Surving Security: How to Integrate People, Process, and Technology / Edition 2

Surving Security: How to Integrate People, Process, and Technology / Edition 2

by Amanda Andress
     
 

View All Available Formats & Editions

ISBN-10: 0849320429

ISBN-13: 9780849320422

Pub. Date: 11/01/2003

Publisher: Taylor & Francis

This book provides a blueprint for creating a security infrastructure that can protect information systems and resources. It helps readers learn how to determine the risks involved with computer networking and the Internet and to understand the options available to them for securing valuable company information and resources. The author explains the costs and

Overview

This book provides a blueprint for creating a security infrastructure that can protect information systems and resources. It helps readers learn how to determine the risks involved with computer networking and the Internet and to understand the options available to them for securing valuable company information and resources. The author explains the costs and complications involved and covers security measures such as encryption, authentication, firewalls, intrusion detection, remote access, host security, server security, and more. After reading this book, readers will know how to make educated security decisions that provide strong, reliable solutions for their organizations or business.

Product Details

ISBN-13:
9780849320422
Publisher:
Taylor & Francis
Publication date:
11/01/2003
Edition description:
New Edition
Pages:
528
Product dimensions:
6.30(w) x 9.30(h) x 1.30(d)

Table of Contents

WHY DO I NEED SECURITY?
Introduction
The Importance of an Effective Security Infrastructure
People, Process, and Technology
What Are You Protecting Against?
Types of Attacks
Types of Attackers
Security as a Competitive Advantage
Choosing a Solution
Finding Security Employees
The Layered Approach

UNDERSTANDING REQUIREMENTS AND RISK
What Is Risk?
Embracing Risk
Information Security Risk Assessment
Assessing Risk
Insurance

SECURITY POLICIES AND PROCEDURES
Internal Focus Is Key
Security Awareness and Education
Policy Life Cycle
Developing Policies
Components of a Security Policy
Sample Security Policies
Procedures

CRYPTOGRAPHY AND ENCRYPTION
A Brief History of Cryptography
Cryptography Today
Hash Algorithms
Digital Signatures
e-Signature Law
Digital Certificates
Public-Key Infrastructure (PKI)
Secure Sockets Layer (SSL)
Other Protocols and Standards
Pretty Good Privacy (PGP)
Steganography
Other Uses of Encryption

AUTHENTICATION
Multifactor Authentication
Methods of Authentication
Single Sign-On
Centralized Administration Remains Elusive

NETWORK ARCHITECTURE AND PHYSICAL SECURITY
Changing Network Architecture
Common Configurations
Anson Inc.'s Architecture
Internal Architecture
Virtual Local Area Networks
Physical Security
Choosing a Location
Policies and Procedures

FIREWALLS AND PERIMETER SECURITY
Firewall Advances
Firewall Technologies
Firewall Features
The Best Firewall for You
Hardware Appliance vs. Software
In-House vs. Outsource
Firewall Architectures
Which Architecture Will Work for You?
Configuring Your Firewall
Firewall Rules
Content Filtering
Logging
A Good Start

NETWORK MANAGEMENT AND DEVICE SECURITY
Networks, Networks Everywhere
Denial of Service
Reflected Attacks
Defending Your Network
Identifying Compromised Systems
SNMP
SNMP Security
Identifying New Devices on the Network
Secure Device Configuration
General Steps for All Network Devices

WIRELESS NETWORK SECURITY
Standards
Security Issues
Authentication Solutions
Auditing Wireless LANs

INTRUSION DETECTION
What Are Intrusion-Detection Systems?
Categories of Intrusion Analysis
Characteristics of a Good IDS
Errors
Categories of Intrusion Detection
Separating the Truth from the Hype
Network Architecture with Intrusion Detection
Managed Services
Problems with Intrusion Detection
Technologies Under Development

REMOTE ACCESS
Remote-Access Users
Remote-Access Requirements
Issues with Remote Access
Policies
Technologies
Deploying and Supporting Remote Access
End-User Security

HOST SECURITY
Implementing Host Security
Understanding System Functions
Operating System Hardening
Security-Monitoring Programs
System Auditing

SERVER SECURITY
Hardening vs. Server Security
Firewalls
Web Servers
E-Mail Servers
Databases
DNS Servers
DNSSEC
Domain Controllers and Active Directory
Appliances
E-Mail Security
Policy Management
Policy Control

CLIENT SECURITY
Locking Down Systems
Protecting against Viruses
Protecting against Malware
Microsoft Applications
Instant Messaging

APPLICATION DEVELOPMENT
Identifying Threats
Web-Application Security
Prevention 334
Technology Tools and Solutions

SECURITY MAINTENANCE AND MONITORING
Security Is an Ongoing Process
Patches
Monitor Mailing Lists
Review Logs
Periodically Review Configurations
Managed Security Services

VULNERABILITY TESTING
How Does the Assessment Work?
When Are Vulnerability Assessments Needed?
Why Assess Vulnerability?
Performing Assessments
Password Cracking
Common Attacks

SECURITY AUDITS
Audit Overview
The Audit
Types of Audits
Analysis of an Audit
Surviving an Audit
The Cost of an Audit
Sample Audit Checklist

INCIDENT RESPONSE
Understanding Incident Management
The Importance of CSIR Teams
Justifying a Response Team
Cost of an Incident
Assessing Your Needs
How to Use Your Assessment
Building an Incident Response Plan of Attack
When an Incident Occurs
The SANS Institute's Incident-Response Plan
Analyzing an Attack

INTEGRATING PEOPLE, PROCESS, AND TECHNOLOGY
Your Security Infrastructure
Maintaining a Successful Security Infrastructure
Security-Awareness Training
Who Are We?
What Are Our Responsibilities?
What are Your (the employee's) Responsibilities?
Security ROI
Security Infrastructure Components
Interoperability and Management
Security Infrastructure Myths

TRENDS TO WATCH
PDAs
Peer-to-Peer Networks
Honeypots
Storage-Area Networks
The Rewards Are Yours

Customer Reviews

Average Review:

Write a Review

and post it to your social network

     

Most Helpful Customer Reviews

See all customer reviews >