Implementing NAP and NAC Security Technologies: The Complete Guide to Network Access Control
Buy Rights Online Buy Rights

Rights Contact Login For More Details

More About This Title Implementing NAP and NAC Security Technologies: The Complete Guide to Network Access Control

English

Daniel V. Hoffman has designed mobile security solutions for the largest companies in the world. His hacking and security expertise has been featured in educational curriculum, conferences, and media outlets globally. He is the author of Blackjacking: Security Threats to Blackberry Devices, PDAs, and Cell Phones in the Enterprise, also from Wiley.

English

Acknowledgments.

Introduction.

Chapter 1 Understanding Terms and Technologies.

Who Is the Trusted Computing Group?

Is There a Cisco NAC Alliance Program?

NAC-Certified Shipping Product.

Developing NAC Solutions.

Understanding Clientless and Client-Based NAC.

Clientless NAC.

Client-Based NAC.

Pre-Admission NAC.

Post-Admission NAC.

Summary.

Chapter 2 The Technical Components of NAC Solutions.

Analyzing the Security Posture.

What to Analyze?

Does Your Company Have the ‘‘Strength’’?

Patch Analysis Best Practices.

How the Analysis Takes Place.

Utilizing APIs for Analysis.

Monitoring Processes.

Monitoring for Unwanted Processes and Applications.

Setting Policy for Device Analysis.

The Need for Different Analysis Policies.

Communicating the Security Posture of the Device.

Communicating with NAC/NAP-Specific Software Components.

Communicating the Security Posture to Third-Party Applications.

Communicating with Network Devices.

Cisco Trust Agent.

Understanding TCG IF-TNCCS and Microsoft IF-TNCCS-SOH.

Taking Action Based on the Security Posture.

Mobile NAC Action.

LAN-Based NAC Actions.

Remediating the Security Deficiency.

Remediation Actions.

The Reporting Mechanism.

Knowing the Current State of Devices.

Helping with Audits and Compliance Standards.

Reports Help Find the Problem.

Summary.

Chapter 3 What Are You Trying to Protect?

LAN-Based NAC.

Sedentary Desktop.

Laptops Used on and off the LAN.

Mobile-Only Laptops.

Employee-Owned Home Computers.

Unknown Devices.

PDAs and Other Devices.

Mobile NAC.

Dangers of Mobility.

Sedentary Desktop.

Laptops Used on and off the LAN.

Mobile-Only Laptops.

Employee-Owned Home Computers.

Pros.

Cons.

Unknown Devices.

PDAs and Other Devices.

Summary.

Chapter 4 Understanding the Need for LAN-Based NAC/NAP.

The Security Reasons for LAN-Based NAC.

Unintentional LAN-Based Threats.

The Pros and Cons of a Guest Network.

Pro.

Con.

The Pros and Cons of Assessing Each Device.

Pro.

Con.

Real-World Example of an Unintentional Threat.

Infecting by Transferring Files.

How Files Really Get Transferred.

Infecting via Worms.

System Changes.

Registry.

Does LAN-Based NAC Protect against Infection?

Intentional LAN-Based Threats.

Exploitation by Authorized Access and Malicious Use.

Exploitation by Authorized Physical Access and Unauthorized LAN Access.

Exploitation with Unauthorized Physical Access and Unauthorized LAN Access.

Exploitation from Unauthorized Wireless and Remote Access Connectivity to the LAN.

Does LAN-Based NAC Protect against Intentional Threats?

Summary.

Chapter 5 Understanding the Need for Mobile NAC.

What’s the Primary Need?

Why Companies Look to Mobile NAC.

Mobile NAC and Compliance Regulations.

Mobile NAC and Direct Attacks.

Exploiting Laptops with Direct Attacks.

View aWeb Page for Two Seconds and Get Hacked!

Protecting against AP Phishing and Evil Twin.

Using Mobile NAC to Protect against Attacks.

Why Proxy Settings Don’t Offer Robust Security.

Mobile NAC and theWireless Threat.

Public Wi-Fi Hotspot Risks.

The Risky Home Office.

Wireless AttacksWhen There’s No Wireless Network.

Mobile NAC and the Malware Threat.

How Old Should Antivirus Definitions Be?

Adware Isn’t Your Biggest Problem.

Encryption Isn’t All You Need to Protect Data.

Summary.

Chapter 6 Understanding Cisco Clean Access.

Deployment Scenarios and Topologies.

Cisco Clean Access.

The Cisco NAC Guest Server.

The Technical Components of Cisco Clean Access.

Analyzing the Security Posture of a Device.

Setting Policy for Device Analysis.

Communicating the Security Posture of the Device.

Taking Action Based on the Security Posture.

Remediating the Security Deficiency.

The Reporting Mechanism.

The Cisco NAC Profiler.

The Purpose of Cisco Clean Access.

Unauthorized Users.

Authorized Users with Deficient Security Postures.

Mobile Users.

Summary.

Chapter 7 Understanding Cisco Network Admission Control Framework.

Deployment Scenarios and Topologies.

Network Admission Control Framework.

The Technical Components of the Cisco NAC Framework.

Analyzing the Security Posture of a Device.

Setting Policy for Device Analysis.

Communicating the Security Posture of the Device.

Taking Action Based on the Security Posture.

Remediating the Security Deficiency.

The Reporting Mechanism.

The Purpose of Cisco NAC.

Unauthorized Users.

Authorized Users with Deficient Security Postures.

Mobile Users.

Summary.

Chapter 8 Understanding Fiberlink Mobile NAC.

Deployment Scenarios and Topologies.

Fiberlink Mobile NAC Components.

The Technical Components of Fiberlink Mobile NAC.

Analyzing the Security Posture of a Device.

Setting Policy for Device Analysis.

Communicating the Security Posture of the Device.

Taking Action Based on the Security Posture.

Remediating the Security Deficiency.

The Reporting Mechanism.

The Purpose of Fiberlink Mobile NAC.

Unauthorized Users.

Authorized Users with Deficient Security Postures.

Mobile Users.

Summary.

Chapter 9 Understanding Microsoft NAP Solutions.

Deployment Scenarios and Topologies.

Network Access Quarantine Control.

Microsoft 802.1x.

NAP.

The Technical Components of Microsoft NAP.

Analyzing the Security Posture of a Device.

Setting Policy for Device Analysis.

Connection Request Policies.

Health Policies.

Network Access Protection Policies.

Network Policies.

Communicating the Security Posture of the Device.

Taking Action Based on the Security Posture.

Remediating the Security Deficiency.

The Reporting Mechanism.

The Purpose of Microsoft NAP.

Unauthorized Users.

Authorized Users with Deficient Security Postures.

Mobile Users.

Summary.

Chapter 10 Understanding NAC and NAP in Other Products.

NAC-Like Functionality in Non-NAC Technologies.

NAC Functionality in IPSec VPN.

NAC Functionality in SSL VPN.

NAC and NAP Solutions from Other Vendors.

What to Look for in a NAC/NAP Solution.

Other NAC/NAP Vendors.

Summary.

Appendix A Case Studies and Additional Information.

Cisco Clean Access.

McAfee NAC.

Bradford Networks.

Juniper Uniform Access Control.

Bibliography.

Index.

loading