更新时间:2022-07-12 10:44:00
封面
版权信息
Packt Upsell
Why subscribe?
PacktPub.com
About the author
About the reviewer
Packt is searching for authors like you
Preface
Who this book is for
What this book covers
To get the most out of this book
Download the color images
Conventions used
Get in touch
Reviews
Fundamental Security Concepts
Why security?
Building blocks of information security
Computer security
Network security
Firewalls
Intrusion detection systems / intrusion prevention systems
Multitier topology
Internet security
Password
System upgrade and updates
Phishing
Beware of phishing phone calls
Phishing protection
Security issues threats and attacks
IoT security risk
Computer security risk
Security Risk-Border Gateway Protocol
Security and threats
Natural disasters
Human threats
Security vulnerabilities
Technology weaknesses
Configuration weaknesses
Security policy weaknesses
Using unencrypted or weak encryption for a website
Summary
Questions
Further reading
Secure Network Design
Access control
Asset classification and physical security
Authentication authorization and accounting
Network management and security design
Network segmentation
Segmentation strategy steps
Network protection consideration and design
Hardening your TCP/IP stack
DoS and DDoS attacks
Volume-based attacks
Application layer attacks
Low-rate attacks
IP spoofing
Anti-spoofing using access lists
Encryption
Anti-spoofing using RPF checks
Ping sweeps and Port scans
Mitigation
DNS vulnerabilities
How does DNS work?
DNS protocol attacks
Two factor authentication
Server-Level Security
Classification of data
Physical security
Disk encryption
Full-disk encryption
Bitlocker
Virtual Trusted Platform Module – vTPM
Encrypt your Hyper-V Guest VMs
Cloud VM disk encryption
What is encryption at rest?
Hardening server security
Check for open ports or services
System firewall configuration
System update
Disable USB
Hard disk encryption
BIOS protection
Check the installed packages
Password policies
Secure and encrypt remote access
Implement activity logging
Document the host information
Authentication NTLM versus Kerberos
Server-level permissions
Server antivirus and malware protection
Local security policies