Inhoud
Hoofdstuk 1: Modern Network security Threats .................................................................................... 2
Hoofdstuk 2: Securing Network Devices ................................................................................................. 8
Hoofdstuk 3: Authentication, Authorization and accounting ............................................................... 19
Hoofdstuk 4: Implementing Firewall technologies ............................................................................... 25
Hoofdstuk 5: implementing Intrusion Prevention ................................................................................ 32
Hoofdstuk 6: securing the local area network ...................................................................................... 41
Hoofdstuk 7: cryptografie ..................................................................................................................... 51
Hoofdstuk 8: Implementing Virtual Private Networks .......................................................................... 59
Hoofdstuk 9: Implementing the Cisco Adaptive Security Appliance ..................................................... 64
Hoofdstuk 10: Advanced CISCO adaptive security Appliance ............................................................... 69
Hoofdstuk 11: Managing a Secure Network ......................................................................................... 76
, Hoofdstuk 1: Modern Network security Threats
1.2.1.5
State‐sponsored cyber hackers: These are government‐funded and guided attackers,
ordered to launch operations that vary from cyber espionage to intellectual property theft.
1.2.2.2 Evolution of Security tools
Password cracking
Wireless hacking tools
Network scanning and hacking tools
Packet crafting tools
Packet sniffers
Rootkit detectors
Fuzers to search Vulnerabilities
1.2.2.3 Network hacking attacks
Eavesdropping
Data modification
Ip address spoofing
Password based attack
Denial of service Attack
Man in the middle attack
Compromised key attack
Sniffer attack
1.2.3.4 Trojan Horse classification
Remote‐access
Data sending
Destructive
Proxy
ftp
security software disabler
DoS
1.2.3.6 worm components
Enabling vulnerability
Propagation mechansim
Payload
1.2.3.7 other malware
Ransomware
Spyware
Adware
Scareware
Phising
Rootkits
2