Open Source Security Tools : Practical Guide to Security Applications part 60. Few frontline system administrators can afford to spend all day worrying about security. But in this age of widespread virus infections, worms, and digital attacks, no one can afford to neglect network defenses. Written with the harried IT manager in mind, Open Source Security Tools is a practical, hands-on introduction to open source security tools. | Page 569 Thursday June 24 2004 3 47 PM Index 569 networks detected 326 328 options 329 polling for access points 328 saving sessions 331 signal graph 328 usage 325-328 wireless network card status 328 NetStumbler Web site 322 Network architecture application layer 57 data link layer 55-56 network layer 56 OSI Reference Model 54-57 physical layer 55 presentation layer 57 session layer 57 transport layer 56-57 Network card and promiscuous mode 168 Network interface hardware 55-56 Network layer 56 Network protocols 57 Network sniffers 2 61 163-164 baseline for network 167 Ethereal 183-191 getting permission for 166 network topology 166-167 ports 166-167 routers 166 Tcpdump 167-181 tight search criteria 167 WinDump 181-182 Network Solutions 36 Network Solutions Web site 37 Network unreachable ICMP message 31 Network use policy 60 Network Worms 94 Networks accounts with blank passwords 128 baseline 2 167 checking external exposure 119 communication with secondary identification 56 dropping packets 31 fault-tolerant 57 information about 31 inventory of 93-94 mapping needed services 61 monitoring system activity 199 NIDS placement 210-211 plain text inter-system communications 43 scanning from inside and out 2 scanning with permission 158 topology 166-167 tracking troublemakers 36-37 watching for suspicious activity 2 Network server optimization 94 Newsgroups 381-382 NeWT 150 NICs network interface cards 318 335-337 NIDS Network Intrusion Detection System 2 142-143 163 194 attacks and suspicious activity from internal sources 194 attack 196 database authentication activity 200 false positives 198-200 hardware requirements 204 .ida buffer overflow 196-198 long authentication strings 199-200 Nessus 199 network monitoring system activity 199 network vulnerability scanning port scanners 199 Nmap 199 placement of 210-211 signatures 196-198 sorting and interpreting data 2 Trojan horse or worm-like behavior 199 tuning and managing with ACID 253-254 user