—How Much Security Do You Need?
Introduction CHAPTER 1—Why Secure Your Network?
Thinking like an Attacker Attacker vs. Hacker
Why Would Someone Want to Ruin My Day? Attacks from Within
External Attacks Chapter Worksheet
Summary
CHAPTER 2—How Much Security Do You Need?
Performing a Risk Analysis What Assets Do I Need to Protect?
From What Sources Am I Trying to Protect These Assets? Who May Wish to Compromise Our Network?
What Is the Likelihood of an Attack? What Is the Immediate Cost?
What Are the Long-Term Recovery Costs? How Can I Protect My Assets Cost-Effectively?
Am I Governed by a Regulatory Body? Budgeting Your Security Precautions
Documenting Your Findings Developing a Security Policy
Security Policy Basics What Makes a Good Security Usage Policy?
Accessibility Defining Security Goals
Defining Each Issue Your Organization’s Position
Justifying the Policy When Does the Issue Apply?
Roles and Responsibilities Consequences of Noncompliance
For More Information... Level of Privacy
Issues Not Specifically Defined Example of a Good Policy Statement
Summary
The Anatomy of a Frame of Data Ethernet Frames
The Frame Header Section A Protocol’s Job
The OSI Model Physical Layer
Data Link Layer Network Layer
Transport Layer Session Layer
Presentation Layer Application Layer
How the OSI Model Works More on the Network Layer
Routers Routing Tables
Static Routing Distance Vector Routing
Link State Routing Connectionless and Connection-Oriented Communications
Connection-Oriented Communications Network Services
File Transfer Protocol FTP: The Special Case Other IP Services
Boot Protocol bootp and Dynamic Host Configuration Protocol DHCP Domain Name Services DNS
Gopher Hypertext Transfer Protocol HTTP
Post Office Protocol POP Internet Message Access Protocol, Version 4 IMAP4
Network File System NFS Network News Transfer Protocol NNTP
NetBIOS over IP Simple Mail Transfer Protocol SMTP
Simple Network Management Protocol SNMP Telnet
WHOIS Upper Layer Communications
Summary
Understanding Network Transmissions Digital Communications
Electromagnetic Interference EMI Fiber Optic Cable
Bound and Unbound Transmissions Choosing a Transmission Medium
Topology Security Ethernet Communications
Wide Area Network Topologies Private Circuit Topologies
Frame Relay and X.25 Basic Networking Hardware
Repeaters Hubs
Bridges Switches
VLAN Technology Routers
A Comparison of BridgingSwitching and Routing Layer 3 Switching
Summary