24,99 €
A hands-on, do-it-yourself guide to securing and auditing a network CNN is reporting that a vicious new virus is wreaking havoc on the world's computer networks. Somebody's hacked one of your favorite Web sites and stolen thousands of credit card numbers. The FBI just released a new report on computer crime that's got you shaking in your boots. The experts will tell you that keeping your network safe from the cyber-wolves howling after your assets is complicated, expensive, and best left to them. But the truth is, anybody with a working knowledge of networks and computers can do just about everything necessary to defend their network against most security threats. Network Security For Dummies arms you with quick, easy, low-cost solutions to all your network security concerns. Whether your network consists of one computer with a high-speed Internet connection or hundreds of workstations distributed across dozens of locations, you'll find what you need to confidently: * Identify your network's security weaknesses * Install an intrusion detection system * Use simple, economical techniques to secure your data * Defend against viruses * Keep hackers at bay * Plug security holes in individual applications * Build a secure network from scratch Leading national expert Chey Cobb fills you in on the basics of data security, and he explains more complex options you can use to keep your network safe as your grow your business. Among other things, you'll explore: * Developing risk assessments and security plans * Choosing controls without breaking the bank * Anti-virus software, firewalls, intrusion detection systems and access controls * Addressing Unix, Windows and Mac security issues * Patching holes in email, databases, Windows Media Player, NetMeeting, AOL Instant Messenger, and other individual applications * Securing a wireless network * E-Commerce security * Incident response and disaster recovery Whether you run a storefront tax preparing business or you're the network administrator at a multinational accounting giant, your computer assets are your business. Let Network Security For Dummies provide you with proven strategies and techniques for keeping your precious assets safe.
Sie lesen das E-Book in den Legimi-Apps auf:
Seitenzahl: 609
Veröffentlichungsjahr: 2011
by Chey Cobb, CISSP
Network Security For Dummies®
Published byWiley Publishing, Inc.111 River St.Hoboken, NJ 07030-5774www.wiley.com
Copyright © 2003 by Wiley Publishing, Inc., Indianapolis, Indiana
Published by Wiley Publishing, Inc., Indianapolis, Indiana
Published simultaneously in Canada
No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning or otherwise, except as permitted under Sections 107 or 108 of the 1976 United States Copyright Act, without either the prior written permission of the Publisher, or authorization through payment of the appropriate per-copy fee to the Copyright Clearance Center, 222 Rosewood Drive, Danvers, MA 01923, (978) 750-8400, fax (978) 750-4744. Requests to the Publisher for permission should be addressed to the Legal Department, Wiley Publishing, Inc., 10475 Crosspoint Blvd., Indianapolis, IN 46256, (317) 572-3447, fax (317) 572-4447, e-mail: [email protected].
Trademarks: Wiley, the Wiley Publishing logo, For Dummies, the Dummies Man logo, A Reference for the Rest of Us!, The Dummies Way, Dummies Daily, The Fun and Easy Way, Dummies.com and related trade dress are trademarks or registered trademarks of Wiley Publishing, Inc., in the United States and other countries, and may not be used without written permission.All other trademarks are the property of their respective owners. Wiley Publishing, Inc., is not associated with any product or vendor mentioned in this book.
LIMIT OF LIABILITY/DISCLAIMER OF WARRANTY: While the publisher and author have used their best efforts in preparing this book, they make no representations or warranties with respect to the accuracy or completeness of the contents of this book and specifically disclaim any implied warranties of merchantability or fitness for a particular purpose. No warranty may be created or extended by sales representatives or written sales materials. The advice and strategies contained herein may not be suitable for your situation. You should consult with a professional where appropriate. Neither the publisher nor author shall be liable for any loss of profit or any other commercial damages, including but not limited to special, incidental, consequential, or other damages.
For general information on our other products and services or to obtain technical support, please contact our Customer Care Department within the U.S. at 800-762-2974, outside the U.S. at 317-572-3993, or fax 317-572-4002.
Wiley also publishes its books in a variety of electronic formats. Some content that appears in print may not be available in electronic books.
Library of Congress Control Number: 2002110283
ISBN: 0-7645-1679-5
Manufactured in the United States of America
10 9 8 7 6 5 4 3 2 1
1O/SS/RQ/QS/IN
Chey Cobb began her career in information security while at the National Computer Security Association (now known as TruSecure/ICSA Labs). During her tenure as the NCSA award-winning Webmaster, she discovered that Web servers often created security holes in networks and became an outspoken advocate of systems security.
Later, while developing secure networks for the Air Force in Florida, her work captured the attention of the U.S. intelligence agencies. Chey moved to Virginia and began working for the National Reconnaissance Office (NRO) as the Senior Technical Security Advisor on highly classified projects. Ultimately, she went on to manage the security program at an overseas site.
Chey is now semi-retired and has moved back to her native Florida. She writes books and articles on computer security and is a frequent speaker at security conferences. Her e-mail address is [email protected].
Dedicated to Claire Deserable Ewertz, who would have been so proud.
Many thanks to Melody, Andrea, Kevin, and all the other people who work behind the scenes and never get a pat on the back. Thanks for all your hard work to make me look so good in print! I hope we can all work together again soon.
Thanks to David Fugate, my agent, for helping me to decide to do this book. I look forward to a long relationship!
Last, but not least, thanks to my husband, Stephen, and our daughter, Erin who make it all worthwhile — even though I can be a nasty ogre when I’m writing!
We’re proud of this book; please send us your comments through our online registration form located at www.dummies.com/register/.
Some of the people who helped bring this book to market include the following:
Acquisitions, Editorial, and Media Development
Project Editor: Andrea C. Boucher
Acquisitions Editor: Melody Layne
Technical Editor: Kevin Beaver, CISSP
Editorial Manager: Carol Sheehan
Permissions Editor: Carmen Krikorian
Media Development Manager: Laura VanWinkle
Media Development Supervisor: Richard Graves
Editorial Assistant: Amanda Foxworth
Cartoons: Rich Tennant, www.the5thwave.com
Production
Project Coordinator: Nancee Reeves
Layout and Graphics: Amanda Carter, LeAndra Johnson, Jackie Nicholas, Jeremey Unger
Proofreader: TECHBOOKS Production Services
Indexer: TECHBOOKS Production Services
Publishing and Editorial for Technology Dummies
Richard Swadley, Vice President and Executive Group Publisher
Andy Cummings, Vice President and Publisher
Mary C. Corder, Editorial Director
Publishing for Consumer Dummies
Diane Graves Steele, Vice President and Publisher
Joyce Pepple, Acquisitions Director
Composition Services
Gerry Fahey, Vice President of Production Services
Debbie Stailey, Director of Composition Services
W elcome to Network Security For Dummies where the often confusing and complex world of security is finally explained in a way that makes sense. This book has been written to help you, the Average Person, to not only understand basic security measures and mechanisms, but to actually incorporate them into your network. It doesn’t matter if your system consists of just one computer at home or gazillions of servers and workstations located in a dozen offices — the basics are still the same and apply the world over.
You’ve probably picked up this book because you’ve heard the horror stories about hacks and viruses and you don’t know what to do. On the other hand, maybe you just need to check that the security measures you’ve already implemented are enough. Whatever the case, this book is for you!
Yes, network security can be expensive and difficult, but it doesn’t have to be. The topics covered in this book are, for the most part, fairly easy to incorporate and you don’t have to rob a bank to be able to afford them. Many of the measures consist of simple changes you can make to your computers. There are no complex formulas or programs to learn and, when you’ve finished this book, you’ll wonder why everyone hasn’t secured their systems.
We’ve all had to plow through technical manuals that are about as much fun as changing tires in the rain. I hope you’ll find the writing simple without being simplistic and I’ll try to give you a few grins with stories from the trenches.
This book is meant to be more of a reference book than a set of step-by-step instructions. However, if you go through the book in sequence, you’ll find that the subject matter gets more complex the deeper you get. The subjects covered are based on the unwritten code of “Computer Security Best Practices.” These are a set of rules that every network administrator or security manager agrees should be done, but are hardly ever consistently done.
You don’t have to read this book from beginning to end to be able to begin securing your network. Simply peruse the table of contents and jump right in where the mood strikes you. There is no right or wrong way to use this book. Each chapter stands on its own, although you may find that certain phrases or concepts were explained in an earlier chapter. Where appropriate, I’ve made mention of the other chapters that relate to the same subject matter.
You don’t have to read every single word in the book to get the gist of the subject. Certain technical terms and miscellaneous information is included in shaded sidebars and are marked with icons such as Technical Stuff, Remember, and Tip. I would urge you to read the cautions that are marked with the Warning icon.
In order to keep this book from becoming a 1,500-page tome, I made a few assumptions about you, the reader. I’m assuming the following:
1. You own a computer and know about operating systems and applications.
2. Your computer or computers are connected to the Internet.
3. You know a little bit about networking and are familiar with many of the networking concepts and terms.
4. You’ve read or heard stories about viruses and hackers.
5. You’ve decided not to rely upon the software vendors to do the protection for you.
As soon as you look at the Table of Contents, you’ll notice that this book is divided into five parts with a varying number of chapters for each part. In some chapters, you’ll find checklists to help you determine what needs to be done to your system and to make decisions. Hopping about from one part to another won’t hurt, so jump in and get your feet wet!
The chapters in this part take you through the questions you need to ask to ensure that you are looking in the right places for possible security holes and are implementing the right kind of security to meet your needs. You’re given up-to-date information on vulnerabilities and the basic rules for securing systems.
Security means more than just securing against hackers and viruses, so the physical aspects of security are covered as well as hazards you should be aware of.
Before you can develop a total security stance, you need to assess your risks and be aware of some of the new legislation that may affect you. Medical offices in particular are subject to news laws to protect patient privacy and a secure system will go a long way in protecting yourself as well as your clients.
Figuring out the costs of securing your network are covered as well as how to develop risk assessments and security plans. If you don’t have security rules for employees to follow, how will you know when the rules have been broken? This part will help you get the jump on all those questions.
Time to get out those screwdrivers and flashlights! This is the down and dirty part where all the specifics of security measures and mechanisms are spelled out: anti-virus, firewalls, special configurations, intrusion detection, and more. Getting to know what’s in these chapters will help you join the ranks of uber-geeks and is a definite plus on your resume!
Some network architectures require special considerations when it comes to security. This includes e-commerce and business-to-business networks. In addition, there are complex technologies to use for encryption of data. Some networks also require stronger authentication of identification because the data they store is ultra-sensitive. I’ll cover these considerations and discuss the situations in which you may require more security than normal.
Even the best networks occasionally run into problems — some of them are man-made events and others are the works of nature. Learning how to deal with problems is an important part of network security. Advance preparation for disasters and problems can make a difference between being able to recover and having to close your doors for good.
Sometimes you can’t do it all yourself and you need to call in reinforcements. This is especially true if your building has been hit by a tornado or all your data has been stolen by a hacker. Both of these are real-world problems. In this part I detail all the jobs that need to be done so you can decide what needs to be accomplished and whether or not you can handle it yourself.
This is the part that all Dummies books are known for — the cool lists of things in the back of the book. I’ve included other lists of do’s and don’ts and tons of excellent Websites to visit. There’s also the Ten Commandments of Network Security and a list of questions to ask computer security consultants. Enjoy!
Note: For even more information that you can use in your network security practices, go to this book’s Web site at www.dummies.com/extras, where I’ve included the following lists and forms, all in Word format for ease of use:
Access control checklist
Anti-virus policy
Dangerous services
Employee agreement
Hardware checklist
Software checklist
Internet use policy
URL list for security-related Web sites
Technical Stuff is there purely if you feel the need to know. Concepts and technologies are explained; using jargon only where necessary. If you feel like joining the ranks of alpha geeks, this is one place to start. Geeks love learning and sharing trivia about their jobs. In reality, they are no smarter than you are; they just know the jargon.
Danger, danger, Will Robinson! When you see this icon, be sure to read it and take care. Changing configurations on a computer and installing software can have unexpected results. It’s very easy to do something incorrectly and sometimes very hard to reverse.
Sometimes you need to be reminded of something that was covered earlier in the book. These items don’t have to be committed to memory — but it certainly wouldn’t hurt, either.
Trivia and little-known tricks are shown with the Tip icon. Sometimes a little background is included to help clarify a concept.
You can tear out the Cheat Sheet from the front of the book and frame it. You can leave the book on your desk to impress your boss. You can use the book as a paperweight to hold down all those projects you haven’t completed yet. You can send the book to me with return postage and I’ll sign it for you. Or, you can jump in and just start reading and learn more than you ever imagined. There is no wrong or right at this point — except when it comes to securing your network.
In this part . . .
You’ve just watched another report on CNN about a vicious new virus attacking the world’s computer networks and causing vast amounts of damage. You’ve finished reading the FBI report on computer crime that was featured in the Business Section of your newspaper. On the radio you hear that someone has hacked into a popular Web site and stolen thousands of credit card numbers — and you’ve visited that site!
By now you are shaking in your boots and paralyzed with fear about the state of your company’s own network. What if you get hacked and lose everything? How will you know? What will you do?
It’s time to relax and take a deep breath. The stories about doom and gloom are true, but there are things you can do to protect yourself and your network from harm. The chapters in this part will get you pointed in the right direction towards network security. If you don’t know what causes the most common security problems, then this is the place to start!
