Nicht aus der Schweiz? Besuchen Sie lehmanns.de
Personal Firewalls for Administrators and Remote Users - Lisa Yeo

Personal Firewalls for Administrators and Remote Users

(Autor)

Buch | Softcover
240 Seiten
2003
Prentice Hall (Verlag)
978-0-13-046222-0 (ISBN)
CHF 56,75 inkl. MwSt
  • Titel ist leider vergriffen;
    keine Neuauflage
  • Artikel merken
A guide to techniques and options in personal firewalls. Begins by introducing security and firewall basics - explains protection techniques used in firewalls. Covers configuration options and level of protection. Linux, Windows and Mac platforms addressed. Covers use in business and home environments.
While corporate system administrators spend lots of time thinking about enterprise firewall systems for their in-house employees, a vulnerability that is often overlooked is the remote employee's unprotected computer system, the unprotected computers of mobile laptop users (employees on the road) and all those unprotected but networked handheld devices. At the same time, many home computer users who have always relied on high speed Internet access don't realize that without a personal firewall, they too are quite vulnerable to intrusion and attacks. This book is designed to explain how personal firewalls work and how to determine which type of firewall works best in a given situation. Yeo starts with an intro to security basics -basic data protection measures (passwords, virus software, encryption, and firewalls) and reviews common vulnerabilities and issues with the always-on Internet. Yeo then explains protection methods used by firewalls in general - proxy server firewalls, packet filters, signature-based firewalls and stateful inspection-based firewalls while examining strengths and weaknesses of each type.
She then explains how each type of protection method is implemented in a "personal" firewall, the various products including Black Ice Defender, Zone Alarm, Linux iptables that use a given firewall method, and the pros and cons of relying on this method in a personal firewall. An entire chapter is devoted to maintenance of personal firewalls.

LISA YEO is a systems analyst with the Legislative Assembly Office in Edmonton, Alberta, Canada. Her start in security came in 1997 when she was made responsible for managing a corporate firewall. Since that time, she has acquired the Global Information Assurance Certification (GIAC) Security Essentials and Windows certifications. Lisa currently sits on the GIAC Windows (GCWN) Board.

Preface.


Overview.


Acknowledgments.


1. Security Basics.


Principles of Security. Vulnerabilities, Threats, and Risk. General Security Practices. Firewalls and Personal Firewalls. Summary.



2. Networking Basics.


Internet Protocol Address. DHCP and BootP. Internet Protocol Basics. OSI Model. Summary.



3. Personal Firewalls.


Network Address Translation. Static Packet Filter. Stateful Inspection. Application Proxy. Signature-Based Detection. Intrusion Detection. ICSA Certification. Summary.



4. Personal Firewalls at Home.


Identifying Risks. Assessing Your Needs. Managing Your Firewall. Summary.



5 Personal Firewalls at Work.


Identifying Risks. Assessing Your Needs. Managing Your Firewall. Summary.



6. Logs.


Why Log? How Do I Read a Log? Using Logs. Summary.



7. Configuration Options.


Configuration Choices. Defensive Postures. Summary.



8. Troubleshooting.


Basic Troubleshooting. Common Concerns. Uninstalling. Summary.



Appendix A: Firewall Comparison.


Hardware. Software.



Glossary.


Bibliography.


Firewalls. Intrusion Detection. Networking. Reviews. Security Policy. Index.

Erscheint lt. Verlag 7.1.2003
Verlagsort Upper Saddle River
Sprache englisch
Maße 151 x 228 mm
Gewicht 384 g
Themenwelt Informatik Netzwerke Sicherheit / Firewall
Informatik Theorie / Studium Kryptologie
ISBN-10 0-13-046222-5 / 0130462225
ISBN-13 978-0-13-046222-0 / 9780130462220
Zustand Neuware
Haben Sie eine Frage zum Produkt?
Mehr entdecken
aus dem Bereich