Personal Firewalls for Administrators and Remote Users
-- Will cover products such as Black Ice Defender, Zone Alarm and iptables(linux)among others.-- Special section on selecting personal firewalls for remote and mobile corporate users as well as for the home systems of corporate users.-- Explains what protection level and method is best for different circumstances.While corporate system administrators spend lots of time thinking about enterprise firewall systems for their in-house employees, a vulnerability that is often overlooked is the remote employee's unprotected computer system, the unprotected computers of mobile laptop users (employees on the road) and all those unprotected but networked handheld devices. At the same time, many home computer users who have always relied on high speed Internet access don't realize that without a personal firewall, they too are quite vulnerable to intrusion and attacks. This book is designed to explain how personal firewalls work and how to determine which type of firewall works best in a given situation. Yeo starts with an intro to security basics -basic data protection measures (passwords, virus software, encryption, and firewalls) and reviews common vulnerabilities and issues with the always-on Internet. Yeo then explains protection methods used by firewalls in general - proxy server firewalls, packet filters, signature-based firewalls and stateful inspection-based firewalls while examining strengths and weaknesses of each type. She then explains how each type of protection method is implemented in a "personal" firewall, the various products including Black Ice Defender, Zone Alarm, Linux iptables that use a given firewall method, and the pros and cons of relying on this method in apersonal firewall. An entire chapter is devoted to maintenance of personal firewalls.
- Paperback | 240 pages
- 152.4 x 229.6 x 16.8mm | 381.02g
- 19 Dec 2002
- Pearson Education (US)
- Prentice Hall
- Upper Saddle River, United States
Table of contents
Preface. Overview. Acknowledgments. 1. Security Basics. Principles of Security. Vulnerabilities, Threats, and Risk. General Security Practices. Firewalls and Personal Firewalls. Summary.2. Networking Basics. Internet Protocol Address. DHCP and BootP. Internet Protocol Basics. OSI Model. Summary.3. Personal Firewalls. Network Address Translation. Static Packet Filter. Stateful Inspection. Application Proxy. Signature-Based Detection. Intrusion Detection. ICSA Certification. Summary.4. Personal Firewalls at Home. Identifying Risks. Assessing Your Needs. Managing Your Firewall. Summary.5 Personal Firewalls at Work. Identifying Risks. Assessing Your Needs. Managing Your Firewall. Summary.6. Logs. Why Log? How Do I Read a Log? Using Logs. Summary.7. Configuration Options. Configuration Choices. Defensive Postures. Summary.8. Troubleshooting. Basic Troubleshooting. Common Concerns. Uninstalling. Summary.Appendix A: Firewall Comparison. Hardware. Software.Glossary. Bibliography. Firewalls. Intrusion Detection. Networking. Reviews. Security Policy. Index.
About Lisa Yeo
LISA YEO is a systems analyst with the Legislative Assembly Office in Edmonton, Alberta, Canada. Her start in security came in 1997 when she was made responsible for managing a corporate firewall. Since that time, she has acquired the Global Information Assurance Certification (GIAC) Security Essentials and Windows certifications. Lisa currently sits on the GIAC Windows (GCWN) Board.