microsoft Windows monitor Nessus network devices network infrastructure Nmap options OSPF packet password perform permit port pre-shared keys prevent protect RADIUS remote access remote administration request require router rule running the following scan screen script security policy sensor SMTP SNMP specify step subnet SurfControl switch syslog system image TACACS+ Telnet TFTP threats traffic update users VbCr vendors VLAN VPN connections wireless