Cisco Knowledge Suite Cisco SystemsCisco Press
   

   
Home
MyCKS
Cutting Edge
Certification
Core Reference
Guided Learning
   
Networking Architecture
LAN
WAN
Switching
Internet Protocols (IP)
Network Protocols
Transport and Application Protocols
Desktop Protocols
Security and Troubleshooting
Network Resources and Management
Integrated Services
 

Security & Troubleshooting

   

Articles

ATM Networks and Security —  ATM's flexibility to deliver different classes of traffic at high or low speed has made it a popular choice for many networks. Security in ATM networks is an emerging concern, though. This article describes why security in ATM networks is a potential issue and what security measures you need to take to protect your network.

 

Chapters

Designing Network Security by Technologies Riva; Systems Cisco

Designing the Network Topology — Gain a basic understanding of how security technologies can be used to establish identity, and assure data integrity and confidentiality in a network. Gain an understanding of how and when to implement technologies such as virtual private dial-up and public key infrastructure.

 

Provisioning Hardware and Media for the LAN — Find out how to create a security policy, including considerations such as physical and logical security controls. Implementation details are provided as examples of how to carry out part of the policy.

  Provisioning Hardware and Media for the WAN — Gain insight into how to use firewalls to control internet access by examining sample firewall design implmentations. Configuration details are described for Cisco IOS devices and Cisco PIX firewalls, as well as other products if the functions are available.
   

Enhanced IP Services for Cisco Networks by Donn Lee

Deploying Basic Security Services — Your ability to leverage the security services of IOS is crucial to running a highly effective and robust Cisco network. Learn some basic concepts and common practices that are key to maintaining security.

   

Internetworking Troubleshooting by Systems Cisco; Kevin Downs

 

Troubleshooting Ethernet — After a brief discussion of the basics of DECnet, this chapter addresses problems you may encounter and how you can go about resolving them.

 

Intrusion Detection by Rebecca Bace

Analysis Schemes — With analysis, you're faced with the core issue of intrusion detection: What is going on here, and should I be concerned about it? Bace offers definition, goals, and variables of analysis.

 

Technical Issues — Many issues stand in the way of optimizing the performance of intrusion detection; this chapter discusses them, along with strategies for rectifying them.

 

Understanding the Real-World Challenge — Introduces the root causes of security vulnerabilities and takes you step by step through a typical hacker attack.

   

Network Intrusion Detection: An Analyst's Handbook byStephen Northcutt

Mitnick Attack — Get an introduction to intrusion detection by looking at one of the most famous intrusion cases that ever occurred, Kevin Mitnick's attack on Tsutomu Shimomura's system. Includes TCP/IP review and a discussion of SYN flooding.

 

Technical Issues — Take a look at some of the tradeoffs, capabilities, and issues facing intrusion detection system users and builders, including Events of Interest (EOI) and sensor placement.

 

Network-Based Intrusion Detection Solutions — Presents a mix of research, U.S. government, commercial, and Open Source Software systems for intrusion detection, with emphasis on characteristics you should look for in selecting a system

   

Understanding and Deploying LDAP Directory Services by Tim Howes; Mark Smith; Gordon Good

Privacy Security Design — - Learn how to analyze your environment to determine your security and privacy needs, and how to design your directory service to meet those needs.

   

Understanding Public Key Infrastructure by Carlisle Adams; Steve Lloyd

Core PKI Services: Authentication, Integrity, and Confidentiality

 

PKI-Enabled Services

 

Key and Certificate Management

   
 

Expert Recommends

New The Expert Recommends: Essential Resources for Public-Key Infrastructure (PKI) by Carlisle Adams — Researcher and author Carlisle Adams recommends resources for learning about and synthesizing the many aspects of public-key infrastructure (PKI)..

The Expert Recommends: Essential Resources for Network Security Professionals by Barb Fraser — Rather than wading through the vast amount of network security references that are available today, check out Barbara Fraser's opinion of the most trustworthy books, Web sites, and mailing lists you need to investigate.

The Expert Recommends: Essential Resources for Computer and Network Security Professionals by Rebecca Bace — Rebecca Bace helps you make sense of Internet security by providing a guide to her favorite and most frequently used information resources.

 

Interviews

An Interview with Dan Harkins & Naganand Doraswamy, Authors of IPSec: The New Security Standard for the Internet, Intranets, and Virtual Private Networks — Dan Harkins and Naganand Doraswamy, authors of IPSec: The New Security Standard for the Internet, Intranets, and Virtual Private Networks (recently published by Prentice Hall), discuss their views of IPSec, its impact on network security, and their new book.

 

Tutorials

An Introduction to Public-Key Cryptography — By Carlisle Adams and Steve Lloyd. This tutorial provides a brief, non-mathematical introduction to the main concepts of public-key cryptography as they relate to public-key infrastructure. It is intended for system administrators who are responsible for security in businesses where encryption or certification is important.

PKI: Concepts of an Infrastructure — By Carlisle Adams and Steve Lloyd. This tutorial introduces and discusses the idea of a security "infrastructure" by considering the features and benefits of pervasive infrastructures with which most everyone is familiar. System administrators who need an introduction to PKI will find this tutorial useful.

Benefits and Costs of PKI — By Carlisle Adams and Steve Lloyd. This tutorial considers some of the benefits that are realized through the deployment of a public key infrastructure (PKI). It also briefly discusses cost considerations (from a generic perspective). System administrators who have a good understanding of PKI and cryptography, and who are preparing to implement a complete security solution, will find this tutorial useful.

 
 

Breaking News

One of the primary architects of OpenCable, Michael Adams, explains the key concepts of this initiative in his book OpenCable Architecture.

Expert Advice

Ralph Droms, Ph.D., author of The DHCP Handbook and chair of the IETF Dynamic Host Configuration Working Group, guides you to his top picks for reliable DHCP-related information.

Just Published

Residential Broadband, Second Edition
by George Abe

Introduces the topics surrounding high-speed networks to the home. It is written for anyone seeking a broad-based familiarity with the issues of residential broadband (RBB) including product developers, engineers, network designers, business people, professionals in legal and regulatory positions, and industry analysts.

             
     

From the Brains at InformIT

|

Contact Us

|

Copyright, Terms & Conditions

|

Privacy Policy

 

© Copyright 2000 InformIT. All rights reserved.