Network Security Assessment ppt

506 6.6K 4
Network Security Assessment ppt

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

Thông tin tài liệu

[...]... appendix: Preface | xix Chapter 1, Network Security Assessment, discusses the rationale behind network security assessment and introduces security as a process, not a product Chapter 2, Network Security Assessment Platform, covers the various operating systems and tools that make up a professional security consultant’s attack platform Chapter 3, Internet Host and Network Enumeration, logically walks... comprehensive blueprint for security testing and assessment xxiv | Preface Chapter 1 CHAPTER 1 Network Security Assessment 1 This chapter discusses the rationale behind Internet-based network security assessment and penetration testing at a high level To retain complete control over your networks and data, you must take a proactive approach to security, an approach that starts with assessment to identify... this book Network Security Assessment Methodology The best practice assessment methodology used by determined attackers and network security consultants involves four distinct high-level components: • Network reconnaissance to identify IP networks and hosts of interest • Bulk network scanning and probing to identify potentially vulnerable hosts • Investigation of vulnerabilities and further network probing... the networking protocol suite all public Internet sites currently use to communicate and transmit data to one another From a network security assessment methodology standpoint, this book comprehensively discusses the steps that should be taken during the security assessment of any IPv4 network IPv6 is an improved protocol that is gaining popularity among academic networks IPv6 offers a 128-bit network. .. Figure 1-2 The cyclic approach to network security assessment 8 | Chapter 1: Network Security Assessment Account usernames Brute Force Password Grinding Using multipe vectors (remote maintenance, email, and FTP services in particular) to compromise valid user passwords This flowchart includes network enumeration, then bulk network scanning, and finally specific service assessment It may be the case that... formulate effective countermeasures and risk mitigation strategies Network Security Assessment Methodology | 7 The Cyclic Assessment Approach Assessment of large networks in particular can become a very cyclic process if you are testing the networks of an organization in a blind sense and are given minimal information As you test the network, information leak bugs can be abused to find different types... assurance and understanding of the technical security of the network, along with adherence to security policy and incident response procedures In this book, I discuss assessment of technical security and improving the integrity and resilience of IP networks Taking heed of the advice presented here and acting in a proactive fashion ensures a decent level of network security IP: The Foundation of the Internet... identify and categorize your risks Network security assessment is an integral part of any security life cycle The Business Benefits From a commercial standpoint, information assurance is a business enabler As a security consultant, I have helped a number of clients in the retail sector secure their 802.11 wireless networks used in stores By designing and implementing secure networks, these retailers can... of security mechanisms This complete methodology is relevant to Internet-based networks being tested in a blind fashion with limited target information (such as a single DNS domain name) If a consultant is enlisted to assess a specific block of IP space, he skips initial network enumeration and commences bulk network scanning and investigation of vulnerabilities 4 | Chapter 1: Network Security Assessment. .. policies After gaining insight into accessible hosts and network services, analysts can begin offline analysis of the bulk results and investigate the latest vulnerabilities in accessible network services Network Security Assessment Methodology | 5 Investigation of Vulnerabilities New vulnerabilities in network services are disclosed daily to the security community and the underground alike through Internet . Attackers 2 Assessment Service Definitions 3 Network Security Assessment Methodology 4 The Cyclic Assessment Approach 8 2. Network Security Assessment Platform free. Network Security Assessment SECOND EDITION Chris McNab Beijing • Cambridge • Farnham • Köln • Paris • Sebastopol • Taipei • Tokyo Network Security Assessment,

Ngày đăng: 07/03/2014, 04:20

Từ khóa liên quan

Mục lục

  • Network Security Assessment, Second Edition

    • Table of Contents

    • Foreword

      • About Bob Ayers

      • Preface

        • Overview

        • Recognized Assessment Standards

          • NSA IAM

          • CESG CHECK

          • PCI Data Security Standards

          • Other Assessment Standards and Associations

          • Hacking Defined

          • Organization

          • Audience

          • Mirror Site for Tools Mentioned in This Book

          • Using Code Examples

          • Conventions Used in This Book

          • Comments and Questions

          • Acknowledgments

            • Guest Authors Featured in This Book

            • Network Security Assessment

              • The Business Benefits

              • IP: The Foundation of the Internet

              • Classifying Internet-Based Attackers

              • Assessment Service Definitions

              • Network Security Assessment Methodology

                • Internet Host and Network Enumeration

Tài liệu cùng người dùng

  • Đang cập nhật ...

Tài liệu liên quan