TY - BOOK AU - Nestler,Vincent J. TI - Computer security lab manual SN - 97800722550809 U1 - 005.8 22 PY - 2006/// CY - Boston : PB - McGraw-Hill Irwin KW - Computer security KW - Data protection N1 - Table of Content SECTION 1 NETWORKING BASICS: HOW DO NETWORKS WORK? Chapter 1 WORKSTATION NETWORK CONFIGURATION AND CONNECTIVITY Lab1: Network workstation client configuration Lab2: Computer name resolution Lab3: Network routing basics Lab4: Network communication analysis Chapter 2 TCP/UDP BASICS Lab5: TCP basics Lab6: UDP basics Chapter 3 NETWORK APPLICATIONS Lab7: FTP communication Lab8: Port connection status Lab9: E-mail protocols_SMTP and POP Lab10: E-mail client software SECTION 2 VULNERABILITIES AND THREATS _ HOW CAN NETWORKS BE COMPROMISED? Chapter 4 SCANNING AND ENUMERATING THE NETWORK FOR TARGETS Lab12: IP address and port scanning, service identity determination Lab14: GUI-Based vulnerability scanners Chapter 5 ATTACKS - WEB SERVER, E-MAIL,DOS, AND TROJAN ATTACKS Lab15: Web server exploits Lab16: E-mail system exploits Lab17: Denial of service exploits Lab18: Trojan attacks Chapter 6 ESCALATING PRIVILEGE- SNIFFING, KEY LOGGING, PASSWORD-CRACKING ATTACKS Lab19: Intercepting and sniffing network traffic Lab20: Keystroke logging Lab21: Password cracking Lab22: Man-in-the-middle attack etc. SECTION 3 REVENTION-HOW DO WE PREVENT HARM TO NETWORKS? Chapter 7 HARDENING THE HOST COMPUTER Lab24: Hardening the operating system Lab25: Windows XP service pack 2 Lab26: Using anti-virus applications Lab27: Using firewalls Chapter 8 SECURING NETWORK COMMUNICATIONS Lab28: Using GPG to encrypt and sign e-mail Lab29: using secure shell Lab30: using secure copy Lab31: Using certificates and SSL etc. SECTION 4 DETECTION AND RESPONSE-HOW DO WE DETECT AND RESPOND TO ATTACKS? Chapter 9 PREPARING FOR AND DETECTING ATTACKS Lab33: System log file analysis Lab34: Intrusion detection systems Lab35: Using honeypots Lab36: Detecting spyware Chapter 10 DIGITAL FORENSICS Lab 38: Initial Response--Incident Determination Lab 39: Acquiring the Data Lab 40: Forensic Analysis ; Index : p. 741 - 759 ER -