NTP security : a quick-start guide /: a quick-start guide. (2016)
- Record Type:
- Book
- Title:
- NTP security : a quick-start guide /: a quick-start guide. (2016)
- Main Title:
- NTP security : a quick-start guide
- Further Information:
- Note: Allan Liska.
- Authors:
- Liska, Allan
- Contents:
- About the Author; About the Technical Reviewer; Acknowledgments; Introduction; Chapter 1: Understanding NTP; A Brief History of Time Synchronization; The Importance of Time Synchronization in Modern Networks; The Network Time Protocol; Understanding NTP; NTP from the Client Side; NTP Server Configuration; NTP Reference Implementation; NTP Authentication; Mapping the Network Time Protocol; Conclusions; Chapter 2: Issues in NTP Security; A History of NTP Attacks; Why Is NTP So Insecure?; The Problem with "Set It and Forget It" Protocols; Analysis of NTP Traffic; Conclusions. Chapter 3: Vulnerabilities in NTPVulnerabilities in the Daemon; Vulnerabilities in the Protocol; Flaws in NTP Encryption and Authentication; Symmetric Encryption; AutoKey; NTP Use in DDoS Attacks; Conclusions; Chapter 4: Securing NTP; Collecting NTP Information; Hardening an NTP Installation; Running NTP in a Chroot Jail; Run NTP As an Unprivileged User; Protecting NTP Communication; Securing the ntp.conf File; Secure Configurations on Juniper and Cisco; Monitoring NTP Traffic; Alerting on NTP Security Issues; Correlating Alerts; Conclusions; Chapter 5: Securing NTP Infrastructure; BCP38. Broadcast AttacksImplementing BCP38; NTP Pooling; NTP Over Multicast/Manycast; Multicast; Manycast; Conclusions; Chapter 6: Alternatives to NTP; NTPSec; Ntimed; tlsdate; Precision Time Protocol (PTP); Conclusions; Index.
- Publisher Details:
- United States : Apress
- Publication Date:
- 2016
- Extent:
- 1 online resource
- Subjects:
- 004.6/2
Computer science
Network Time Protocol (Computer network protocol)
Computer networks -- Security measures
COMPUTERS -- Computer Literacy
COMPUTERS -- Computer Science
COMPUTERS -- Data Processing
COMPUTERS -- Hardware -- General
COMPUTERS -- Information Technology
COMPUTERS -- Machine Theory
COMPUTERS -- Reference
Computer networks -- Security measures
Network Time Protocol (Computer network protocol)
Computer Science
Security
Systems and Data Security
Computers -- Security -- General
Computer security
Data protection
Computer security
Electronic books
Electronic books - Languages:
- English
- ISBNs:
- 9781484224120
1484224124
1484224116
9781484224113 - Related ISBNs:
- 9781484224113
- Notes:
- Note: Online resource; title from PDF title page (SpringerLink, viewed December 20, 2016).
- Access Rights:
- Legal Deposit; Only available on premises controlled by the deposit library and to one user at any one time; The Legal Deposit Libraries (Non-Print Works) Regulations (UK).
- Access Usage:
- Restricted: Printing from this resource is governed by The Legal Deposit Libraries (Non-Print Works) Regulations (UK) and UK copyright law currently in force.
- View Content:
- Available online (eLD content is only available in our Reading Rooms) ↗
- Physical Locations:
- British Library HMNTS - ELD.DS.359819
- Ingest File:
- 01_322.xml