Network protocols for security professionals probe and identify network-based vulnerabilities and safeguard against network protocol breaches

What you will learn Understand security breaches, weaknesses, and protection techniques Attack and defend wired as well as wireless networks Discover how to attack and defend LAN-, IP-, and TCP/UDP-based vulnerabilities Focus on encryption, authorization, and authentication principles Gain insights...

Full description

Bibliographic Details
Main Author: Orzach, Yoram
Other Authors: Khanna, Deepanshu
Format: eBook
Language:English
Published: Birmingham Packt Publishing Limited 2022
Subjects:
Online Access:
Collection: O'Reilly - Collection details see MPG.ReNa
Table of Contents:
  • Chapter 3: Security Protocols and Their Implementation
  • Security pillars
  • confidentiality, integrity, and availability
  • Encryption basics and protocols
  • Services provided by encryption
  • Stream versus block ciphers
  • Symmetric versus asymmetric encryption
  • Public key infrastructure and certificate authorities
  • Authentication basics and protocols
  • Authentication types
  • Username/password with IP address identification authentication
  • Encrypted username/password authentication
  • Extensible authentication protocol (EAP)
  • Authorization and access protocols
  • L2 and L3 topologies with firewalls
  • L2 and L3 topologies with overlays
  • The network perimeter
  • The data, control, and management planes
  • The data plane
  • The control plane
  • The management plane
  • SDN and NFV
  • Software-defined networking (SDN)
  • Network function virtualization (NFV)
  • Cloud connectivity
  • Type of attacks and where they are implemented
  • Attacks on the internet
  • Attacks from the internet targeting organizational networks
  • Attacks on firewalls
  • Attacks on servers
  • Attacks on local area networks (LANs)
  • Attacks on network routers and routing protocols
  • Cover
  • Title Page
  • Copyright and credits
  • Contributors
  • About the reviewers
  • Table of Contents
  • Preface
  • Part 1: Protecting the Network
  • Technologies, Protocols, Vulnerabilities, and Tools
  • Chapter 1: Data Centers and the Enterprise Network Architecture and its Components
  • Exploring networks and data flows
  • The data center, core, and user networks
  • Switching (L2) and routing (L3) topologies
  • Switching (L2) and routing (L3)
  • L2 and L3 architectures
  • L2 and L3 architecture data flow
  • L2 and L3 architecture data flow with redundancy
  • Hash functions and message digests
  • IPSec and key management protocols
  • VPNs
  • IPSec principles of operation
  • IPSec tunnel establishment
  • IPSec modes of operation
  • IPSec authentication and encryption protocols
  • IPSec AH protocol
  • IPSec ESP protocol
  • SSL/TLS and proxies
  • Protocol basics
  • The handshake protocol
  • Network security components
  • RADIUS/TACACS+, FWs, IDS/IPSs, NAC, and WAFs
  • Firewalls
  • RADIUS, NAC, and other authentication features
  • Web application firewalls (WAFs)
  • Summary
  • Questions
  • Chapter 4: Using Network Security Tools, Scripts, and Code
  • Attacks on wireless networks
  • Summary
  • Questions
  • Chapter 2: Network Protocol Structures and Operations
  • Data network protocols and data structures
  • Layer 2 protocols
  • STP, VLANs, and security methods
  • The Ethernet protocols
  • LAN switching
  • VLANs and VLAN tagging
  • Spanning tree protocols
  • Layer 3 protocols
  • IP and ARP
  • Routers and routing protocols
  • Routing operations
  • Routing protocols
  • Layer 4 protocols
  • UDP, TCP, and QUIC
  • UDP
  • TCP
  • QUIC
  • Vulnerabilities in layer 4 protocols
  • Encapsulation and tunneling
  • Summary
  • Questions