Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
Self-defending networks : the next generation of network security
Capite D., Cisco Press, Indianapolis, IN, 2006. 250 pp. Type: Book (9781587052538)
Date Reviewed: May 14 2007

Cisco Systems’ next generation of network security devices and software is introduced in this book by one of Cisco’s product line managers in the security and technology department. Its purpose is to help customers understand and design a self-defending network and use it properly.

The ten chapters in the book cover different types of network attacks and defenses; the mitigation of distributed denial-of-service attacks; an overview of the Cisco adaptive security appliance; details of the Cisco incident control service; demystifying 802.1x; the implementation of network admission control; the network admission control appliance; the management of the Cisco security agent; the Cisco security manager; and the Cisco security monitoring, analysis, and response system.

These chapters outline Cisco’s layered approach to network security, often in graphic terms borrowed from the military (“network firewalls can also implement a demilitarized zone functionality”) or sports (“this [layered] defense is similar to that of a football team, starting with the front line”). The author presents a quite thorough explanation of what Cisco’s products do and how to get them to do it on the customer’s network. Of course, since there is no point in the posse publishing its weapons inventory for the black hats to see, the book gets rather vague when it comes to how things are done, which makes it difficult at times to evaluate how much of what is described is just wishful thinking and how much can really be counted on. Therein, of course, lies the rub.

It is common knowledge that network security is a major problem that is only getting worse. The notion of a self-defending network, if it means anything, certainly entails the ability not only to handle a wide range of known challenges, but also to cope effectively with new ones immediately as they appear. This is a dream of network operators, though the fight against the rise in network attacks seems as hopeless as the fight against the rise in entropy. One may win locally or for a short duration, but in the end one always seems to succumb to the network version of Murphy’s Law: “No system is foolproof because the fools are too ubiquitous and too ingenious.” Therefore, if the phrase “self-defending network” has any real meaning, and especially if it is to be the “proactive and holistic system” that Cisco touts it to be, it should somehow encompass both a component of artificial intelligence—which allows the system to learn about and combat new threats—and a component of fuzzy logic—which would allow it to deal with threats that are vaguely like, but not precisely the same as, known attacks. Now these components may be there, but if they are Cisco isn’t letting on. They have neatly categorized network attacks: viruses, worms, Trojan horses, denial-of service, distributed-denial-of-service, spyware, and phishing. But suppose something new (a Trojan donkey? a worm in snake’s clothing?) turns up.

The above comments should not detract from Cisco’s achievements in designing this system. Their network security system is definitely impressive when compared to other presently available systems, and this book does a good job of presenting an overview of it for potential and actual users. The prose is clear and avoids excessive technical jargon. The illustrations are useful and well done. Clearly, the people at Cisco know the audience to whom such books are directed, and are experienced at talking to it at the correct level.

Reviewer:  Jonathan Golan Review #: CR134268 (0805-0421)
Bookmark and Share
  Reviewer Selected
 
Would you recommend this review?
yes
no
Other reviews under "Security and Protection": Date
Password cracking: a game of wits
Seeley D. Communications of the ACM 32(6): 700-703, 1989. Type: Article
Jun 1 1990
The process of network security: designing and managing a safe network
Wadlow T., Addison-Wesley Longman Publishing Co., Inc., Boston, MA, 2000.  283, Type: Book (9780201433173)
May 1 2000
Public telephone network vulnerabilities
Lorenz G., Keller J., Manes G., Hale J., Shenoi S.  Database and application security (Proceedings of the fifteenth annual working conference, Niagara, Ontario, Canada, Jul 15-18, 2001)151-164, 2002. Type: Proceedings
Dec 30 2003
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 2004 Reviews.com™
Terms of Use
| Privacy Policy