Thank you for visiting us. We are currently updating our shopping cart and regret to advise that it will be unavailable until September 1, 2014. We apologise for any inconvenience and look forward to serving you again.

Wiley
Wiley.com
Print this page Share

Implementing NAP and NAC Security Technologies: The Complete Guide to Network Access Control

ISBN: 978-0-470-23838-7
288 pages
April 2008
Implementing NAP and NAC Security Technologies: The Complete Guide to Network Access Control (0470238380) cover image
This guide presents real-world hacking scenarios along with complete implementation guidance for the right NAP/NAC solution, so you can understand which solution makes the most sense based upon the most prevalent risks in your environment. Follow the actual steps hackers take to perform specific exploits, determine which security solutions will stop the exploits from happening, and learn all about the standard components of any NAP/NAC solution. By learning to analyze a security posture, set policies for device analysis, and communicate with the device, you ll be able to take action.
See More
Acknowledgments.

Introduction.

Chapter 1 Understanding Terms and Technologies.

Who Is the Trusted Computing Group?

Is There a Cisco NAC Alliance Program?

NAC-Certified Shipping Product.

Developing NAC Solutions.

Understanding Clientless and Client-Based NAC.

Clientless NAC.

Client-Based NAC.

Pre-Admission NAC.

Post-Admission NAC.

Summary.

Chapter 2 The Technical Components of NAC Solutions.

Analyzing the Security Posture.

What to Analyze?

Does Your Company Have the ‘‘Strength’’?

Patch Analysis Best Practices.

How the Analysis Takes Place.

Utilizing APIs for Analysis.

Monitoring Processes.

Monitoring for Unwanted Processes and Applications.

Setting Policy for Device Analysis.

The Need for Different Analysis Policies.

Communicating the Security Posture of the Device.

Communicating with NAC/NAP-Specific Software Components.

Communicating the Security Posture to Third-Party Applications.

Communicating with Network Devices.

Cisco Trust Agent.

Understanding TCG IF-TNCCS and Microsoft IF-TNCCS-SOH.

Taking Action Based on the Security Posture.

Mobile NAC Action.

LAN-Based NAC Actions.

Remediating the Security Deficiency.

Remediation Actions.

The Reporting Mechanism.

Knowing the Current State of Devices.

Helping with Audits and Compliance Standards.

Reports Help Find the Problem.

Summary.

Chapter 3 What Are You Trying to Protect?

LAN-Based NAC.

Sedentary Desktop.

Laptops Used on and off the LAN.

Mobile-Only Laptops.

Employee-Owned Home Computers.

Unknown Devices.

PDAs and Other Devices.

Mobile NAC.

Dangers of Mobility.

Sedentary Desktop.

Laptops Used on and off the LAN.

Mobile-Only Laptops.

Employee-Owned Home Computers.

Pros.

Cons.

Unknown Devices.

PDAs and Other Devices.

Summary.

Chapter 4 Understanding the Need for LAN-Based NAC/NAP.

The Security Reasons for LAN-Based NAC.

Unintentional LAN-Based Threats.

The Pros and Cons of a Guest Network.

Pro.

Con.

The Pros and Cons of Assessing Each Device.

Pro.

Con.

Real-World Example of an Unintentional Threat.

Infecting by Transferring Files.

How Files Really Get Transferred.

Infecting via Worms.

System Changes.

Registry.

Does LAN-Based NAC Protect against Infection?

Intentional LAN-Based Threats.

Exploitation by Authorized Access and Malicious Use.

Exploitation by Authorized Physical Access and Unauthorized LAN Access.

Exploitation with Unauthorized Physical Access and Unauthorized LAN Access.

Exploitation from Unauthorized Wireless and Remote Access Connectivity to the LAN.

Does LAN-Based NAC Protect against Intentional Threats?

Summary.

Chapter 5 Understanding the Need for Mobile NAC.

What’s the Primary Need?

Why Companies Look to Mobile NAC.

Mobile NAC and Compliance Regulations.

Mobile NAC and Direct Attacks.

Exploiting Laptops with Direct Attacks.

View aWeb Page for Two Seconds and Get Hacked!

Protecting against AP Phishing and Evil Twin.

Using Mobile NAC to Protect against Attacks.

Why Proxy Settings Don’t Offer Robust Security.

Mobile NAC and theWireless Threat.

Public Wi-Fi Hotspot Risks.

The Risky Home Office.

Wireless AttacksWhen There’s No Wireless Network.

Mobile NAC and the Malware Threat.

How Old Should Antivirus Definitions Be?

Adware Isn’t Your Biggest Problem.

Encryption Isn’t All You Need to Protect Data.

Summary.

Chapter 6 Understanding Cisco Clean Access.

Deployment Scenarios and Topologies.

Cisco Clean Access.

The Cisco NAC Guest Server.

The Technical Components of Cisco Clean Access.

Analyzing the Security Posture of a Device.

Setting Policy for Device Analysis.

Communicating the Security Posture of the Device.

Taking Action Based on the Security Posture.

Remediating the Security Deficiency.

The Reporting Mechanism.

The Cisco NAC Profiler.

The Purpose of Cisco Clean Access.

Unauthorized Users.

Authorized Users with Deficient Security Postures.

Mobile Users.

Summary.

Chapter 7 Understanding Cisco Network Admission Control Framework.

Deployment Scenarios and Topologies.

Network Admission Control Framework.

The Technical Components of the Cisco NAC Framework.

Analyzing the Security Posture of a Device.

Setting Policy for Device Analysis.

Communicating the Security Posture of the Device.

Taking Action Based on the Security Posture.

Remediating the Security Deficiency.

The Reporting Mechanism.

The Purpose of Cisco NAC.

Unauthorized Users.

Authorized Users with Deficient Security Postures.

Mobile Users.

Summary.

Chapter 8 Understanding Fiberlink Mobile NAC.

Deployment Scenarios and Topologies.

Fiberlink Mobile NAC Components.

The Technical Components of Fiberlink Mobile NAC.

Analyzing the Security Posture of a Device.

Setting Policy for Device Analysis.

Communicating the Security Posture of the Device.

Taking Action Based on the Security Posture.

Remediating the Security Deficiency.

The Reporting Mechanism.

The Purpose of Fiberlink Mobile NAC.

Unauthorized Users.

Authorized Users with Deficient Security Postures.

Mobile Users.

Summary.

Chapter 9 Understanding Microsoft NAP Solutions.

Deployment Scenarios and Topologies.

Network Access Quarantine Control.

Microsoft 802.1x.

NAP.

The Technical Components of Microsoft NAP.

Analyzing the Security Posture of a Device.

Setting Policy for Device Analysis.

Connection Request Policies.

Health Policies.

Network Access Protection Policies.

Network Policies.

Communicating the Security Posture of the Device.

Taking Action Based on the Security Posture.

Remediating the Security Deficiency.

The Reporting Mechanism.

The Purpose of Microsoft NAP.

Unauthorized Users.

Authorized Users with Deficient Security Postures.

Mobile Users.

Summary.

Chapter 10 Understanding NAC and NAP in Other Products.

NAC-Like Functionality in Non-NAC Technologies.

NAC Functionality in IPSec VPN.

NAC Functionality in SSL VPN.

NAC and NAP Solutions from Other Vendors.

What to Look for in a NAC/NAP Solution.

Other NAC/NAP Vendors.

Summary.

Appendix A Case Studies and Additional Information.

Cisco Clean Access.

McAfee NAC.

Bradford Networks.

Juniper Uniform Access Control.

Bibliography.

Index.

See More
Daniel V. Hoffman has designed mobile security solutions for the largest companies in the world. His hacking and security expertise has been featured in educational curriculum, conferences, and media outlets globally. He is the author of Blackjacking: Security Threats to Blackberry Devices, PDAs, and Cell Phones in the Enterprise, also from Wiley.
See More
Buy Both and Save 25%!
+

Implementing NAP and NAC Security Technologies: The Complete Guide to Network Access Control (US $55.00)

-and- Computer Forensics JumpStart, 2nd Edition (US $29.99)

Total List Price: US $84.99
Discounted Price: US $63.74 (Save: US $21.25)

Buy Both
Cannot be combined with any other offers. Learn more.
Back to Top