Designing Network Security 90
Designing Network Security, 2nd. Ed. | |
author | Merike Kaeo |
pages | 745 |
publisher | CiscoPress |
rating | 8 |
reviewer | cthulu13 |
ISBN | 1587051176 |
summary | A good overall resource on network security policy, design, and implementation. |
Weighing in at a hefty 745 pages, Designing Network Security is a concise and authoritative guide to the sometimes daunting task of designing secure networks - with a special emphasis placed on Cisco solutions, of course. The book is divided into three major sections:basic theory and essentials; policy design and best practices; and implementation with Cisco hardware. In my opinion this book is best suited as a reference book for those who already have a firm foundation in security and networking, but could also be of value to beginner level techs with a bit of patience. While the topics that are covered have all pertinent information discussed, some might wish that there were a bit more explanation of the Hows and Whys.
The first section, "Security Fundamentals," is an especially valuable part of the book in that it provides a great desk reference to the building blocks of secure networks. The first chapter deals with the basics of encryption technologies - symmetrical/asymmetrical cryptography, digital hashes, public key systems, etc. From there the book moves into what is probably its meatiest chapter, covering the application of encryption to security technologies which range from TACACS+ authorization to TLS encryption. Building on previous chapters, the third chapter deals with the application of these security technologies in protecting real world installations. I was especially impressed with the attention paid to wireless and VoIP technologies in this chapter - this is one of the first discussions of VoIP security I have seen in a general reference book. The first section winds up with a fairly exhaustive discussion on routing protocol security which I also thought was excellent.
The second section, "The Corporate Security Policy," is a good reference to infosec management. Many topics covered in this section are applicable to the CISSP exam - so if that is a career goal for you, this can act as one of your study guides. The section begins with a discussion of threats in the enterprise environment. Types of threats as well as common protocol vulnerabilites are discussed. I felt that some of the material in this chapter was a bit dated, in particular the sections on TCP sequence number attacks (most recent OSes have improved their sequence generation routines to make it nearly impossible to do this) and the ping of death (which I don't remember working on anything after Windows 95 or Linux 2.0.23). The next chapter is a bit more valuable in its discussion of the basics of risk assessment and management. This leads into a discussion of actual design and implementation of security policy. Sample topics include physical/logical controls, data confidentiality, and policies/procedures for staff. And finally this section concludes with a good chapter on incident handling and response.
The final section, "Practical Implementation," is the Cisco-centric third of the book. Many parts of this section are a good reference to points covered on the CCSP exams, especially the SECUR test. The first chapter deals with configuring access controls and audit on Cisco devices from the PIX to switches and routers. A brief discussion of intrusion detection implementations is also included. The next chapter consists of primarily information dealing with firewall/screening router construction - content filtering, packet screening, and the various types of IOS filters. Several implementation examples are included to walk you through the process of configuring CBAC (content-based access control) and the Cisco PIX. From there the section moves to remote access security, with good sections on all Cisco based AAA (authentication, authorization, and accounting) features including lock-and-key and accounting-based billing. Finally, the book wraps up with a chapter on securing VPN, Wireless, and VOIP networks which focuses more on design than implementation, although there are still some Cisco (PIX) based examples. The book's appedices cover DDOS attacks, well-known port numbers, and guidelines for reporting and preventing intrusions.
Overall, I felt this was an excellent book which clearly fufilled its purpose. For the intermediate to advanced network security engineer this could act as an excellent desktop reference, while still being accessible enough to teach to the beginner. The writing style is clear and precise, and I found no technical errors in the material presented. As I mentioned, the book could act as an additional study aid for several security certifications, including the CISSP or the CCSP. I look forward to the next volume by Ms. Kaeo.
You can purchase Designing Network Security, 2nd Ed. from bn.com. Slashdot welcomes readers' book reviews -- to see your own review here, read the book review guidelines, then visit the submission page.
Network Security (Score:3, Funny)
Sincerely
Bill Toms
MCSD, MCSE
SoftoTex Software [sofotex.com]
Re:Network Security (Score:5, Funny)
Exactly.
Re:Network Security (Score:2)
Exactly the point that many OSS people have been making for a while. I hit Windows Update every month or so to get patches for machines I maintain, and I'm amazed by the sheer number of security vulnerabilities they're fixing each month. And the flow never stops, even though Win2K has been out for three years, now! Sure, Linux and the OSS projects have security needs that have t
Linux Updates are signed (Score:3, Informative)
Re:Network Security (Score:1)
Does anybody else see a problem with this?
Eliminate QA! Dev will test! PROFIT!!! (Score:2)
Re:Network Security (Score:5, Insightful)
I realize that I'm just feeding the troll, but I've never run across a single 'security patch' that has introduced a single trojan into any of the Linux systems I administrate. In addition, Debian (my distribution of choice), as well as every other major vendor (to my knowledge) signs and checksums their packages to prevent tampering. Sure, the package archives don't use SSL, but that's because you don't need to -- it would be much easier to break in to the package repository than it would be to properly rewrite the packet stream in such a fashion so that it would even be functional, much less provide an appropriate checksum.
A good case-in-point of how well this system works is the recent Debian break-in, in fact. Despite losing *four* crucial systems to a compromise, the integrity of the package archive was kept intact, because of GPG signatures, md5 checksums, and a massive pile of worldwide archive sites against which to verify. The compromise, recovery, and analysis of the break-in was kept open to the public, with factual updates made available at every step of the way. No cover-ups, no spin, no attempts to conceal the severity of the compromise. Just plain honesty.
This prompts a very important question: Would you expect the same from Microsoft if they had faced a similar break-in?
Re:Network Security (Score:1)
we'll never know because they'll never tell us.
It was a joke. Laugh, it's funny [EOM] (Score:1)
additional resources: (Score:1, Informative)
plus, they're free..
Re:additional resources: (Score:1, Offtopic)
Too ignorant, didn't read :) (Score:5, Informative)
I'm no network security guy, more just a mundane perl hacker, so most of the chapters were over my head and I'm not really qualified to comment on the contents, but I can at least assert that the book is indeed very comprehensive and well-written, and I liked the diagrams, though I couldn't exactly recall what they were about. My only complaint was that the focus seemed exclusive at times on only securing Cisco equipment, which means that it has a rather narrow focus if one isn't deploying their technologies.
Hopefully some day when some corporation views my over-inflated resume and decides to trust me with their datacenter, I'll remember everything I skipped over in this quality book
Re:Too ignorant, didn't read :) (Score:1)
Re:security? (Score:2, Insightful)
What's that?
Security is not a product but a never-ending process.
A to Z about network security, (Score:5, Informative)
I found the small section on BGP in the chapter to be a little sparse and expected BGP to be covered in a bit more detail. Nonetheless, is does mention briefly, some of the challenges with BGP and a few of the proposed successors of the BGP protocol such as S-BGP and SoBGP.
This is an all-a-round good reference for network security.
Re:A to Z about network security, (Score:3, Insightful)
windows box on the internet (Score:2)
Languages can help as well (Score:3, Interesting)
I can't see mainstream OS's being written in Java just yet [grin - Windows JP (Java Protected), now with less memory holes!] but applications are getting more likely to be protected in this way.
Running
Simon
Re:Languages can help as well (Score:2)
So is the JVM involved at all when you're running compiled-java, or not? It would seem like it would have to be, to handle memory, unless the compilation process builds in some kind of memory manager.
This poster has me
Re:Languages can help as well (Score:2)
Tools like gcj, or newer JBuilder's will do this. There will always be some overhead for GC, but unless you're doing physics simulations running for weeks, I seriously doubt you'd notice the difference...
Simon.
Re:Languages can help as well (Score:3, Interesting)
The trend in actual successful attacks versus theoretical or practical vulnerabilities is moving from OS and network hacks to more application based hacks - these attacks tend to focus on the business processes behind the applications per se.
A more se
Concise!?! (Score:4, Funny)
Am the only one who sees some irony in that statement?
Re:Concise!?! (Score:3, Insightful)
Of course, you could write the whole book in 6 words: "Don't turn on the darn computer!"
Re:Concise!?! (Score:2)
I prefer 4 words...
Smash computer with sledgehammer.
Re:Concise!?! (Score:1)
Unplug system
There. Any single word book writers out there?
RagManX
Re:Concise!?! (Score:2)
at a hefty 745 pages, Designing Network Security is a concise and...
At least this one isn't infamous like several other topics yesterday.
Why a book ? (Score:3, Insightful)
The only reason for buying is to get rid of the damned trees which lurk around everywhere.
Re:Why a book ? (Score:1, Informative)
Hell, I picked up "Web Security, Privacy & Commerce" from O'Reilly the other day, and it has a bit on the old DOS program toneloc... you know, the wardialer from ages past. Why? It's still important to know if your computers have modem
consice (Score:2, Funny)
adj.
Expressing much in few words; clear and succinct.
Last time i checked 745 pages was not "concise".
Re:consice (Score:2, Insightful)
Re:consice (Score:4, Funny)
"A wizard is never late. He arrives precisely when he intends to."
so in those terms, the book could be concise if it explains precisely what it intends.
Re:Condensed version (Score:1)
It's easy (Score:5, Funny)
Something else you might do is write defensive viruses that sit on your router and can be deployed against attackers.
Another thing that has good success is having circuit breakers hooked to your network interface that can channel all the power from your corporate reactor straight into the network. This will cause any attackers machine to burst into flame.
Artificial intelligence bots can be a cheap way to get good security, but keep in mind that they can go rogue, so also keep a stable of CircuitRunners, basically AI Bounty Hunters that can track down your security AIs and terminate them if they go rogue. Symantec makes good CircuitRunners, I hear.
Oh, be sure to hire a network administrator that 'knows linux'. It's probably best to hire someone young who has the dexterity to use the 3d flythrough administration interface.
Good luck, and be secure in the knowledge that you can now jack into your iron in safety!
Re:It's easy (Score:1)
Re:It's easy (Score:1)
Now that would make a mess!
totally fool proof network security system: (Score:1)
really what more do you need?
Re:totally fool proof network security system: (Score:2)
Not trying to be too mean. I printed this out, and sent it to some of the admins here.
Re:totally fool proof network security system: (Score:1)
Scary (Score:1, Insightful)
Books I'd like now. (Score:1, Funny)
The hand book of lottery ticket and sports winners for 2004-2010.
The worst security holes of win98/winXP and their solutions for "Open MS Lic." fifth edition 2015.
IP6 Now! how to painless update legacy IP4 appa. (2030)
And my personal future favorite:
The source to votedote used to mod your government up or down.
Crypto-gram newsletter (Score:5, Informative)
Re:Crypto-gram newsletter (Score:1)
Three steps to network security (Score:1)
The three steps are:
1) Ban Windows from your network.
2) Ban Doors.
3) Ban Users.
Follow those steps and you will never have any problems!