—How Much Security Do You Need?

Introduction CHAPTER 1—Why Secure Your Network? Thinking like an Attacker Attacker vs. Hacker Why Would Someone Want to Ruin My Day? Attacks from Within External Attacks Chapter Worksheet Summary CHAPTER 2—How Much Security Do You Need? Performing a Risk Analysis What Assets Do I Need to Protect? From What Sources Am I Trying to Protect These Assets? Who May Wish to Compromise Our Network? What Is the Likelihood of an Attack? What Is the Immediate Cost? What Are the Long-Term Recovery Costs? How Can I Protect My Assets Cost-Effectively? Am I Governed by a Regulatory Body? Budgeting Your Security Precautions Documenting Your Findings Developing a Security Policy Security Policy Basics What Makes a Good Security Usage Policy? Accessibility Defining Security Goals Defining Each Issue Your Organization’s Position Justifying the Policy When Does the Issue Apply? Roles and Responsibilities Consequences of Noncompliance For More Information... Level of Privacy Issues Not Specifically Defined Example of a Good Policy Statement Summary The Anatomy of a Frame of Data Ethernet Frames The Frame Header Section A Protocol’s Job The OSI Model Physical Layer Data Link Layer Network Layer Transport Layer Session Layer Presentation Layer Application Layer How the OSI Model Works More on the Network Layer Routers Routing Tables Static Routing Distance Vector Routing Link State Routing Connectionless and Connection-Oriented Communications Connection-Oriented Communications Network Services File Transfer Protocol FTP: The Special Case Other IP Services Boot Protocol bootp and Dynamic Host Configuration Protocol DHCP Domain Name Services DNS Gopher Hypertext Transfer Protocol HTTP Post Office Protocol POP Internet Message Access Protocol, Version 4 IMAP4 Network File System NFS Network News Transfer Protocol NNTP NetBIOS over IP Simple Mail Transfer Protocol SMTP Simple Network Management Protocol SNMP Telnet WHOIS Upper Layer Communications Summary Understanding Network Transmissions Digital Communications Electromagnetic Interference EMI Fiber Optic Cable Bound and Unbound Transmissions Choosing a Transmission Medium Topology Security Ethernet Communications Wide Area Network Topologies Private Circuit Topologies Frame Relay and X.25 Basic Networking Hardware Repeaters Hubs Bridges Switches VLAN Technology Routers A Comparison of BridgingSwitching and Routing Layer 3 Switching Summary

CHAPTER 5—Firewalls