This chapter is about: securing brand name networks
...the chapter provides a wide range of tips for securing specific local area
network operating systems. Some of are quite technical, others could be classified
as "applied commonsense." If you have already made an effort to secure your
network some, perhaps most, of these tips will be old hat. However, if just one of
them is news to you, it could be the one that saves your network the next time it is
attacked. Indeed, you stand to gain from reading this chapter even if you have
already taken care of every issue it raises: You will have satisfied yourself that
you are on top on things!
To quote from a Jefferson Airplane song, "Life is change" and few things change
faster than network security checklists, and so this chapter also points you to
sources for the very latest information. On the subject of sources, the
security tips in this chapter were gleaned from a variety of sources,
including conversations, both digital and analog, with networking professionals,
plus numerous articles from trade journals. These sources are all listed in the book.
For companies active in this field check out the following Hot Links at NCSA:
- Network and Communication Security
- Protecting LANs and WANs, modems and remote communications, PBX and voice, electronic mail protection.
- Firewalls, Internet, Intranet, and Web Security
- Internet and intranet security, web security, electronic commerce systems, Electronic Data Interchange (EDI), secure electronic transaction schemes, digital cash.
The Story So Far
- No typos or errors reported so far.
- Links and supplemental info being prepared.
- Check back in 10 days for more links and info.
Table of Contents with Links to Chapters
[Top of Page] [PC LAN Security Home Page] [Table of Contents]
- Chapter 1. Security Matters: Assessing the problems, threats, and issues
- Chapter 2. Security Solutions: Basic concepts and techniques
- Chapter 3. Security Planning: Risk analysis and security policy
- Chapter 4. Secure Hardware: Defending and insuring equipment
- Chapter 5. Secure Power: Spikes, Sparks, and Electrical Threats
- Chapter 6. Secure Sites: Defending sites and systems
- Chapter 7. Secure Access: Controls, passwords, and encryption
- Chapter 8. Secure Data: Backup, backup, backup
- Chapter 9. Secure Code: Defeating viruses, worms and other malicious code
- Chapter 10. Secure Software: Piracy, bugs, and other "soft" threats
- Chapter 11. Secure Networks I: Generic network defense
- Chapter 12. Secure Networks II: Protecting name brand networks
- Chapter 13. Secure Communications: WANs, remote access, and the Internet
- Chapter 14. Secure People: Hacking and ethical issues
- Chapter 15. Security in the Future: How to become and remain secure
- Appendix A: Threat List
- Appendix B: A Brief Guide to Batch Files
- Appendix C: Computer Security Policy
- Appendix D: Notes on EMR
- Appendix E: Export Restrictions on Encryption
- Appendix F: Further Resources
- Appendix G: Glossary
- Appendix H: How Public Key Encryption Works
- Appendix I: Introduction to LANs
- Appendix J: Securing Safe Software
- Appendix K: Appraising Microsoft AV
This page updated by Stephen Cobb, Summer 2002 © Copyright, 1996-2002, Stephen Cobb