Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more
Standard view
Full view
of .
Save to My Library
Look up keyword or section
Like this
5Activity

Table Of Contents

Network security
Administrative domain
AEGIS SecureConnect
Aladdin Knowledge Systems
Alert Logic
Anomaly-based intrusion detection system
Anti-pharming
Anti-phishing software
Anti-worm
Application-level gateway
ARP spoofing
Asprox botnet
Attack (computer)
Attack tree
Authentication server
Avaya Secure Network Access
Avaya VPN Router
Bagle (computer worm)
Barracuda Networks
Bastion host
Black hole (networking)
BLACKER
Blue Cube Security
BNC (software)
Botnet
BredoLab botnet
Bro (software)
Byzantine Foothold
Captive portal
Capture the flag
Check Point
Check Point Abra
Check Point VPN-1
Christmas tree packet
Cisco ASA
Cisco Global Exploiter
Cisco PIX
Cisco Security Agent
Cisco Security Agent [1]
Cisco Systems VPN Client
Clarified Networks
Clear Channel Assessment attack
Client Puzzle Protocol
Cloudvpn
cloudvpn
Columbitech
Computer security
Computer insecurity
Context-based access control
ContraVirus
Core Impact
Core Security
Countermeasure (computer)
Cryptek
Cutwail botnet
CVSS
CyberCIEGE
Dark Internet
Data breach
Deep packet inspection
Defense in depth (computing)
Denial-of-service attack
Device fingerprint
DHIPDS
Differentiated security
Digital Postmarks
Digital security
Distributed firewall
DMZ (computing)
DNS hijacking
Donbot botnet
Dual-homed
Egress filtering
Entrust
Evil bit
Extensible Threat Management (XTM)
Extranet
Fail2ban
Fake AP
Finjan
Firewalk (computing)
Firewall (computing)
Firewall pinhole
Firewalls and Internet Security
Fortinet
Forward-confirmed reverse DNS
General Dynamics C4 Systems
Generalized TTL security mechanism
Global Internet Freedom Consortium
Greynet
Grum botnet
Guided tour puzzle protocol
Gumblar
Hole punching
Honeyd
HoneyMonkey
Honeynet Project
Honeypot (computing)
Honeytoken
Host Identity Protocol
ICMP hole punching
Identity driven networking
IEC 62351
IEEE 802.1X
IF-MAP
Ingress filtering
Institute for Applied Network Security
Integrated Windows Authentication
Inter-protocol communication
Inter-protocol communication[1]
Inter-protocol exploitation
Internet censorship
Internet security
Internet Storm Center
IntruShield
Network intrusion detection system
Intrusion prevention system
IP address spoofing
IP blocking
IP fragmentation attacks
Kaspersky Anti-Virus
Kerberos (protocol)
Kerio Control
Key distribution center
Knowledge-based authentication
Kraken botnet
Lethic botnet
List of cyber attack threat trends
Lock-Keeper
Lock-Keeper:
lorcon
Lumeta Corporation
MAC flooding
Managed security service
Managed VoIP Service
Mariposa botnet
Mega-D botnet
Messaging Security
Metasploit Project
Middlebox
Miredo
Mobile virtual private network
Monoculture (computer science)
Mu Dynamics
MySecureCyberspace
NAT traversal
NeoAccel
NetBox Blue
Network Access Control
Network Admission Control
Network Based Application Recognition
Network encryption cracking
Network intelligence
Network security policy
Network Security Toolkit
Nfront security
NIST RBAC model
NTLM
Null session
OCML
Online Armor Personal Firewall
Open proxy
OpenVPN
Operation Cyber Condition Zebra
Operation: Bot Roast
OSSEC
Oulu University Secure Programming Group
Outbound content compliance
Packet capture
Packet Storm
PacketFence
Pass the hash
Password length parameter
Penetration test
Personal firewall
Philippine Honeynet Project
Phoning home
Port forwarding
Port knocking
Port triggering
Racoon (KAME)
Real-time adaptive security
Rogue access point
Soft Rogue Access Point
Rogue DHCP
Rustock botnet
Safe@Office
Same origin policy
SAMP (Security Attribute Modulation Protocol)
Sandstorm Enterprises
Screened-subnet firewall
Screening router
Secure Password Authentication
Secure Service Network
Securelist.com
SecureWorks
Security controls
Security Protocols Open Repository
Security service (telecommunication)
Security Task Manager
Semantic URL attack
Service scan
Session hijacking
Sguil
Shadowserver
Shell shoveling
Snort (software)
Sourcefire Vulnerability Research Team
Split tunneling
Spoofed URL
Spoofing attack
Spyware
Srizbi botnet
SSL-Explorer
SSL-Explorer: Community Edition
Standard Access Control List
Named Standard Access Control Lists
Stateful firewall
Stealth wallpaper
Stepping stone (computer security)
Stockade (software)
Stonesoft Corporation
Storm botnet
Sucuri
Sunbelt Personal Firewall
•Sunbelt Personal Firewall [1]
Suricata (software)
Sybil attack
SYN cookies
TACACS
TACLANE
Tarpit (networking)
TCP Cookie Transactions
TCP Gender Changer
TCP hole punching
TCP reset attack
tcpcrypt
TeamF1
Herbert Hugh Thompson
Threat (computer)
Thresh (software)
Ticket (IT security)
Transaction verification
Trusted Network Connect
Trusted path
TrustPort
Twinge attack
Typhoid adware
UDP hole punching
Unified threat management
UT-VPN
Verisys
Virtual private network
Virtual private server
VLAN hopping
VPN-1 VSX NGX
Vulnerability management
Vyatta
w3af
Waledac botnet
Warchalking
Wardriving
Warflying
WarVOX
Warvox
Warzapping
Warzapping[1]
Web application security
Web content security
WebScarab
Wi-Fi Protected Access
Wired Equivalent Privacy
Wireless LAN security
Wireless security
Woo–Lam
XKMS
XSS worm
Zenux
Zero-day attack
Zombie computer
ZoneAlarm Z100G
Zorp firewall
Zscaler
Article Sources and Contributors
Image Sources, Licenses and Contributors
License
P. 1
Network Security: High-impact Strategies - What You Need to Know: Definitions, Adoptions, Impact, Benefits, Maturity, Vendors

Network Security: High-impact Strategies - What You Need to Know: Definitions, Adoptions, Impact, Benefits, Maturity, Vendors

Ratings: (0)|Views: 275 |Likes:
Published by Emereo Publishing
In the field of networking, the area of network security consists of the provisions and policies adopted by the network administrator to prevent and monitor unauthorized access, misuse, modification, or denial of the computer network and network-accessible resources. Network Security is the authorization of access to data in a network, which is controlled by the network administrator. Users are assigned an ID and password that allows them access to information and programs within their authority. Network Security covers a variety of computer networks, both public and private that are used in everyday jobs conducting transactions and communications among businesses, government agencies and individuals. Networks can be private, such as within a company, and others which might be open to public access. Network Security is involved in organization, enterprises, and all other type of institutions. It does as its titles explains, secures the network. Protects and oversees operations being done.This book is your ultimate resource for Network Security. Here you will find the most up-to-date information, analysis, background and everything you need to know.In easy to read chapters, with extensive references and links to get you to know all there is to know about Network Security right away, covering: Network security, Administrative domain, AEGIS SecureConnect, Aladdin Knowledge Systems, Alert Logic, Anomaly-based intrusion detection system, Anti-pharming, Anti-phishing software, Anti-worm, Application-level gateway, ARP spoofing, Asprox botnet, Attack (computer), Attack tree, Authentication server, Avaya Secure Network Access, Avaya VPN Router, Bagle (computer worm), Barracuda Networks, Bastion host, Black hole (networking), BLACKER, Blue Cube Security, BNC (software), Botnet, BredoLab botnet, Bro (software), Byzantine Foothold, Captive portal, Capture the flag, Check Point, Check Point Abra, Check Point VPN-1, Christmas tree packet, Cisco ASA, Cisco Global Exploiter, Cisco PIX, Cisco Security Agent, Cisco Systems VPN Client, Clarified Networks, Clear Channel Assessment attack, Client Puzzle Protocol, Cloudvpn, Codenomicon, Columbitech, Computer security, Context-based access control, ContraVirus, Core Impact, Core Security, Countermeasure (computer), Cryptek, Cutwail botnet, CVSS, CyberCIEGE, Dark Internet, Data breach, Deep packet inspection, Defense in depth (computing), Denial-of-service attack, Device fingerprint, DHIPDS, Differentiated security, Digital Postmarks, Digital security, Distributed firewall, DMZ (computing), DNS hijacking, Donbot botnet, Dual-homed, Egress filtering, Entrust, Evil bit, Extensible Threat Management (XTM), Extranet, Fail2ban, Fake AP, Finjan, Firewalk (computing), Firewall (computing), Firewall pinhole, Firewalls and Internet Security, Fortinet, Forward-confirmed reverse DNS, General Dynamics C4 Systems, Generalized TTL security mechanism, Global Internet Freedom Consortium, Greynet, Grum botnet, Guided tour puzzle protocol, Gumblar, Hole punching, Honeyd, HoneyMonkey, Honeynet Project, Honeypot (computing), Honeytoken, Host Identity Protocol, ICMP hole punching, Identity driven networking, IEC 62351, IEEE 802.1X, IF-MAP, Ingress filtering, Institute for Applied Network Security, Integrated Windows Authentication, Inter-protocol communication, Inter-protocol exploitation, Internet censorship, Internet security, Internet Storm Center, IntruShield, Network intrusion detection system, Intrusion prevention system, IP address spoofing, IP blocking, IP fragmentation attacks, Kaspersky Anti-Virus, Kerberos (protocol), Kerio Control, Key distribution center, Knowledge-based authentication, Kraken botnet...and much moreThis book explains in-depth the real drivers and workings of Network Security. It reduces the risk of your technology, time and resources investment decisions by enabling you to compare your understanding of Network Security with the objectivity of experienced professionals.
In the field of networking, the area of network security consists of the provisions and policies adopted by the network administrator to prevent and monitor unauthorized access, misuse, modification, or denial of the computer network and network-accessible resources. Network Security is the authorization of access to data in a network, which is controlled by the network administrator. Users are assigned an ID and password that allows them access to information and programs within their authority. Network Security covers a variety of computer networks, both public and private that are used in everyday jobs conducting transactions and communications among businesses, government agencies and individuals. Networks can be private, such as within a company, and others which might be open to public access. Network Security is involved in organization, enterprises, and all other type of institutions. It does as its titles explains, secures the network. Protects and oversees operations being done.This book is your ultimate resource for Network Security. Here you will find the most up-to-date information, analysis, background and everything you need to know.In easy to read chapters, with extensive references and links to get you to know all there is to know about Network Security right away, covering: Network security, Administrative domain, AEGIS SecureConnect, Aladdin Knowledge Systems, Alert Logic, Anomaly-based intrusion detection system, Anti-pharming, Anti-phishing software, Anti-worm, Application-level gateway, ARP spoofing, Asprox botnet, Attack (computer), Attack tree, Authentication server, Avaya Secure Network Access, Avaya VPN Router, Bagle (computer worm), Barracuda Networks, Bastion host, Black hole (networking), BLACKER, Blue Cube Security, BNC (software), Botnet, BredoLab botnet, Bro (software), Byzantine Foothold, Captive portal, Capture the flag, Check Point, Check Point Abra, Check Point VPN-1, Christmas tree packet, Cisco ASA, Cisco Global Exploiter, Cisco PIX, Cisco Security Agent, Cisco Systems VPN Client, Clarified Networks, Clear Channel Assessment attack, Client Puzzle Protocol, Cloudvpn, Codenomicon, Columbitech, Computer security, Context-based access control, ContraVirus, Core Impact, Core Security, Countermeasure (computer), Cryptek, Cutwail botnet, CVSS, CyberCIEGE, Dark Internet, Data breach, Deep packet inspection, Defense in depth (computing), Denial-of-service attack, Device fingerprint, DHIPDS, Differentiated security, Digital Postmarks, Digital security, Distributed firewall, DMZ (computing), DNS hijacking, Donbot botnet, Dual-homed, Egress filtering, Entrust, Evil bit, Extensible Threat Management (XTM), Extranet, Fail2ban, Fake AP, Finjan, Firewalk (computing), Firewall (computing), Firewall pinhole, Firewalls and Internet Security, Fortinet, Forward-confirmed reverse DNS, General Dynamics C4 Systems, Generalized TTL security mechanism, Global Internet Freedom Consortium, Greynet, Grum botnet, Guided tour puzzle protocol, Gumblar, Hole punching, Honeyd, HoneyMonkey, Honeynet Project, Honeypot (computing), Honeytoken, Host Identity Protocol, ICMP hole punching, Identity driven networking, IEC 62351, IEEE 802.1X, IF-MAP, Ingress filtering, Institute for Applied Network Security, Integrated Windows Authentication, Inter-protocol communication, Inter-protocol exploitation, Internet censorship, Internet security, Internet Storm Center, IntruShield, Network intrusion detection system, Intrusion prevention system, IP address spoofing, IP blocking, IP fragmentation attacks, Kaspersky Anti-Virus, Kerberos (protocol), Kerio Control, Key distribution center, Knowledge-based authentication, Kraken botnet...and much moreThis book explains in-depth the real drivers and workings of Network Security. It reduces the risk of your technology, time and resources investment decisions by enabling you to compare your understanding of Network Security with the objectivity of experienced professionals.

More info:

Published by: Emereo Publishing on Nov 05, 2012
Copyright:Traditional Copyright: All rights reservedISBN:9781743048801
List Price: $31.96

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
This book can be read on up to 6 mobile devices.
Full version available to subscribers
See more
See less

04/05/2014

563

9781743048801

You're Reading a Free Preview
Pages 6 to 96 are not shown in this preview.
You're Reading a Free Preview
Page 102 is not shown in this preview.
You're Reading a Free Preview
Pages 108 to 352 are not shown in this preview.
You're Reading a Free Preview
Pages 358 to 547 are not shown in this preview.
You're Reading a Free Preview
Pages 553 to 563 are not shown in this preview.

Activity (5)

You've already reviewed this. Edit your review.
obogaticblagoje liked this
1 thousand reads
1 hundred reads
BSASciti liked this
Harikumar Menon liked this

You're Reading a Free Preview

Download