Few frontline system administrators can afford to spend all day worrying about security. But in this age of widespread virus infections, worms, and digital attacks, no one can afford to neglect network defenses.
Written with the harried IT manager in mind, Open Source Security Tools is a practical, hands-on introduction to open source security tools. Seasoned security expert Tony Howlett has reviewed the overwhelming assortment of these free and low-cost solutions to provide you with the “best of breed” for all major areas of information security.
Inside, you’ll find everything from how to harden Linux and Windows systems to how to investigate breaches with Sleuth Kit, Autopsy Forensic Browser, and Forensic Tool Kit. For each security task described, the author reviews the best open source tools and how to use them and also provides a case study and sample implementation. Covered tasks include:
This handy reference also tackles the emerging field of wireless security and covers tools such as Kismet Wireless, Airsnort, and Netstumber.
Whether you’re a Windows system administrator or a network administrator, you will come away with an understanding of how open source security tools can help protect your organization and further your own career.
CD-ROM Contents and Organization.
1. Information Security and Open Source Software.
The Practice of Information Security.
The State of Computer Crime.
Info-Security Business Risks.
Open Source History.
Open Source Advantages.
When Open Source May Not Fit Your Needs.
Windows and Open Source.
Open Source Licenses.
2. Operating System Tools.
Hardening Your Security Tool System.
traceroute (UNIX) or tracert (Windows): Network Diagnostic Tools.
Considerations for Hardening Windows.
Network Architecture Basics.
Security Business Processes.
SmoothWall Hardware Requirements.
SmoothWall Express Versus SmoothWall Corporate.
Administering the SmoothWall Firewall.
Creating a VPN on the SmoothWall Firewall.
4. Port Scanners.
Overview of Port Scanners.
Considerations for Port Scanning.
Uses for Port Scanners.
5. Vulnerability Scanners.
Identifying Security Holes in Your Systems.
Vulnerability Scanners to the Rescue.
Considerations for Vulnerability Scanning.
What Vulnerability Testing Doesn’t Find.
6. Network Sniffers.
A Brief History of Ethernet.
Considerations for Network Sniffing.
TCP/IP Packet Headers.
7. Intrusion Detection Systems.
NIDS Signature Examples.
The Problem of NIDS False Positives.
Getting the Most Out of Your IDS.
Configuring Snort for Maximum Performance.
Host-Based Intrusion Detection.
8. Analysis and Management Tools.
Using Databases and Web Servers to Manage Your Security Data.
The Birth of an Open Source Project.
9. Encryption Tools.
Types of Encryption.
Virtual Private Networks.
Wireless LAN Technology.
Dangers of Wireless LANs.
The “War-Driving” Phenomenon.
Performing a Wireless Network Security Assessment.
Steps for More Secure Wireless LANs.
11. Forensic Tools.
Uses for Computer Forensic Tools.
Building an Incident Response Plan.
Preparing for Good Forensic Data.
Where to Look for Forensic Data.
Tenets of Good Forensic Analysis.
Forensic Analysis Tools.
Reviewing Log Files.
Making Copies of Forensic Evidence.
12. More on Open Source Software.
Open Source Resources.
Joining the Open Source Movement.
More Open Source Security Tools.
Appendix A Open Source Licenses.
Appendix B Basic Linux/UNIX Commands.
Appendix C Well-Known TCP/IP Port Numbers.
Appendix D General Permission and Waiver Form.
Download the Index
file related to this title.