Building Internet firewalls
In the five years since the first edition of this classic book was published, Internet use has exploded. The commercial world has rushed headlong into doing business on the Web, often without integrating sound security technologies and policies into their products and methods. The security risk...
Autor principal: | |
---|---|
Otros Autores: | , |
Formato: | Libro electrónico |
Idioma: | Inglés |
Publicado: |
Sebastopol, California :
O'Reilly
2000.
|
Edición: | 2nd ed |
Materias: | |
Ver en Biblioteca Universitat Ramon Llull: | https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009627030606719 |
Tabla de Contenidos:
- Building Internet Firewalls, 2nd Edition; Audience; Platforms; Products; Examples; Conventions Used in This Book; Comments and Questions; Acknowledgments for the Second Edition; Acknowledgments for the First Edition; I. Network Security; 1.1.2. Your Resources; 1.1.3. Your Reputation; 1.2. What Are You Trying to Protect Against?; 1.2.1.2. Denial of service; 1.2.1.3. Information theft; 1.2.2. Types of Attackers; 1.2.2.2. Vandals; 1.2.2.3. Scorekeepers; 1.2.2.4. Spies (industrial and otherwise); 1.2.3. Stupidity and Accidents; 1.2.4. Theoretical Attacks; 1.3. Who Do You Trust?
- 1.4. How Can You Protect Your Site?1.4.2. Security Through Obscurity; 1.4.3. Host Security; 1.4.4. Network Security; 1.4.5. No Security Model Can Do It All; 1.5. What Is an Internet Firewall?; 1.5.1.2. A firewall can enforce a security policy; 1.5.1.3. A firewall can log Internet activity efficiently; 1.5.1.4. A firewall limits your exposure; 1.5.2. What Can&t a Firewall Do?; 1.5.2.2. A firewall can&t protect you against connections that don&t go through it; 1.5.2.3. A firewall can&t protect against completely new threats; 1.5.2.4. A firewall can&t fully protect against viruses
- 1.5.2.5. A firewall can&t set itself up correctly1.5.3. What&s Wrong with Firewalls?; 1.5.3.2. Firewalls don&t deal with the real problem; 1.6. Religious Arguments; 1.6.2. Unix Versus Windows NT; 1.6.3. That&s Not a Firewall!; 2. Internet Services; 2.2. The World Wide Web; 2.2.2. Web Server Security Issues; 2.3. Electronic Mail and News; 2.3.2. Usenet News; 2.4. File Transfer, File Sharing, and Printing; 2.4.2. File Sharing; 2.4.3. Printing Systems; 2.5. Remote Access; 2.5.2. Remote Graphic Interfaces for Microsoft Operating Systems; 2.5.3. Network Window Systems
- 2.6. Real-Time Conferencing Services2.7. Naming and Directory Services; 2.8. Authentication and Auditing Services; 2.9. Administrative Services; 2.9.2. Routing; 2.9.3. Network Diagnostics; 2.9.4. Time Service; 2.10. Databases; 2.11. Games; 3. Security Strategies; 3.2. Defense in Depth; 3.3. Choke Point; 3.4. Weakest Link; 3.5. Fail-Safe Stance; 3.5.2. Default Permit Stance: That Which Is Not Expressly Prohibited Is Permitted; 3.6. Universal Participation; 3.7. Diversity of Defense; 3.7.2. Common Configuration; 3.7.3. Common Heritage; 3.7.4. Skin-Deep Differences; 3.7.5. Conclusion
- 3.8. Simplicity3.9. Security Through Obscurity; II. Building Firewalls; 4.1.1.2. IP layer; 4.1.1.3. TCP layer; 4.2. IP; 4.2.2. IP Options; 4.2.3. IP Fragmentation; 4.3. Protocols Above IP; 4.3.1.2. TCP sequence numbers; 4.3.2. UDP; 4.3.3. ICMP; 4.3.4. IP over IP and GRE; 4.4. Protocols Below IP; 4.5. Application Layer Protocols; 4.6. IP Version 6; 4.7. Non-IP Protocols; 4.8. Attacks Based on Low-Level Protocol Details; 4.8.2. Implementation Weaknesses; 4.8.3. IP Spoofing; 4.8.3.2. The attacker doesn&t need to see the reply; 4.8.3.3. The attacker doesn&t want the reply
- 4.8.4. Packet Interception