Implementing NAP and NAC security technologies the complete guide to network access control
This guide presents real-world hacking scenarios along with complete implementation guidance for the right NAP/NAC solution, so you can understand which solution makes the most sense based upon the most prevalent risks in your environment. Follow the actual steps hackers take to perform specific exp...
Autor principal: | |
---|---|
Formato: | Libro electrónico |
Idioma: | Inglés |
Publicado: |
Indianapolis, IN :
Wiley Pub
c2008.
|
Edición: | 1st edition |
Materias: | |
Ver en Biblioteca Universitat Ramon Llull: | https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009627484006719 |
Tabla de Contenidos:
- Implementing NAP and NAC Security Technologies: The Complete Guide to Network Access Control; About the Author; Credits; Contents; Acknowledgments; Introduction; An Ethical Hacker's Perspective; Misconceptions Abound; The Flow of This Book; What You'll Learn; Questions to Ask Yourself as You Read This Book; Chapter 1: Understanding Terms and Technologies; Who Is the Trusted Computing Group?; Is There a Cisco NAC Alliance Program?; Understanding Clientless and Client-Based NAC; Pre-Admission NAC; Post-Admission NAC; Summary; Chapter 2: The Technical Components of NAC Solutions
- Analyzing the Security Posture Setting Policy for Device Analysis; Communicating the Security Posture of the Device; Taking Action Based on the Security Posture; Remediating the Security Deficiency; The Reporting Mechanism; Summary; Chapter 3: What Are You Trying to Protect?; LAN-Based NAC; Mobile NAC; Summary; Chapter 4: Understanding the Need for LAN-Based NAC/NAP; The Security Reasons for LAN-Based NAC; Unintentional LAN-Based Threats; Real-World Example of an Unintentional Threat; Intentional LAN-Based Threats; Summary; Chapter 5: Understanding the Need for Mobile NAC
- What's the Primary Need? Why Companies Look to Mobile NAC; Mobile NAC and Direct Attacks; Mobile NAC and the Wireless Threat; Mobile NAC and the Malware Threat; Summary; Chapter 6: Understanding Cisco Clean Access; Deployment Scenarios and Topologies; The Technical Components of Cisco Clean Access; The Purpose of Cisco Clean Access; Summary; Chapter 7: Understanding Cisco Network Admission Control Framework; Deployment Scenarios and Topologies; The Technical Components of the Cisco NAC Framework; The Purpose of Cisco NAC; Summary; Chapter 8: Understanding Fiberlink Mobile NAC
- Deployment Scenarios and Topologies The Technical Components of Fiberlink Mobile NAC; The Purpose of Fiberlink Mobile NAC; Summary; Chapter 9: Understanding Microsoft NAP Solutions; Deployment Scenarios and Topologies; Microsoft 802.1x; The Technical Components of Microsoft NAP; The Purpose of Microsoft NAP; Summary; Chapter 10: Understanding NAC and NAP in Other Products; NAC-Like Functionality in Non-NAC Technologies; NAC and NAP Solutions from Other Vendors; Summary; Appendix A: Case Studies and Additional Information; Cisco Clean Access; McAfee NAC; Bradford Networks
- Juniper Uniform Access Control Bibliography; Index