• Complain

Chapman - Network performance and security: testing and analyzing using open source and low-cost tools

Here you can read online Chapman - Network performance and security: testing and analyzing using open source and low-cost tools full text of the book (entire story) in english for free. Download pdf and epub, get meaning, cover and reviews about this ebook. City: Amsterdam, year: 2016, publisher: Elsevier Science;Elsevier Ltd, genre: Romance novel. Description of the work, (preface) as well as reviews are available. Best literature library LitArk.com created for fans of good reading and offers a wide selection of genres:

Romance novel Science fiction Adventure Detective Science History Home and family Prose Art Politics Computer Non-fiction Religion Business Children Humor

Choose a favorite category and find really read worthwhile books. Enjoy immersion in the world of imagination, feel the emotions of the characters or learn something new for yourself, make an fascinating discovery.

No cover
  • Book:
    Network performance and security: testing and analyzing using open source and low-cost tools
  • Author:
  • Publisher:
    Elsevier Science;Elsevier Ltd
  • Genre:
  • Year:
    2016
  • City:
    Amsterdam
  • Rating:
    5 / 5
  • Favourites:
    Add to favourites
  • Your mark:
    • 100
    • 1
    • 2
    • 3
    • 4
    • 5

Network performance and security: testing and analyzing using open source and low-cost tools: summary, description and annotation

We offer to read an annotation, description, summary or preface (depends on what the author of the book "Network performance and security: testing and analyzing using open source and low-cost tools" wrote himself). If you haven't found the necessary information about the book — write in the comments, we will try to find it.

Providing mid-level IT engineers with the practical tips and tricks they need to harden their IT infrastructure, this book shows how to use open source tools to test network configurations for malware attacks, DDoS, botnet, rootkit and worm attacks, and includes tactics on how to prepare and execute a mediation schedule of the who, what, where, when, and how, when an attack hits. --

Chapman: author's other books


Who wrote Network performance and security: testing and analyzing using open source and low-cost tools? Find out the surname, the name of the author of the book and a list of all author's works by series.

Network performance and security: testing and analyzing using open source and low-cost tools — read online for free the complete book (whole text) full work

Below is the text of the book, divided by pages. System saving the place of the last page read, allows you to conveniently read the book "Network performance and security: testing and analyzing using open source and low-cost tools" online for free, without having to search again every time where you left off. Put a bookmark, and you can go to the page where you finished reading at any time.

Light

Font size:

Reset

Interval:

Bookmark:

Make
Network Performance and Security Testing and Analyzing Using Open Source and - photo 1
Network Performance and Security
Testing and Analyzing Using Open Source and Low-Cost Tools
Chris Chapman
Steve Furnell, Technical Editor
Table of Contents Copyright Syngress is an imprint of Elsevier 50 Hampshire - photo 2
Table of Contents
Copyright

Syngress is an imprint of Elsevier

50 Hampshire Street, 5th Floor, Cambridge, MA 02139, USA

Copyright 2016 Elsevier Inc. All rights reserved.

No part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying, recording, or any information storage and retrieval system, without permission in writing from the publisher. Details on how to seek permission, further information about the Publishers permissions policies, and our arrangements with organizations such as the Copyright Clearance Center and the Copyright Licensing Agency can be found at our website: www.elsevier.com/permissions.

This book and the individual contributions contained in it are protected under copyright by the Publisher (other than as may be noted herein).

Notices

Knowledge and best practice in this field are constantly changing. As new research and experience broaden our understanding, changes in research methods, professional practices, or medical treatment may become necessary.
Practitioners and researchers must always rely on their own experience and knowledge in evaluating and using any information, methods, compounds, or experiments described herein. In using such information or methods they should be mindful of their own safety and the safety of others, including parties for whom they have a professional responsibility.
To the fullest extent of the law, neither the Publisher nor the authors, contributors, or editors, assume any liability for any injury and/or damage to persons or property as a matter of products liability, negligence or otherwise, or from any use or operation of any methods, products, instructions, or ideas contained in the material herein.

British Library Cataloguing-in-Publication Data

A catalogue record for this book is available from the British Library

Library of Congress Cataloging-in-Publication Data

A catalog record for this book is available from the Library of Congress

ISBN: 978-0-12-803584-9

For information on all Syngress publicationsvisit our website at https://www.elsevier.com/

Publisher Todd Green Acquisition Editor Brian Romer Editorial Project - photo 3

Publisher: Todd Green

Acquisition Editor: Brian Romer

Editorial Project Manager: Anna Valutkevich

Production Project Manager: Punithavathy Govindaradjane

Designer: Matthew Limbert

Typeset by Thomson Digital

Dedication

This book is dedicated to Joan. Without her, nothing would be possible.

Chapter 1
Introduction to practical security and performance testing
Abstract

I will introduce the reader to some basic security concepts including types of attacks, best practices including description. Then network security devices and their subfunctions will be introduced. Finally, the user will understand what perception user experience is, how it is measured, the difference between soft and hard errors, and how users formulate quality of experience.

Keywords
attack
DDoS
malware
penetration testing
volumetric attack
quality of experience (QoE)
perceptual user experience
firewall
IPS/IDS
proxy server
botnet
cross site scripting attack (XSS)
worm
virus
trojan horse attack
zero-day attack
SQL injection attack
hard QoE errors
soft QoE errors
This book is intended to help you practically implement real-world security and optimize performance in your network. Network security and performance is becoming one of the major challenges to the modern information technology (IT) infrastructure. Practical, layered implementation of security policies is critical to the continued function of the organization. I think not a week goes by where we do not hear about data theft, hacking, or loss of sensitive data. If you dig deeper into what actually happens with security breaches, what you read in the news is only a small fraction of the true global threat of inadequate or poorly executed security. One thing that we all hear when an article or a news item is released is excessive amounts of buzz words around security, with little content about how it may have been prevented. The truth is, security mitigation is still in its infant stages, following a very predictable pattern of maturity like other network-based technologies. Performance is another critical part of a well-performing network. Everyone knows they need it, but to test it and measure it is not only a science, but also an art.
I assume that the reader of this book has a desire to learn about practical security techniques, but does not have a degree in cyber security. I assume as a prerequisite to implementing the concepts in this book, the reader has a basic understanding of IT implementation, has a mid level experience with Windows and Active directory, and has had some experience with Linux. Furthermore, my intent in this book is to minimize theory and maximize real-world, practical examples of how you can use readily available open source tools that are free, or relatively low cost, to help harden your network to attacks and test your network for key performance roadblocks before and during deployment in a production network. In fact, the major portion of theory that I will cover is in this chapter, and the focus of that information will be on giving you a baseline understanding in practical deployment and applications of security and performance. I also assume noting, and will take you through execution of best practices.
A Baseline Understanding of Security Concepts
What is an attack? It is an attempt to gather information about your organization or an attempt to disrupt the normal working operations of your company (both may be considered malicious and generally criminal). Attacks have all the aspects of regular crime, just oriented toward digital resources, namely your network and its data. A threat uses some inefficiency, bug, hole, or condition in the network for some specific objective. The threat risk to your network is generally in proportion to the value or impact of the data in your network, or the disruption of your services no longer functioning. Let me give a few examples to clarify this point. If your company processed a high volume of credit card transactions (say you were an e-commerce business) then the data stored in your network (credit card numbers, customer data, etc.) is a high target value for theft because the relative reward for the criminals is high. (For example, credit card theft in 2014 was as high as $8.6B [source: http://www.heritage.org/research/reports/2014/10/cyber-attacks-on-us-companies-in-2014].) Or, if your business handles very sensitive data, such as patient medical record (which generally have the patient-specific government issued IDs such as social security numbers attached), you are a prime target. In either case, the value of data in your network warrants the investment and risk of stealing it. Say, you are a key logistics shipping company, the value to the attacker may be to disrupt your business, causing wider economic impact (classic pattern for state-sponsored cyber terrorism [example: http://securityaffairs.co/wordpress/18294/security/fireeye-nation-state-driven-cyber-attacks.html]). On the other hand, if you host a personal information blog, it is unlikely that cyber crime will be an issue. To put it bluntly, it is not worth the effort for the attackers. The one variable in all of this is the people who attack network because they can. They tend to use open source exploit tools, and tend to be individuals or very small groups, but can be anywhere on the Internet. We have to be aware of the relative value of our data, and plan security appropriately.
Next page
Light

Font size:

Reset

Interval:

Bookmark:

Make

Similar books «Network performance and security: testing and analyzing using open source and low-cost tools»

Look at similar books to Network performance and security: testing and analyzing using open source and low-cost tools. We have selected literature similar in name and meaning in the hope of providing readers with more options to find new, interesting, not yet read works.


Reviews about «Network performance and security: testing and analyzing using open source and low-cost tools»

Discussion, reviews of the book Network performance and security: testing and analyzing using open source and low-cost tools and just readers' own opinions. Leave your comments, write what you think about the work, its meaning or the main characters. Specify what exactly you liked and what you didn't like, and why you think so.