Implementing NAP and NAC Security Technologies : The Complete Guide to Network Access Control

個数:

Implementing NAP and NAC Security Technologies : The Complete Guide to Network Access Control

  • 在庫がございません。海外の書籍取次会社を通じて出版社等からお取り寄せいたします。
    通常6~9週間ほどで発送の見込みですが、商品によってはさらに時間がかかることもございます。
    重要ご説明事項
    1. 納期遅延や、ご入手不能となる場合がございます。
    2. 複数冊ご注文の場合は、ご注文数量が揃ってからまとめて発送いたします。
    3. 美品のご指定は承りかねます。

    ●3Dセキュア導入とクレジットカードによるお支払いについて
  • 【入荷遅延について】
    世界情勢の影響により、海外からお取り寄せとなる洋書・洋古書の入荷が、表示している標準的な納期よりも遅延する場合がございます。
    おそれいりますが、あらかじめご了承くださいますようお願い申し上げます。
  • ◆画像の表紙や帯等は実物とは異なる場合があります。
  • ◆ウェブストアでの洋書販売価格は、弊社店舗等での販売価格とは異なります。
    また、洋書販売価格は、ご注文確定時点での日本円価格となります。
    ご注文確定後に、同じ洋書の販売価格が変動しても、それは反映されません。
  • 製本 Hardcover:ハードカバー版/ページ数 266 p.
  • 言語 ENG
  • 商品コード 9780470238387
  • DDC分類 005.8

Full Description


This guide presents real-world hacking scenarios along with complete implementation guidance for the right NAP/NAC solution, so you can understand which solution makes the most sense based upon the most prevalent risks in your environment. Follow the actual steps hackers take to perform specific exploits, determine which security solutions will stop the exploits from happening, and learn all about the standard components of any NAP/NAC solution. By learning to analyze a security posture, set policies for device analysis, and communicate with the device, you'll be able to take action.

Contents

Acknowledgments. Introduction. Chapter 1 Understanding Terms and Technologies. Who Is the Trusted Computing Group? Is There a Cisco NAC Alliance Program? NAC-Certified Shipping Product. Developing NAC Solutions. Understanding Clientless and Client-Based NAC. Clientless NAC. Client-Based NAC. Pre-Admission NAC. Post-Admission NAC. Summary. Chapter 2 The Technical Components of NAC Solutions. Analyzing the Security Posture. What to Analyze? Does Your Company Have the "Strength"? Patch Analysis Best Practices. How the Analysis Takes Place. Utilizing APIs for Analysis. Monitoring Processes. Monitoring for Unwanted Processes and Applications. Setting Policy for Device Analysis. The Need for Different Analysis Policies. Communicating the Security Posture of the Device. Communicating with NAC/NAP-Specific Software Components. Communicating the Security Posture to Third-Party Applications. Communicating with Network Devices. Cisco Trust Agent. Understanding TCG IF-TNCCS and Microsoft IF-TNCCS-SOH. Taking Action Based on the Security Posture. Mobile NAC Action. LAN-Based NAC Actions. Remediating the Security Deficiency. Remediation Actions. The Reporting Mechanism. Knowing the Current State of Devices. Helping with Audits and Compliance Standards. Reports Help Find the Problem. Summary. Chapter 3 What Are You Trying to Protect? LAN-Based NAC. Sedentary Desktop. Laptops Used on and off the LAN. Mobile-Only Laptops. Employee-Owned Home Computers. Unknown Devices. PDAs and Other Devices. Mobile NAC. Dangers of Mobility. Sedentary Desktop. Laptops Used on and off the LAN. Mobile-Only Laptops. Employee-Owned Home Computers. Pros. Cons. Unknown Devices. PDAs and Other Devices. Summary. Chapter 4 Understanding the Need for LAN-Based NAC/NAP. The Security Reasons for LAN-Based NAC. Unintentional LAN-Based Threats. The Pros and Cons of a Guest Network. Pro. Con. The Pros and Cons of Assessing Each Device. Pro. Con. Real-World Example of an Unintentional Threat. Infecting by Transferring Files. How Files Really Get Transferred. Infecting via Worms. System Changes. Registry. Does LAN-Based NAC Protect against Infection? Intentional LAN-Based Threats. Exploitation by Authorized Access and Malicious Use. Exploitation by Authorized Physical Access and Unauthorized LAN Access. Exploitation with Unauthorized Physical Access and Unauthorized LAN Access. Exploitation from Unauthorized Wireless and Remote Access Connectivity to the LAN. Does LAN-Based NAC Protect against Intentional Threats? Summary. Chapter 5 Understanding the Need for Mobile NAC. What's the Primary Need? Why Companies Look to Mobile NAC. Mobile NAC and Compliance Regulations. Mobile NAC and Direct Attacks. Exploiting Laptops with Direct Attacks. View aWeb Page for Two Seconds and Get Hacked! Protecting against AP Phishing and Evil Twin. Using Mobile NAC to Protect against Attacks. Why Proxy Settings Don't Offer Robust Security. Mobile NAC and theWireless Threat. Public Wi-Fi Hotspot Risks. The Risky Home Office. Wireless AttacksWhen There's No Wireless Network. Mobile NAC and the Malware Threat. How Old Should Antivirus Definitions Be? Adware Isn't Your Biggest Problem. Encryption Isn't All You Need to Protect Data. Summary. Chapter 6 Understanding Cisco Clean Access. Deployment Scenarios and Topologies. Cisco Clean Access. The Cisco NAC Guest Server. The Technical Components of Cisco Clean Access. Analyzing the Security Posture of a Device. Setting Policy for Device Analysis. Communicating the Security Posture of the Device. Taking Action Based on the Security Posture. Remediating the Security Deficiency. The Reporting Mechanism. The Cisco NAC Profiler. The Purpose of Cisco Clean Access. Unauthorized Users. Authorized Users with Deficient Security Postures. Mobile Users. Summary. Chapter 7 Understanding Cisco Network Admission Control Framework. Deployment Scenarios and Topologies. Network Admission Control Framework. The Technical Components of the Cisco NAC Framework. Analyzing the Security Posture of a Device. Setting Policy for Device Analysis. Communicating the Security Posture of the Device. Taking Action Based on the Security Posture. Remediating the Security Deficiency. The Reporting Mechanism. The Purpose of Cisco NAC. Unauthorized Users. Authorized Users with Deficient Security Postures. Mobile Users. Summary. Chapter 8 Understanding Fiberlink Mobile NAC. Deployment Scenarios and Topologies. Fiberlink Mobile NAC Components. The Technical Components of Fiberlink Mobile NAC. Analyzing the Security Posture of a Device. Setting Policy for Device Analysis. Communicating the Security Posture of the Device. Taking Action Based on the Security Posture. Remediating the Security Deficiency. The Reporting Mechanism. The Purpose of Fiberlink Mobile NAC. Unauthorized Users. Authorized Users with Deficient Security Postures. Mobile Users. Summary. Chapter 9 Understanding Microsoft NAP Solutions. Deployment Scenarios and Topologies. Network Access Quarantine Control. Microsoft 802.1x. NAP. The Technical Components of Microsoft NAP. Analyzing the Security Posture of a Device. Setting Policy for Device Analysis. Connection Request Policies. Health Policies. Network Access Protection Policies. Network Policies. Communicating the Security Posture of the Device. Taking Action Based on the Security Posture. Remediating the Security Deficiency. The Reporting Mechanism. The Purpose of Microsoft NAP. Unauthorized Users. Authorized Users with Deficient Security Postures. Mobile Users. Summary. Chapter 10 Understanding NAC and NAP in Other Products. NAC-Like Functionality in Non-NAC Technologies. NAC Functionality in IPSec VPN. NAC Functionality in SSL VPN. NAC and NAP Solutions from Other Vendors. What to Look for in a NAC/NAP Solution. Other NAC/NAP Vendors. Summary. Appendix A Case Studies and Additional Information. Cisco Clean Access. McAfee NAC. Bradford Networks. Juniper Uniform Access Control. Bibliography. Index.

最近チェックした商品