Protecting LAN Resources

A Comprehensive Guide to Securing, Protecting and Rebuilding a Network

Gilbert Held

Publisher: Wiley, 1995, 202 pages

ISBN: 0-471-95407-1

Keywords: IT Security

Last modified: June 3, 2021, 12:53 p.m.

With the rapid evolution of distributed computing, security has become a key issue for all network users. This timely book provides valuable guidance on how to protect LAN (Local Area Network) resources, including hardware, software and data. Feautures include:

  • An examination of physical security, detailing access control techniques, access to cables, file servers and work–stations.
  • Detailed coverage of data security and storage protection, reviewing the identification of viruses, back–up techniques and disk mirroring.
  • Advice on file access control, transmission security and administrative security. Clear guidelines are provided on encryption techniques, safe e–mail and the prevention of dial–in hacker access.
  • State–of–the–art information on the creation of a network bible and the use of hot and cold sites in contingency planning.

Written by an internationally respected author, this comprehensive guide is essential reading for all LAN users and administrators, data center managers, network analysts and designers. Professional telecommunications engineers and students of data communications, electrical and electronic engineering will also find the author's practical approach highly appealing.

  1. Beyond Disaster Recovery
    1. LAN Vulnerability
      • Network threats
      • Threat categories
    2. Network Protection Areas
      • Physical security
      • Data security
      • Data storage protection
      • File access control
      • Transmission security
      • Administrative security
      • Contingency planning
  2. Physical Security and Access Control
    1. Area Access Control
      • Workstations
      • File servers
      • Print servers
      • Hubs
    2. Computer Access Control
      • Software
      • Hardware
  3. Data Security
    1. Disk Storage
      • Formatting and addressing
      • Disk areas
    2. Power-On Operations
      • POST
      • Boot sector and system file loading
    3. Software Attack Methods
      • Logic Bombs
      • Worms
      • Trojans
      • Viruses
    4. Destructive Software Sources
    5. Infection Detection and Prevention
      • Infection prevention
      • Detection programs
      • Infection symptions
      • Recovery operations
    6. LAN Protection
  4. Equipment Availability Considerations
    1. Availability
      • Component availability
      • MTBF and MTTR
      • System availability
    2. Devices Connected in Series
      • Disk storage availability
      • Internetwork access
    3. Devices Connected in Parallel
      • Considering the file server as an entity
    4. Duplicating Communication Paths
      • Full redundancy
      • Partial redundancy
      • Dual hardware versus dual transmission facilities
    5. Internetwork Data Access Availability
    6. Automating Availability Computations
  5. Data Storage Protection
    1. General Data Storage Protection Methods
      • Hot Fix areas
      • Safeguarding other data storage locations
    2. Working with NetWare
      • Using INSTALL
      • NetWare SFT
      • Server mirroring alternatives
    3. Comparing Data Storage Availability
    4. RAID
      • RAID levels
      • Disk array evaluation
    5. Tape Backup
      • Storage options
      • Drive features
      • NetWare's NBACKUP utility program
      • NetWare Storage Management Services
      • Backup strategy
    6. The Role of UPS
      • Backup power
      • Capacity
      • Power Protection
      • UPS features
      • Network features
      • Alternatives to UPS
  6. File Access Control
    1. The DOS File Attribute Byte
      • The ATTRIB command
      • Security modifications
    2. UNIX Permissions
      • User names and groups
      • File and directory permissions
      • The permission mask
      • Mask manipulation
      • Directory structure
    3. NetWare
      • Rights
      • Directory rights formation
      • File righs formation
      • File and directory attributes
      • NetWare 4.x attribute additions
      • Attribute manipulation
      • Cautionary postscript
  7. Transmission Security
    1. Authentication
      • Passwords
      • Tokens
      • Biometric authentication
    2. Encryption
      • File encryption
      • Basic encryption methods
      • LAN considerations
    3. Security Modems
  8. Administrative Security
    1. The Network Bible
      • Contents
      • Inter-LAN data elements
      • Updating
      • Placement
    2. Administrative Policies and Procedures
      • General policies
      • Access control
      • Communications control
      • Data control and recovery
      • Software control
      • Backup control
  9. Contingency Planning
    1. Off-Site Data Storage
      • Full and incremental saves
      • Televaulting
    2. Hot and Cold Sites
      • Alternatives to consider
      • Methods to consider
      • Intra-company hot site agreements
      • Inter-company hot site agreements
      • Final words

Reviews

Protecting LAN Resources

Reviewed by Roland Buresund

Bad ** (2 out of 10)

Last modified: Jan. 22, 2014, 12:58 p.m.

Hopelessly outdated. In fact, it was already outdated when it was published.

Comments

There are currently no comments

New Comment

required

required (not published)

optional

required

captcha

required