Network Security Assessment
by Chris McNab
Published by:
O'Reilly & Associates
371 pages
Retail Price: $39.95


Buy Now via Amazon

 

Written in a concise and well thought out manner, the author presents a systematic approach to network security assessment, equivalent to that used by the U.S. and British governments. Key security tools and software are presented early, which are used throughout the book, with an example assessment of a supposedly secure network presented in the final chapter. The book highlights embarrasing ways that private corporate information can be routinely found on the Internet from unsecure servers. Tools are shown how to perform testing of server, Windows, database, and network services, and how to interpret results. Chapters include: Network Security Assessment; The Tools Required; Internet Host and Network Enumeration; IP Network Scanning; Assessing Remote Information Systems; Assessing Web Services; Assessing Remote Maintenance Services; Assessing FTP And Database Services; Assessing Windows Networking Services; Assessing Email Services; Assessing IP VPN Services; Assessing Unix RPC Services; Application-Level Risks; Example Assessment Methodology; TCP, UDP Ports, and ICMP Message Types; Sources of Vulnerability Information. The critical importance of staying up-to-date with patches and the latest exploits is essential.

Although beyond the realm of the book, it would have been a nice addition to include security issues for two other areas - wireless access and certain email vulnerabilities. Each of these subjects could be a book in themselves in how to enhance security for. Within email systems, there needs to be more stringent measures for spam prevention (through tools such as SpamAssassin) and finding ways of preventing the new phenomenon of NDN (non delivery notification) email attacks, where hackers use real and bogus email addressses from web servers to flood the email server and other web servers, causing increased email traffic and possibly DoS. Also, there is only a brief mention of IP version 6, the new protocol to replace IPv4 currently in existence, which more ISPs and host providers (such as here) are starting to support.

The author has done an exceptional job though of explaining the myriad of security risks within corporate networks, assessing a network for weaknesses, the many preventative tools available to gauge (many freely available), and preventative, ongoing methods to use to further bolster network security.

Table of Contents | Buy Now via Amazon