Inside Network Perimeter Security (2nd Edition)

Index

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [Z]

IANA (Internet Assigned Numbers Authority) websiteICMP     packet-too-big ICMP unreachable messages

     reflexive ACL

ICMP (Internet Control Message Protocol)     packet-too-big unreachable messages 2nd

     router hardening         directed broadcasts         redirects         unreachables 2nd 3rd

    state         tracking 2nd ICMP destination unreachable messages

ICMP echo requests

     blocking 2nd

ICMP flooding

    DDoS attacks         network performance 2nd 3rd 4th

     network performance

    smurfing attacks         network performance 2nd

     zombie systemsICMP messages

     filtering 2nd     TCP/IP network performance 2nd

ICMP scans

     network security assessments 2nd

     Nmap

ICV (integrity check values)

identification phase (incident response)

identifying risks (security policies)

identifying weaknesses (IDS)

     security auditing

     security policy violations 2nd

IDS

     Snort 2nd

IDS (intrsion detection systems)

     reasons for 2nd

IDS (intrusion detection system)     HTTP tunneling 2nd

IDS (intrusion detection systems)     anomaly detection 2nd    case studies

         networks with multiple external access points 2nd

         simple network infrastructures 2nd 3rd

         unrestricted network environments 2nd 3rd

     defining 2nd

    HIDS         defining 2nd     host-based 2nd 3rd         categories of

         compromised hosts

         deploying 2nd         file integrity checkers 2nd 3rd

         file integrity checkers, AIDE         file integrity checkers, Samhain         file integrity checkers, Tripwire         file integrity checkers, Tripwire Manager

         file integrity checkers, Winalysis         log analyzers         log file monitoring utilities, Logcheck 2nd

         network connection monitoring utilities, BlackICE 2nd

         network connection monitoring utilities, PortSentry 2nd

         versus network IDS 2nd

     logs    network

         versus host-based 2nd

    NIDS         defining 2nd

         role in perimeter defense     perimeter defense components, compatibility with

     perimeter defense, role in 2nd     reporting

    roles of

         host attack detection 2nd

         incident handling

         weakness identification

         weakness identification, security auditing

         weakness identification, security policy violations 2nd

     sensors, deploying 2nd

         encrypted network traffic

         external networks 2nd

         firewalls 2nd

         high volume network traffic

         IDS management networks 2nd

         internal networks 2nd 3rd

         packet filters         security maintenance 2nd

         spanning ports         switches 2nd     services

         distributed

         outsourced monitoring

     signature detection 2nd

         alerts

         detecting evasion techniques         false positive/negative signatures 2nd 3rd         unwanted alerts     software 2nd

    worms

         identifying IDS Is Dead report 2nd

IDS logs     host-based firewalls 2ndIDS management networks     IDS sensor placement 2nd

ifconfig utility     link layer troubleshooting     network layer troubleshooting

IIOP (Internet Inter-ORB Protocol)

     interapplication communication

IKE (Internet Key Exchange) protocol

    authentication         digital certificates

         pre-shared keys

     phase 1 negotiations 2nd 3rd         authentication exchanges, main mode

         example of 2nd 3rd     phase 2 negotiations

         example of implicit denies 2nd 3rd

implicit permits

in/out keywords (ACL) 2nd 3rd

     VLAN interfaces

incident handling

     HoneyNet Project

     IDS

     log files 2nd

     security policies, implementing 2nd

incident response (perimeter security maintenance)

     automating 2nd

     notifications 2nd

     phases of 2nd

     response guidelines 2nd

incoming rulebase (NetScreen-100 external firewall) 2ndinformation

     as crown jewels 2nd    defense in depth         cryptography

         cryptography, PGP

         cryptography, PKI

         diffusion of information 2nd 3rd

         diffusion of information, remote controlware

         diffusion of information, WAP infrastructure mode (wireless networks) ingress filtering 2nd 3rd 4th     perimeter defense, role in 2nd

ingress filters

    adversarial reviews         determining attacker access 2nd

initiators (proxy servers)inline firewalls     secure perimeter design 2ndinline security devices

     system performance Insertion, Evasion, and Denial of Service[COLON] Eluding Network Intrusion Detection [ITAL]insiders

     Cisco stock options exploits

     secure perimeter design 2nd

inspect statements (CBAC)

Integrity (Check Point) intelligent switches (NIPS) 2nd

interapplication communications

     CORBA     DCOM 2nd

     HTTP     IIOP

     SOA     SOAP 2nd

     Web services 2nd 3rd

interfaces

     ACL, applying to

internal firewalls

     adversarial reviews

         determining attacker access 2nd 3rd 4th

         determining impact of misconfigurations/vulnerabilities 2nd 3rd 4th 5th 6th

         determining maximum amount of network access 2nd 3rd 4th 5th 6th 7th

    Nokia IP330

         adversarial reviews 2nd 3rd

         rulebases 2nd

     rulebases

internal network

     defense in depth infrastructure, role in         antivirus software

         auditing 2nd         configuration management 2nd         host hardening 2nd

         personal firewalls 2nd 3rd

internal networks

     complex e-commerce site case studies 2nd

     hiding 2nd

     IDS sensor deployment 2nd 3rdinternal protected networks     proxy firewallsinternal subnetting

     routers

Internet     complex e-commerce site case studies 2nd 3rd

     VPN availabilityInternet connections    broadband         case studies 2nd 3rd 4th 5th 6th

intranet VPNintrasite redundancy     fault tolerance 2nd 3rd 4th 5th

     firewall redundancy 2nd 3rd

     switch redundancy 2nd

intrasystem redundancy

     fault tolerance introductions (network security assessment documentation)

IntruShield 2nd

intrusion detection     alerts

     anomaly detection 2nd    case studies

         networks with multiple external access points 2nd         simple network infrastructures 2nd 3rd

         unrestricted network environments 2nd 3rd

     host-based IDS

         file integrity checkers

         log analyzers

     logging

     network log files

     perimeter defense components, compatibility with

     reasons for 2nd

     reporting

    roles of

         host attack detection 2nd

         incident handling

         weakness identification

         weakness identification, security auditing         weakness identification, security policy violations 2nd

     sensors, deploying 2nd         encrypted network traffic         external networks 2nd

         firewalls 2nd

         high volume network traffic

         IDS management networks 2nd

         internal networks 2nd 3rd

         packet filters         security maintenance 2nd         spanning ports         switches 2nd

     services

         distributed         outsourced monitoring

     signature detection 2nd         detecting evasion techniques         false positive/negative signatures 2nd 3rd         unwanted alerts

     software 2nd intrusion preventionintrusion prevention systems (IPS)

     CSA 2nd

     Deep Packet Inspection

     development of 2nd

     false positives     Gartner IDS Is Dead report 2nd

    HIPS

         advantages of         challenges of

         custom application dynamic rule creation 2nd         deployment recommendations, attacks 2nd

         deployment recommendations, document requirements/testing procedures         deployment recommendations, role in defense-in-depth architectures

         deployment recommendations, software update installation

         deployment recommendations, update control policies

         false positives

         monitoring application behavior

         monitoring file integrity

         OS shims

         real-world experience of

         system call interception

     limitations of 2nd 3rd

    NIPS

         ASIC 2nd

         chokepoint

         chokepoint devices

         chokepoint, firewalls 2nd 3rd 4th 5th 6th         chokepoint, IDS plus something classification 2nd 3rd 4th 5th 6th 7th 8th 9th

         general-purpose CPU         intelligent switches 2nd         switch-type

         switch-type, deployment recommendations 2nd 3rd 4th 5th 6th 7th 8th 9th 10th

         switch-type, detection capabilities

         switch-type, environmental anomaly analysis

         switch-type, evasion resistance

         switch-type, latency requirements         switch-type, organizational policy enforcement         switch-type, passive analysis 2nd         switch-type, product development

         switch-type, protocol scrubbing

         switch-type, rate limiting         switch-type, security 2nd

         switch-type, stability demands         switch-type, throughput demands         switch-type, TippingPoint UnityOne IPS 2nd         switch-type, TopLayer Attack Mitigator

    requirements of         accuracy         keeping current

         keeping state 2nd

         nullifying attacks

         speed 2nd

     Shallow Packet Inspection Inurl search extension (Google)

inverse mapping

IOS updates (routers)IP (Internet Protocol)

    address ranges         blocking

    addresses         friendly net access 2nd 3rd 4th

    spoofed addresses

         blocking

     TCP/IP, role in

    TTL

         network log analysis

     versions of 2nd

IP (Internet Protocols)

    reserved/private addresess

         ingress filtering 2nd 3rd 4th

IP addresses

     network security assessments, determining for

     probes, tracking 2nd

IP protocols

    firewalls         software architecture

ip route statementsIP-based telephony systems     secure perimeter design

IPChains 2nd

IPChains firewalls

     Nmap ACK scans 2nd

ipconfig utility

     link layer troubleshooting     network layer troubleshooting 2ndIPS (intrusion prevention systems)     CSA 2nd

     Deep Packet Inspection

     defining     development of 2nd

     false positives     Gartner IDS Is Dead report 2nd    HIPS         advantages of

         challenges of         custom application dynamic rule creation 2nd         deployment recommendations, attacks 2nd

         deployment recommendations, document requirements/testing procedures

         deployment recommendations, role in defense-in-depth architectures

         deployment recommendations, software update installation

         deployment recommendations, update control policies         false positives

         monitoring application behavior

         monitoring file integrity         OS shims

         real-world experience of         system call interception

     limitations of 2nd 3rd    NIPS

         ASIC 2nd

         chokepoint

         chokepoint devices

         chokepoint, firewalls 2nd 3rd 4th 5th 6th

         chokepoint, IDS plus something classification 2nd 3rd 4th 5th 6th 7th 8th 9th

         general-purpose CPU

         intelligent switches 2nd

         switch-type

         switch-type, deployment recommendations 2nd 3rd 4th 5th 6th 7th 8th 9th 10th

         switch-type, detection capabilities

         switch-type, environmental anomaly analysis

         switch-type, evasion resistance

         switch-type, latency requirements

         switch-type, organizational policy enforcement         switch-type, passive analysis 2nd

         switch-type, product development         switch-type, protocol scrubbing         switch-type, rate limiting

         switch-type, security 2nd

         switch-type, stability demands

         switch-type, throughput demands

         switch-type, TippingPoint UnityOne IPS 2nd

         switch-type, TopLayer Attack Mitigator     perimeter defense, role in    requirements of         accuracy

         keeping current

         keeping state 2nd         nullifying attacks

         speed 2nd     Shallow Packet Inspection IPSec 2nd     AH protocol

         ESP protocol combinations 2nd         ICV         packet header information 2nd 3rd

    authentication

         pre-shared keys

    configuration examples

         Cisco routers 2nd 3rd 4th 5th 6th 7th 8th 9th         Windows XP 2nd 3rd 4th 5th 6th 7th 8th

    ESP

         UDP encapsulation         VPN perimeter defenses

     ESP protocol         AH protocol combinations 2nd

         IPSec transport mode         IPSec tunnel mode 2nd

         NAT 2nd

         packet header components 2nd

         packet traces, example of 2nd

    firewalls

         VPN

     gateway-to-gateway architectures

         VPN

     host-to-gateway architectures

         VPN

     host-to-host architectures

         VPN

     IKE protocol

         authentication, digital certificates

         authentication, pre-shared keys         phase 1 negotiations 2nd 3rd

         phase 1 negotiations, authentication exchanges         phase 1 negotiations, example of 2nd 3rd         phase 2 negotiations

         phase 2 negotiations, example of

     NAT-T

     PAT 2nd

    routers

         VPN     SA 2nd 3rd     SAD 2nd 3rd     SPD

     transport mode

         ESP protocol    tunnel mode

         ESP protocol 2nd     tunneling mode     versus L2TP 2nd    VPN

         case studies 2nd 3rd         perimeter defenses 2nd 3rd         server integration 2nd

     VPN client integration 2nd

     VPN concentrators

     wireless network security

IPSec packet-filtering     server firewalls 2nd

IPTable logs

     analyzingIPTables

     input rules 2nd     IPv6

     output rules 2nd 3rd     state tables, example of 2nd

     stateful firewalls 2nd 3rd 4th 5th 6th

IPv6

     Netfilter/IPTables

IPv6 ACL (access control lists) 2nd

ISDN network connection performance case study 2nd

isolated ports (PVLAN)

ISS Internet Scanner vulnerability scanner 2nd 3rd 4th

Категории