Hardening Network Infrastructure. Bulletproof Your Systems Before You Are Hacked.

P

packet sniffers, 402 “405

packet-inspecting/filtering gateways, 10, 40 “41

partners , as user type, 25

passwords

avoiding common, 121 “122

changing defaults on WAPs, 250 “252

password policy, 33

VTP, 380

patches/updates, 445 “473

applications, 472

change control patch policy, 450 “451

keeping current with, 448 “449

maintenance and support agreements, 449 “450

overview, 445 “447

planning patch response, 453

procedures, 451 “452

system configuration. See system configuration

system image. See system image

when to use, 447 “448

pattern matching detection, 77

PEAP (Protected EAP), 266 “267

penetration testing, 399, 424

perceptions/expectations

management. See management perceptions/expectations

overview, 478 “479

users. See user perceptions/expectations

performance management, 333 “335

permissions, 50

physical security, 29, 273

PKI (Public Key Infrastructure) Administrator, 507

PocketPC, 252

Point-to-Point Tunneling Protocol (PPTP), 108 “110, 122

policies. See also security policy

acceptable-use, 35, 207, 392

analog/ISDN, 30

antivirus, 30

change control, 450 “451

enterprise monitoring, 34

extranet, 31 “32

function of, 22

IDS/IPS, 34

incident response, 525 “527

Internet content filtering, 34

password, 33

remote access, 33

risk analysis, 31

routers and switches, 33

VPN, 32

wireless communication, 32

wireless security, 242

polling

products, 314

with WhatsUp Gold, 314 “320

port mirroring, 86, 213

port scanning, 401, 406 “410

port security, 201 “202

port-based authentication. See 802.1x port-based authentication

ports, disabling unused, 380

PPTP (Point-to-Point Tunneling Protocol), 108 “110, 122

prevention, security policies, 395 “396

private VLANs. See PVLANs (private VLANs)

privileged internal user, 25

procedures, 22

Protected EAP (PEAP), 266 “267

Proxy ARP, 169

Public Key Infrastructure (PKI) Administrator, 507

public relations, 521

publications . See resources ( vendors , publications, and web sites)

PureSecure

alerts, 98 “99

hardening, 78 “81

logs, 95 “96

tuning sensors, 88 “90

purpose section, of security policy, 26

PVLANs (private VLANs)

configuring, 195 “196

enforcing trust models among hosts , 374 “375

isolating traffic devices, 380

Категории