+1 (208) 254-6996 [email protected]
  

NETWORK ATTACKS AND DEFENSES ……………………………… 189

CHAPTER 5

Don't use plagiarized sources. Get Your Custom Essay on
NETWORK ATTACKS AND DEFENSES ……………………………… 189
Just from $13/Page
Order Essay

Networking and Server Attacks …………………………………… 191 Networking-Based Attacks ………………………………………………………………….. 193

Interception ……………………………………………………………………………………….194 Poisoning …………………………………………………………………………………………. 196

Server Attacks …………………………………………………………………………………….. 201 Denial of Service (DoS) ………………………………………………………………………..201 Web Server Application Attacks ………………………………………………………….. 203 Hijacking ………………………………………………………………………………………….. 209 Overflow Attacks ……………………………………………………………………………….. 213 Advertising Attacks …………………………………………………………………………….. 215 Browser Vulnerabilities ………………………………………………………………………. 218

Chapter Summary ……………………………………………………………………………….. 222

88781_fm_hr_i-xxvi.indd 7 8/16/17 7:01 PM

Copyright 2018 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. WCN 02-200-203

 

 

Table of Contentsviii

Key Terms …………………………………………………………………………………………… 223

Review Questions………………………………………………………………………………… 223

Case Projects ………………………………………………………………………………………. 229

CHAPTER 6

Network Security Devices, Design, and Technology ……… 233 Security Through Network Devices ……………………………………………………… 235

Standard Network Devices …………………………………………………………………. 236 Network Security Hardware ……………………………………………………………….. 246

Security Through Network Architecture ………………………………………………. 260 Security Zones ………………………………………………………………………………….. 260 Network Segregation …………………………………………………………………………. 263

Security Through Network Technologies ……………………………………………… 265 Network Access Control (NAC) ……………………………………………………………. 265 Data Loss Prevention (DLP)…………………………………………………………………. 267

Chapter Summary ……………………………………………………………………………….. 269

Key Terms …………………………………………………………………………………………… 271

Review Questions………………………………………………………………………………… 271

Case Projects ………………………………………………………………………………………. 279

CHAPTER 7

Administering a Secure Network …………………………………. 281 Secure Network Protocols …………………………………………………………………… 283

Simple Network Management Protocol (SNMP) ……………………………………. 285 Domain Name System (DNS) ……………………………………………………………… 286 File Transfer Protocol (FTP)…………………………………………………………………. 288 Secure Email Protocols ………………………………………………………………………. 290 Using Secure Network Protocols …………………………………………………………..291

Placement of Security Devices and Technologies …………………………………. 292

Analyzing Security Data ………………………………………………………………………. 295 Data from Security Devices ………………………………………………………………… 296 Data from Security Software ………………………………………………………………. 297 Data from Security Tools ……………………………………………………………………. 298 Issues in Analyzing Security Data ……………………………………………………….. 298

Managing and Securing Network Platforms ………………………………………… 300 Virtualization …………………………………………………………………………………….300 Cloud Computing ………………………………………………………………………………. 304 Software Defined Network (SDN) ………………………………………………………… 306

Chapter Summary ……………………………………………………………………………….. 309

88781_fm_hr_i-xxvi.indd 8 8/16/17 7:01 PM

Copyright 2018 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. WCN 02-200-203

 

 

Table of Contents ix

Key Terms …………………………………………………………………………………………… 310

Review Questions………………………………………………………………………………… 311

Case Projects ………………………………………………………………………………………. 318

CHAPTER 8

Wireless Network Security ………………………………………….. 321 Wireless Attacks ………………………………………………………………………………….. 324

Bluetooth Attacks………………………………………………………………………………. 324 Near Field Communication (NFC) Attacks ……………………………………………..327 Radio Frequency Identification (RFID) Attacks ……………………………………… 330 Wireless Local Area Network Attacks …………………………………………………….332

Vulnerabilities of IEEE Wireless Security ………………………………………………. 341 Wired Equivalent Privacy …………………………………………………………………… 342 Wi-Fi Protected Setup ………………………………………………………………………… 343 MAC Address Filtering ……………………………………………………………………….. 344 SSID Broadcasting ……………………………………………………………………………… 345

Wireless Security Solutions …………………………………………………………………. 346 Wi-Fi Protected Access (WPA) …………………………………………………………….. 347 Wi-Fi Protected Access 2 (WPA2) …………………………………………………………. 349 Additional Wireless Security Protections ……………………………………………….352

Chapter Summary ……………………………………………………………………………….. 356

Key Terms …………………………………………………………………………………………… 359

Review Questions………………………………………………………………………………… 359

Case Projects ………………………………………………………………………………………. 368

PART 4

DEVICE SECURITY …………………………………………………………. 371

CHAPTER 9

Client and Application Security ……………………………………. 373 Client Security …………………………………………………………………………………….. 375

Hardware System Security …………………………………………………………………..375 Securing the Operating System Software ……………………………………………… 379 Peripheral Device Security ………………………………………………………………….. 388

Physical Security …………………………………………………………………………………. 392 External Perimeter Defenses ………………………………………………………………. 393 Internal Physical Access Security ………………………………………………………… 395 Computer Hardware Security …………………………………………………………….. 400

Application Security …………………………………………………………………………….. 401 Application Development Concepts …………………………………………………….. 402

88781_fm_hr_i-xxvi.indd 9 8/16/17 7:01 PM

Copyright 2018 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. WCN 02-200-203

 

 

Table of Contentsx

Secure Coding Techniques …………………………………………………………………..404 Code Testing ……………………………………………………………………………………… 405

Chapter Summary ……………………………………………………………………………….. 406

Key Terms …………………………………………………………………………………………… 409

Review Questions………………………………………………………………………………… 410

Case Projects ………………………………………………………………………………………. 417

CHAPTER 10

Mobile and Embedded Device Security ………………………… 421 Mobile Device Types and Deployment …………………………………………………. 423

Types of Mobile Devices …………………………………………………………………….. 424

Mobile Device Risks …………………………………………………………………………….. 432 Mobile Device Vulnerabilities……………………………………………………………… 432 Connection Vulnerabilities …………………………………………………………………. 436 Accessing Untrusted Content ……………………………………………………………… 436 Deployment Model Risks ……………………………………………………………………. 438

Securing Mobile Devices ……………………………………………………………………… 439 D

Order your essay today and save 10% with the discount code ESSAYHELP