Microsoft's flagship ISA Server delivers the Internet to your customers! As the demand for Internet connectivity reaches a fever pitch, system administrators are being challenged to connect more and more systems to the Internet without compromising security or network performance. ISA Server 2000 provides system administrators with a revolutionary management infrastructure that addresses the two greatest needs of Enterprise-wide Internet connectivity: Security and speed. Written by best-selling author of several MCSE 2000 study guides, this book will provide the system administrators with an in depth understanding of all the critiacl features of Microsoft's flag ship Internet Server. Configuring ISA Server 2000 shows network administrators how to connect a network to the Internet, maintain the connection, and troubleshoot remote users' hardware and software configuration problems. * Up-to-date coverage of new products specific to Windows 2000 * Shows network administrators how to supply e-mail whilst maintaining network security * Focuses on providing secure remote access to a network
Author(s): Thomas Shinder, Debra Littlejohn Shinder, Martin Grasdal
Edition: 1
Publisher: Syngress
Year: 2001
Language: English
Pages: 754
Contents......Page 12
Foreword......Page 26
Facing the Cybercrime Problem Head On......Page 34
Introduction......Page 35
Quantifying the Crisis......Page 36
Defining Cybercrime......Page 37
Categorizing Cybercrime......Page 51
Fighting Cybercrime......Page 68
Reviewing the History of Cybercrime......Page 82
Introduction......Page 83
The Evolution of a Word......Page 85
Hacking Ma Bell’s Phone Network......Page 86
Cybercrime Easy......Page 90
the Wild West of Networking......Page 91
Commercialization of the Internet......Page 94
Story Up to Date......Page 95
Understanding the People on the Scene......Page 126
Introduction......Page 127
Understanding Cybervictims......Page 162
Understanding Computer Basics......Page 180
Introduction......Page 181
The Language of the Machine......Page 197
Understanding the Binary Numbering System......Page 199
Operating Systems......Page 204
System Software......Page 205
Understanding Networking Basics......Page 234
Introduction......Page 235
Understanding Network Intrusions and Attacks......Page 312
Introduction......Page 313
Intrusions and Attacks......Page 315
Accidental “Attacks”......Page 320
Attack Activities......Page 325
Port Scans......Page 327
Address Spoofing......Page 330
Prevention and Response......Page 337
Understanding Password Cracking......Page 338
Brute Force......Page 339
Social Engineering......Page 346
Prevention and Response......Page 347
Understanding Technical Exploits......Page 348
Viruses, and Worms......Page 367
Trojans......Page 369
Worms......Page 371
The Script Kiddie Phenomenon......Page 373
Prevention and Response......Page 375
Understanding Cybercrime Prevention......Page 382
Introduction......Page 383
Importance of Physical Security......Page 390
Cryptographic Security......Page 397
Basic Cryptography Concepts......Page 406
and Software Security......Page 420
Implementing Software- Based Security......Page 424
Understanding Firewalls......Page 427
Forming an Incident Response Team......Page 431
Security Policies......Page 434
Implementing System Security......Page 464
Introduction......Page 465
The Security Mentality......Page 466
Deploying Antivirus Software......Page 474
Setting Access Permissions......Page 477
and E- Mail Security......Page 485
Clients More Secure......Page 489
Implementing Web Server Security......Page 498
DMZ vs. Stronghold......Page 499
Microsoft Operating Systems......Page 504
Securing Windows 9x Computers......Page 508
UNIX/ Linux Operating Systems......Page 516
Macintosh Operating Systems......Page 520
Understanding Mainframe Security......Page 522
Understanding Wireless Security......Page 523
Implementing Cybercrime Detection Techniques......Page 532
Introduction......Page 533
Security Auditing and Log Files......Page 535
Alarms, and Alerts......Page 543
Understanding E- Mail Headers......Page 549
Tracing a Domain Name or IP Address......Page 555
Commercial Intrusion Detection Systems......Page 557
Antidetection Tactics......Page 565
Other “Cyberstings”......Page 566
Collecting and Preserving Digital Evidence......Page 578
Introduction......Page 579
Evidence in a Criminal Case......Page 581
Collecting Digital Evidence......Page 585
The Role of Investigators......Page 587
“Snapshot” Tools and File Copying......Page 596
Defeating Data Recovery Techniques......Page 611
Evidence Logs......Page 614
Computer Forensics Resources......Page 616
Understanding Legal Issues......Page 620
Privacy Laws......Page 631
Building the Cybercrime Case......Page 640
Introduction......Page 641
Difficulty of Defining the Crime......Page 642
Effective Prosecution......Page 669
The Investigative Process......Page 670
Testifying in a Cybercrime Case......Page 683
Appendix - Fighting Cybercrime on a Global Scale......Page 692
Cybercrime Legislation......Page 693
Cybercrime Laws......Page 699