Cisco Router and Switch Forensics
Investigating and Analyzing Malicious Network Activity
Samenvatting
Cisco IOS (the software that runs the vast majority of Cisco routers and all Cisco network switches) is the dominant routing platform on the Internet and corporate networks. This widespread distribution, as well as its architectural deficiencies, makes it a valuable target for hackers looking to attack a corporate or private network infrastructure. Compromised devices can disrupt stability, introduce malicious modification, and endanger all communication on the network. For security of the network and investigation of attacks, in-depth analysis and diagnostics are critical, but no book currently covers forensic analysis of Cisco network devices in any detail. 'Cisco Router and Switch Forensics' is the first book devoted to criminal attacks, incident response, data collection, and legal testimony on the market leader in network devices, including routers, switches, and wireless access points.
- Covers forensics analysis of routers and switches focusing on the operating system that runs the vast majority of network devices in the enterprise and on the internet
- Outline the fundamental differences between, router forensics and traditional forensics, a critical distinction for repsonders in an investigation targeting network activity.
- Details where netwrok forensics fits within the entire process of an investigation, end to end, from incident response and data collection to preparing a report and legal testimony
- Includes actual hands-on examples of forensic data gathering
Explains the psychology of dealing with on-site staff while gathering the forensic data
- Contains examples of data security breaches in perimeter networking equipment
- Describes how to strenghten network devices in real world usage
- Demonstrates ,how to use Cisco's Security Device Manager (SDM), Netwrok Assistant, and Web Interface tools to configure advanced security features of routers and switches
- Shows how to use logging features to monitor adn identify security events when they happen
Specificaties
Inhoudsopgave
1. Digital Forensics and Analyzing Data
2. Seizure of Digital Information
4. The Mindset of a Network Administrator
4. Arrival on the Scene
5. Diagramming the Network Infrastructure
6. Cisco IOS Router Basics
7. Understanding the Methods and Mindset of the Attacker
8. Collecting the Non-Volatile Data from a Router
9. Collecting the Volatile Data from a Router
10. Cisco IOS Switch Basics
11. Collecting the Non-Volatile and Volatile Data from a Switch
12. Preparing Your Report
13. Preparing to Testify
Index
Anderen die dit boek kochten, kochten ook
Net verschenen
Rubrieken
- aanbestedingsrecht
- aansprakelijkheids- en verzekeringsrecht
- accountancy
- algemeen juridisch
- arbeidsrecht
- bank- en effectenrecht
- bestuursrecht
- bouwrecht
- burgerlijk recht en procesrecht
- europees-internationaal recht
- fiscaal recht
- gezondheidsrecht
- insolventierecht
- intellectuele eigendom en ict-recht
- management
- mens en maatschappij
- milieu- en omgevingsrecht
- notarieel recht
- ondernemingsrecht
- pensioenrecht
- personen- en familierecht
- sociale zekerheidsrecht
- staatsrecht
- strafrecht en criminologie
- vastgoed- en huurrecht
- vreemdelingenrecht