Secure Your Network for Free
Pages:480
This is the only book to clearly demonstrate how to get big dollar security for your network using freely available tools. This is a must have book for any company or person with a limited budget.
Network security is in a constant struggle for budget to get things done. Upper management wants thing to be secure but doesnt want to pay for it. With this book as a guide, everyone can get what they want. The examples and information will be of immense value to every small business. It will explain security principles and then demonstrate how to achieve them using only freely available software.
* Teachers you how to implement best of breed security using tools for free
* Ideal for anyone recomending and implementing new technologies within the company
* Companion Web site contains dozens of working scripts and tools
Table of Contents:
Presenting the Business Case for Free Solutions 1
Introduction 2
The Costs of Using Free Security Solutions 2
Training Costs 3
Hardware Costs 3
Consulting Costs 4
Hidden Costs 5
The Savings of Using Free Security Solutions 6
Purchase Costs 6
Maintenance Costs 7
Customization Costs 7
Comparing Free Solutions with Commercial Solutions 8
Strengths of Free Solutions 9
Weaknesses of Free Solutions 10
Evaluating Individual Solutions 12
"Selling" a Free Solution 16
Selling by Doing 17
Presenting a Proposal 17
Summary 19
Solutions Fast Track 19
Frequently Asked Questions 21
Protecting Your Perimeter 23
Introduction 24
Firewall Types 24
Firewall Architectures 27
Screened Subnet 27
One-Legged 28
True DMZ 30
Implementing Firewalls 31
Hardware versus Software Firewalls 32
Configuring netfilter 32
Choosing a Linux Version 32
Choosing Installation Media 33
Linux Firewall Operation 36
Configuration Examples 42
GUIs 55
Smoothwall 76
Configuring Windows Firewall 85
Providing Secure Remote Access 86
Providing VPN Access 87
Using Windows as a VPN Concentrator 89
iPig 93
OpenSSL VPN 98
Providing a Remote Desktop 108
Windows Terminal Services 109
VNC 113
Using the X Window System 119
Providing a Remote Shell 125
Using Secure Shell 126
Using a Secure Shell GUI Client 128
Summary 130
Solutions Fast Track 131
Frequently Asked Questions 132
Protecting Network Resources 133
Introduction 134
Performing Basic Hardening 134
Defining Policy 135
Access Controls 137
Authentication 137
Authorization 138
Auditing 138
Hardening Windows Systems 139
General Hardening Steps 139
Users and Groups 142
File-Level Access Controls 147
Additional Steps 152
Using Microsoft Group Policy Objects 153
Account Lockout Policy 159
Audit Policy 160
User Rights Assignment 160
Hardening Linux Systems 164
General Hardening Steps 164
Users and Groups 165
File-Level Access Controls 168
Using the Bastille Hardening Script 172
Using SELinux 173
Hardening Infrastructure Devices 175
Patching Systems 176
Patching Windows Systems 177
Patching Linux Systems 179
Personal Firewalls 180
Windows Firewall 180
Netfilter Firewall 187
Configuring TCP Wrappers 187
Providing Antivirus and Antispyware Protection 188
Antivirus Software 189
Clam AntiVirus 189
Using Online Virus Scanners 196
Antispyware Software 196
Microsoft Windows Defender 197
Microsoft Malicious Software Removal Tool 200
Encrypting Sensitive Data 201
EFS 202
Summary 209
Solutions Fast Track 209
Frequently Asked Questions 212
Configuring an Intrusion Detection System 215
Introduction 216
Intrusion Detection Systems 216
Configuring an Intrusion Detection System 217
Hardware Requirements 218
Placing Your NIDS 218
Configuring Snort on a Windows System 221
Installing Snort 222
Configuring Snort Options 225
Using a Snort GUI Front End 231
Configuring IDS Policy Manager 232
Configuring Snort on a Linux System 240
Configuring Snort Options 240
Using a GUI Front End for Snort 246
Basic Analysis and Security Engine 246
Other Snort Add-Ons 254
Using Oinkmaster 254
Additional Research 256
Demonstrating Effectiveness 257
Summary 258
Solutions Fast Track 259
Frequently Asked Questions 261
Managing Event Logs 263
Introduction 264
Generating Windows Event Logs 264
Using Group Policy to Generate Windows Events Logs 267
Generating Custom Windows Event Log Entries 274
Collecting Windows Event Logs 275
Analyzing Windows Event Logs 277
Generating Syslog Event Logs 279
Windows Syslog 282
Generating Syslog Events 282
Receiving Syslog Events 295
Linux Syslog 297
Generating Syslog Events 297
Encrypting Syslog Traffic 298
Receiving Syslog Events on a Linux Host 311
Analyzing Syslog Logs on Windows and Linux 312
Windows Log Analysis 313
Linux Log Analysis 321
Securing Your Event Logs 327
Ensuring Chain of Custody 328
Ensuring Log Integrity 329
Applying Your Knowledge 331
Summary 333
Solutions Fast Track 333
Frequently Asked Questions 335
Testing and Auditing Your Systems 337
Introduction 338
Taking Inventory 338
Locating and Identifying Systems 339
Nmap 341
Super Scanner 347
Angry IP Scanner 351
Scanline 352
Special-Purpose Enumerators 355
Locating Wireless Systems 357
Network Stumbler 358
Documentation 361
Network Topology Maps 362
Access Request Forms 364
Business Continuity and Disaster Recovery Plans 365
IT Security Policies/Standards/Procedures 365
Vulnerability Scanning 366
Nessus 367
Running Nessus on Windows 368
Running Nessus on Linux 371
X-Scan 375
Microsoft Baseline Security Analyzer 379
OSSTMM 382
Summary 386
Solutions Fast Track 386
Frequently Asked Questions 387
Network Reporting and Troubleshooting 389
Introduction 390
Reporting on Bandwidth Usage and Other Metrics 390
Collecting Data for Analysis 392
Understanding SNMP 394
Configuring Multi Router Traffic Grapher 397
Configuring MZL & Novatech TrafficStatistic 400
Configuring PRTG Traffic Grapher 403
Configuring ntop 412
Enabling SNMP on Windows Hosts 418
Enabling SNMP on Linux Hosts 421
Troubleshooting Network Problems 424
Using a GUI Sniffer 425
Using a Command-Line Sniffer 433
Additional Troubleshooting Tools 438
Netcat 439
Tracetcp 439
Netstat 440
Summary 442
Solutions Fast Track 442
Frequently Asked Questions 444
Security as an Ongoing Process 447
Introduction 448
Patch Management 448
Network Infrastructure Devices 452
Operating System Patches 453
Application Patches 453
Change Management 454
Change Causes Disruption 454
Inadequate Documentation Can Exacerbate Problems 455
Change Management Strategy 455
Antivirus 459
Antispyware 459
Intrusion Detection Systems 460
Vulnerability Scanning 460
Vulnerability Management Cycle 461
Roles and Responsibilities 463
Penetration Testing 463
Obtaining the Support of Senior Management 464
Clarify What You Are Buying 464
Policy Review 465
Physical Security 466
Cert Team 468
Summary 470
Solutions Fast Track 470
Frequently Asked Questions 472
Index 475
Rapidshare