- Practical Network Scanning
- Ajay Singh Chauhan
- 163字
- 2022-07-12 10:43:05
Secure Network Design
In the previous chapter you learned about the basic concept of infrastructure security and built a strong foundation for the different areas required to understand the need for information security based on current security threats that exist in cyber space.
The internet has grown dramatically and has reached a stage where everyone must be connected in order to exchange information. Imagine that billions of people with internet enabled devices are directly connected to the internet, and some sort of unsecured network becomes a target for cyber criminals.
In this chapter, we describe how to secure a network and look at the significance of network security. In a layered fashion, we will also discuss methods and approaches to building a secure network based on business aims.
The following topics will be covered in this chapter:
- Access control
- Network management and security design
- Hardening your TCP/IP stack
- DoS and DDoS attacks
- IP spoofing
- Ping sweeps and port scans
- DNS vulnerabilities
- Two-factor authentication
- SASE原理、架構與實踐
- Mobile Forensics Cookbook
- 數字身份與元宇宙信任治理
- 工業互聯網安全
- Learning Python for Forensics
- CSO進階之路:從安全工程師到首席安全官
- INSTANT Burp Suite Starter
- Enterprise Cloud Security and Governance
- 從實踐中學習Kali Linux滲透測試
- Web安全之深度學習實戰
- 黑客攻防實戰從入門到精通
- INSTANT Apple Configurator How-to
- Mastering Python for Networking and Security
- 網絡空間安全:拒絕服務攻擊檢測與防御
- 企業數據安全防護指南