Корично изображение Електронна книга

SSL VPN : understanding, evaluating, and planning secure, web-based remote access /

Основни автори: Steinberg, Joseph., Speed, Tim. (Author)
Други автори: Fernando, Chris. (Editor), Pande, Ashutosh. (Editor)
Формат: Електронна книга
Език: English
Публикувано: Birmingham, U.K. : Packt Pub., ℗♭2005.
Издание: 1st ed.
Серия: From technologies to solutions.
Предмети:
Онлайн достъп: http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=268077
Подобни документи: Print version:: SSL VPN.
Съдържание:
  • Cover
  • Table of Contents
  • Introduction
  • Chapter 1: Introduction to SSL VPN
  • The Internet
  • Reference Models
  • OSI Reference Model
  • DARPA Model
  • Introducing Hacker Bob
  • Trapping Your Data
  • Keeping Hacker Bob Out of Your Data
  • VPNs
  • One Computer to the Corporate Network
  • Remote Office Network Connected to the Main Office
  • VPN Examples
  • IPsec
  • SSL VPN
  • IPsec Vs. SSL VPN
  • Trusted Networks
  • The DMZ
  • SSL VPN Scenarios
  • Summary
  • Chapter 2: SSL VPN
  • SSL VPN: A Historical Background
  • Remote Access: Measuring Return-on-Investment
  • So What Does SSL VPN Actually Give Me?
  • Summary
  • Chapter 3: How SSL VPNs Work
  • Appliances Vs. Software
  • The SSL Protocol
  • Background
  • Overview of SSL Technology
  • Establishing Secure Tunnels Using SSL
  • Secure Tunnels
  • OSI Network Model
  • Application-Level Communications
  • Reverse Proxy Technology
  • SSL Remote Access: Reverse Proxy Technology Plus
  • Non-Web Traffic over SSL
  • Establishing Network Connectivity over SSL
  • Why Different Access Technologies for Web Applications
  • Applets
  • Remote Access to Files and Other Resources
  • Internet-Enabling Internal Applications
  • Remote Access Interface
  • Administration Tools
  • Performance
  • Access from Older Web Browsers
  • SSL VPN Sample Session
  • Summary
  • Chapter 4: SSL VPN Security
  • Authentication and Authorization
  • Authentication
  • Single Sign On
  • Authorization
  • End Point Security Concerns
  • The Problem: Sensitive Data in Insecure Locations
  • The Solution
  • The Problem: Third Party Search Tools Running on Access Devices
  • The Solution
  • Department of Defense (DoD) Requirements
  • The Problem: Users May Neglect to Log Out
  • The Solution
  • The Problem: Viruses Enter Corporate Networks via the SSL VPN
  • The Solution
  • The Problem: Worms Enter Corporate Networks via the SSL VPN
  • The Solution
  • Problems of Insecure Locations
  • Hackers Bridging to the Corporate Network
  • The Problem: Internal Networking Information may be Leaked
  • The Solution
  • Trusted Endpoint
  • Tiers of Access Based on Endpoint Situation
  • Server-Side Security Issues
  • The Problem: Firewalls and Other Security Technologies may be Undermined
  • The Solution
  • The Problem: Application-Level Vulnerabilities
  • The Solution
  • Encryption
  • Patching of SSL VPN Servers
  • Linux versus Windows
  • Some Other SSL VPN Appliance Security Concepts
  • Summary
  • Chapter 5: Planning for an SSL VPN
  • Determining Business Requirements
  • Remote Access Paradigms
  • Determining User Needs
  • Selecting an Appropriate SSL VPN
  • Ensuring Proper Level of Access
  • Proper User Interface and Experience
  • Remote Password Management
  • Adherence to Security Standards
  • Platform
  • Determining which SSL VPN Functions to Use
  • Where to Deploy the SSL VPN server
  • Back Office
  • DMZ
  • Outside the Perimeter Firewall
  • Air Gap
  • Offloaded SSL
  • Planning for Deployment
  • User and Administrator Training
  • Summary
  • Chapter 6: Educating the User
  • Building an Education Plan
  • Education Plan: Start the Process
  • Education Plan: Finalize the Plan.