You are on page 1of 59
Certified Network Defender vam 312-98 References References ‘Module 01: Computer Network and Defense Fundamentals 1 Ms. Mousami Pawar (Dec 5, 2014), Network Security, rom http://www slideshare.net/mousmip/nebwork-security fundamental Internet and internet Communication|) (June 2012), rom hetps://ccdcoe ora cycon/ 2012/ workshops/ internet_ Internet_Comme pet. John E.canavan, Fundamentals of Network ecurty, from hetp:/foww askeypert.org/stes/defaut/fles/Canavan_1£, Fundamentals of network security (200i)(en)\248s) pa 4. DoDD 8570.1: Blue Team, rom https: /www sypriselectroniescom/information-securty/evber-securty- solutons/comisternetwork-defense/ 5. Mariuse Sawowski (ISSA Journal October 2007), The Principles of Network Security Desien from http // worw cico.oi/ services) Principles, Network security Design pa 15. Diane Teate, esiging for cisco nteractwork Solutions (DESGN),Feom http// portal aul edu portal esources/ downloass/ networking/ designing network secunty cisco press. 7. Types of Network, htzs//wurw.codesandtutorals.com /networkng/basis/computer_network-ypes php 8. Department of Defense (March 9, 2001, Support to Computer Network Defence (CNC), trom httos:/ino.oublicinteligence.net/DoD-SupportCND.odf 3 Computer Network Defense, from hitos://aw saferibooksonine com/ibrary/view/eyberwarfar= 2nd9780128165721/shtmi/CHPO1 html 30, Computer Netwark Defense (CNO}, from https: //www sechapeda cam/deiniion/27806/computer-natwark-defense-cnd, AL Computer secuty, trom httpsf/en wikipedia org/wik/computer_secury 412, _ Whats toflormation Secuty? From http //demop com/artces/uhat-isnformation-securty pal 415. computer network operations, from https//en.wihipedia orgfulk/Computer_netwerk_operatons. 4. Margaret Rouse (Feb 2015), authentication, from bitp//searchsecuntytachtargat.com/éefintion/authenticaton, 435. 5 Core Principles of information Assurance (May 22,2011), hetp:/foninebusinesscerbfictes.wordpress.com/2011/05/22/5-core-principles of information assurance 415, _ NSAICSS, Information Assurance from httos:/wuw.nsa govfa/_fles/support/defenseindesth od 17, Trusted information Sharing Network for citcal infrastructure aretecion lune 208), from hetu//awracacertore/stes/defaulYfies/puble/documents/eurtn-defence_in_depthveng2008 pdf 18, ohysicel security, rom to //seerchsecuritytechtareet.com/definition/shysical-secarity 19. Vanessa Fias-Martinez, Joseph Shettck Salvatore. Stlfo, Angelos D.Keromytis, A Network Access Control Mechanism Saced on Behavior Profiles, from hetps// worn ce.columblaesu/~angeles/ Papers] 200%/2cs2c09 po 20, Ajay Yadav (apni 2 2013), Network Desig: Firewall IDS/Ps, rom http:/resoureesinfosecnetute comnetwork-design- tirewaliceipe. 21. Tony Bradley, Proxy Server, rom htp://netsecurty about coms/generalzcurty/e/4etproxy htm. 22, Hardening (computing), from hitps://en.wikipedia.ng/witiHardening_ (computing). 23. Packet Fiterng from htos:/www techopedla.com/defrition/4038/packetftering. 24. Margaret Rouse(March 2001), Common Criteria (C¢) for Information Technology Security Evaluation, from htp/fuhatstechtarget com/efition/Common-Citeia-CC-for-tnformation-Technology-Securty£valuaton. 25. GERALD | POPEKAND CHARLES. KUNE, Encryption nd Secure Computer Networks from hitb: lcs Swarthmore edu ~neuhal/eadings/popek pal ReferencesFage 1207 Certified Network Defender Copyright © by £-Gouncl ‘Al Fights Reserved, Rearoduction is Strict Prohibited Certified Network Defender vam 312-98 References 7. a 2, 33. 34 38. 36. 29, aL 2 su 82, Feb 2008, Password management, from hrp://wwinfocec gov hh/englsh/technica|/fles/eassword pat Deb Shinder (August 28, 2001), Undarstanding and selecting authentication methods, rom http:// www techrepublccom/ article/ understanding-and:selecting authentcation-methods/ ‘network configuration management (NCM) from hits: /searchnetworkingtechtargetcom/definition/network configuation-management. Network Security Audit Mult platform consolidation with securty event covelation, from np forwn enforcve.com/networksecurty-auelt Frederick M. avo (uly 2007), Producing your network security poly, from httac// wns watchevard cam /doce [whitepaper /securtypolcy_wp pat STANDARD OPERATING PROCEDURES, htt'/ www 4a0.org/docrep/w7295e/Ww7295e04 htm. Padmavathy Ramesh (July 2002), Business Continuity Planning from http:// wor tes. com SiteColletionDocurents/ White20Popers/Susiness%20Continutys20Pianning pdf Configuration Contra rom htp://wwre chambers com.aujelosary/configuration control pho. Relevant incident Response, from_itps/books eooee cin books?id=CUGKfLWRYCBine=PAZSEBIpe= a2 a8dgeConductng-forensicesactvtiers+onsincdantsepurcenblBate=pJOtZSkAOKig=ILHERDOIIMHSOSEANO CSN ‘uuadinvandsa"x8ved-0COUQSAEWSG0VCHMIx0faUSOC Val Vor2OCh20SAKhni=onepages.g-Conductng™2OForensiesse _Bactviies20%200n%20ineisentsamfaee. ‘August 2000, Security Culture: a handbook for activists, from http:/Avwnw arimalicerationtrontcom/ALFront/ELF/sec- Inandbook df Lesmifer Pfeffer (7/11/2016), What Does a Network Administrator 00? A Behine-the-Scenes Look, from http ‘rasmussen edu/ degress/ technology blog/what-doss~=-network-adminstratorio/ Protecting Data in a Network Enustonment, from nttp://Gocs oracle. com/ed/312037_02/network 101/610777/pratret hm. Archeecture Overvien, http://w esco.com/warp/pubi/ce/oeuse/epso/saf/safe_wp hemswps2223, Nimeny Rechanbarg September 26,2013), Four Tips for Designing a Secure Network Perimeter, rom tto/ ern zecurtyweek com four-tps-desining-secure-nebwork perimeter tt /seenetoal com/network-security/prevention detection response-tinty-network-securtypart-1 htm tt /seenetoal.com/network-security/prevention detection response-tinty-network-securtypart-2 htm Incident Response Plan, from hitp J/www comptechdoeore/independen/securty/policies/incident-response-lan htm November, 2015, Responding to Network Attacks and Security Incidents, from http://anew tech-fnq.com/respanding-to- networlattackrand-securtpncidente html ‘The Difference Between Events, Alerts, and incidents, from hits: //danielmesslarcomy/study/eventalart-incident/ ‘vulnerabines, thrests, and Atacts, from http:/wunrlovamytool.com/tles/vulnerabltes-threats-and-atacke-chaptar- one pat, Responding to Network Attacks and Security Incidents, from http://www. tech fg com/responding to network attacks. and-secuitrincidents Atm Red Team/Blue Teom, Capture the Fag, and Treasure Hunt: Teaching Network Security Through Live Exerces from hit fetes. uesb ed/pdfs/2008_WISE_iCTT ef. Cyril Omubiko (13th Dacember 2011), Computer Natwork Defense Approaches, fom http://w research-ceres com/ ‘rl Approacnecsaoinsz0eecuntyn2odefense poh personal ares network (PAN) from hitp:/searchmobilecomputing techtarget.com /defintion/personal-area-network. arconal res netwerk, from htte://enswhipedia.org/wky/Perzonal_araz_network ‘The Contos Project, from ttps:/nwur.centos org. TCP/IP Overview and History, rom htt://Narutcipguide com/freft_TCPIPOvervewandkistony.htm. ‘THE To/1P PROTOCOL SUIT, trom htp:/fon.exaunicen edu ar/estesra:/comésti/materal/TP1-SersceS ingles pat from hto:/worw vi edu/deots/acce/netwerk/o/v852 hemitihatis References age 1208, Certified Network Defender Copyright © by £-Gouncl ‘Al Fights Reserved, Rearoduction is Strict Prohibited Certified Network Defender vam 312-98 References ‘The Internat Trancpor Protocols: TCP, rom tp:// e8e.guced.g/ Courses Networks] NETW01s20.2caI%20Are3%20Networks/Lectures/TCP pak 55, _ half duplexandfulluslex Ethernet vs Switches and Hubs, from htto://aueryd.com/auestons/fll-duples html, 57. Media session framework using a contral medule to directand manage apslcation and service servers from http fern govele co in/patents/US7185098. 58. Transmission Control Protocol, fom https /fen wikipedia crg/wik Transmission control Protocol. 59. TCP Operation, from htt://awa freesoft ore/Cle/Course/Sections/7 htm. (60. TEPsasic Operation: Connection Estabshment, Management and Termination from http:/ www tcpiguide com) fee) 1 TcPassicoperatonConnectionéstablchmentManagement hem. (61. Explain TCP and UDP operations, From http://vww examcollction com/certfestiontraining/cenp-ewpaitep-andiudp- ‘operations html [62 Basic TOP operation, from httes://niltpe wordpress. com/2012/06/05/easictep-operation/ 163. Transmision Control Protocol from hites://en.wikinediaore/wiki/Transmission Control Protocol. 64 TCPConnection Establishment Process: The "Three-Way Handshake", from http // www tcipguide com free/ {TePConnectiontstablshmentProcessTheThreeWayHtandsh htm. 165. Kart cishnan (2004), User Datagram Protocol (UDP, from tp formu nccu.edu/-becvara/stwracos/lectares/lectures ed 188. UDP -User Datagram Protocol, from hitp/ipvs.com articls/ganera/User-Datagram-Protocol htm, (87. UDP ovarviaw, Hletoryane Standard, from http://w eplpgulde.com/fras/t_UDPOvervewHictoryandstandards htm. |68. The Transmission Contra Protocal [TCP from bites //boaks goosle.co.in/eockstid=Ts45Ka6alLVC&pg=PALS&lpg=PA1S9&de=TCPtoperationSccurce=blGots=esLNiaE MssigsURSATEVWas- ‘yyMIBTp4AiPGSehlsen®isa=nSved-0CsQ6AE WADEKahUKEwis2035xIAMUVKIEKW)DBWE8Y=onepazeRa=TCPR200pe ‘alone. 168. UDP operation, from hte//worn.tcplpgulde.com/tree/t_uDPOperston htm. 70. Explain UDP operations, rom http:/ecieordie com/I-1--axplain-udp-operations/ TL. Nick (august 29, 2024),CCIE writen Blueprint: 1.1 Explain UDP operations, from hetps:// ww geskynickco.uk/2-L ‘eclainude operations) ‘72. UDP Operations from hits://warw hackanctinker net/2014/12/17/udp-operations/. TR. header, romhttes://en.wikisedia ore/wk/IP_header. 74 Internet Protocol, from htp://wmw networksorcerycon/enp/protocol/p hn. 75. Himanshu Arora (26 March 2012), Protocol Header Fundamentals Explained with Disgrams, From Insp /forw thegeekstuffcom/2012/03/ip-protecal-heade/ 75. internet alvessing and Routing Fst Step, From htt:// www ciscopresscony articles article asprp=ses75SseqNum=a 177. _\nterneterotecol ® Datagram, Fragmantation and Reaccembly, from hitp//userstws.ca/~rme/tesching/P.po. 75. Packet structure, from http/)wan freesofeorg/Cé/Course/Sections/7.hem. 79, _ INTERNET PROTOCOL DARPA INTERNET PROGRAM PROTOCOL SPECIFICATION ( September 1963), from itp ftokeett.orgyhtmlte791. 180. Tech nfo -IP Message Formats from http://www 2vtrax com/tech/orotocal/tc. trl, 21, IP Datagram General Format, from http /wwe.tesiogude.com/free/t_PDatagramGeneralFormat.htm 182. IP Datagram Optionsand Ostion Format from htp fern tepineuide-comfree/tIPDatagramOptionsendOption Format ht. 185. pv Packet Header, from http [wu erg abdn acuk/users/gorry/course/inet-pagesp-packet htm 4. (internet Protocol from https Jjwww I r/~fartignon/documenti/reseauxavances/24F-Martignon pdf 185. Vangie Beal, Pag Pus (Internet Protocol Version 6, fom http://w webopedia com/TERL/\Ieng html References age 1209, Certified Network Defender Copyright © by £-Gouncl ‘Al Fights Reserved, Rearoduction is Strict Prohibited

You might also like