The Secured Enterprise: Protecting Your Information Assets

Overview

Securing your key digital and information assets in an age of insecurity.

Securing enterprise data, applications, and intellectual property has become THE criticalissue for business decision-makers in this era of hackers and potential cyberterrorism. Butuntil now, most books on information security have been written for programmers andnetworking professionals, not business people. The Secured Enterprise: ...

See more details below
Available through our Marketplace sellers.
Other sellers (Paperback)
  • All (9) from $1.99   
  • New (1) from $80.00   
  • Used (8) from $1.99   
Close
Sort by
Page 1 of 1
Showing All
Note: Marketplace items are not eligible for any BN.com coupons and promotions
$80.00
Seller since 2015

Feedback rating:

(217)

Condition:

New — never opened or used in original packaging.

Like New — packaging may have been opened. A "Like New" item is suitable to give as a gift.

Very Good — may have minor signs of wear on packaging but item works perfectly and has no damage.

Good — item is in good condition but packaging may have signs of shelf wear/aging or torn packaging. All specific defects should be noted in the Comments section associated with each item.

Acceptable — item is in working order but may show signs of wear such as scratches or torn packaging. All specific defects should be noted in the Comments section associated with each item.

Used — An item that has been opened and may show signs of wear. All specific defects should be noted in the Comments section associated with each item.

Refurbished — A used item that has been renewed or updated and verified to be in proper working condition. Not necessarily completed by the original manufacturer.

New
Brand new.

Ships from: acton, MA

Usually ships in 1-2 business days

  • Standard, 48 States
  • Standard (AK, HI)
Page 1 of 1
Showing All
Close
Sort by
Sending request ...

Overview

Securing your key digital and information assets in an age of insecurity.

Securing enterprise data, applications, and intellectual property has become THE criticalissue for business decision-makers in this era of hackers and potential cyberterrorism. Butuntil now, most books on information security have been written for programmers andnetworking professionals, not business people. The Secured Enterprise: Protecting YourInformation Assets fills the gap, delivering a non-technical, business-focused briefing onevery key aspect of information security: frompeople to process to technology.

  • A guide to today's security threats—including cyberterrorism
  • How to establish effective, realistic security policies
  • The tools for defending your information assets
  • Effective mechanisms for identification, authentication, and access control
  • What firewalls can—and cannot—do
  • Vulnerability scanners, virus detectors, and intrusion detection systems
  • Virtual private networks: leveraging the cost savings without exposing your data to risk
  • Securing B2B and B2C e-commerce
  • How to evaluate third-party security products and services
  • New security options for wireless applications
Security has gotten more complex with time, and it has become more difficult to distill it. After readingthis book you will understand security better and be more prepared to apply it in your enterprise.

—Jeff Moss,
Founder, DEF CON President,
Black Hat, Inc.

Read More Show Less

Editorial Reviews

From The Critics
Securing enterprise data is a critical issue for business decision makers. This book explains the issues for business people in a nontechnical style. It introduces technologies for addressing security threats, explains protection methods used in the business environment, and examines implementation methods and choices for different sizes of businesses. It also discusses related legal issues and company politics. Icons identify key points, more technical material, and examples. Proctor is president of an information security firm. Byrnes wrote a previous book on security in enterprise computing. Annotation c. Book News, Inc., Portland, OR (booknews.com)
Read More Show Less

Product Details

  • ISBN-13: 9780130619068
  • Publisher: Pearson Education
  • Publication date: 2/28/2002
  • Series: Essential Guide Series
  • Pages: 304
  • Product dimensions: 6.97 (w) x 9.26 (h) x 0.91 (d)

Table of Contents

Foreword
Acknowledgments
Introduction: How to Read This Book
Pt. 1 Introduction to Security 1
1 Introduction to Security 3
2 Threat Briefing 23
3 Security Policies 39
4 Authentication, Authorization, Access Control 53
Pt. 2 Security Technologies 67
5 Firewalls 69
6 Vulnerability Scanners 89
7 Virus Detection and Content Filters 105
8 Intrusion Detection 123
9 Public Key Infrastructure and Encryption 141
10 Encrypted Communications 155
11 Mobile Workers and Wireless LANs 167
12 Single Signon 181
13 Digital Signatures and Electronic Commerce 189
Pt. 3 Implementation 203
14 Establishing a Security Program 205
15 Security Assessments 213
16 Managed Security Services 227
17 Response and Recovery 237
18 Implementing Web and Internet Security 245
Pt. 4 Odds and Ends 259
19 Legal Issues 261
20 Putting It All Together 281
Glossary 287
Index 293
Read More Show Less

Preface

Introduction:How to Read this Book

This book is directed to business people who are tasked with computer security responsibility, but it will also have value to security professionals looking for an overview. As such, security is viewed from a business perspective throughout the book. Topics are explored in a variety of technical depths to explain fully the impact on business and to give business professionals sufficient understanding to work effectively with their technical people. Whether you think of it as information technology (IT), information services (IS), or just the computer people, without a competent guide, security can go right over your head.

This book is divided into four sections.

Part 1—Introduction

This section introduces you to security, the threats you are protecting yourself from, and the basic technologies you will need to protect yourself.

Part 2—Protection Methods

This section explains the protection methods used commonly in today's business environment. This is where you will read about firewalls, virus protection, intrusion detection, etc.

Part 3—Implementation

This section focuses on implementation methods and choices for different sizes of businesses. In Part 3, you will read about risk assessment, configuration, deployment, and managed security services.

Part 4—Odds and Ends

This section includes discussions of legal issues, company politics, and other factors necessary in your success with information security.

To help you, the authors have provided plenty of examples, anecdotes, and technical descriptions to guide you.The authors understand thatbusinesses are not created equal. To accommodate different sizes of businesses, we offer the following guides to help you find the information relevant to your situation.

Large Enterprise

A large enterprise is one with more than 1,000 servers, more than $1 billion in revenue, and more than 2,000 employees. Large enterprises are usually characterized by multiple worldwide sites and special requirements, such as "follow the sun" management. Large enterprises will likely require more security expertise than is offered in this book.

Medium Business

Medium-sized businesses have over $100 million in revenue, more than 100 servers, and over 500 employees. Medium businesses usually have multiple sites. This book will be especially useful to executives and managers of medium-sized businesses.

Small Business

A small business has less than $100 million in revenue, fewer than 100 servers, and fewer than 100 employees. Although most of the information in this book will have value to small businesses, some of it may be more than is necessary.

Security is a journey, not a destination. There will not be a point in this journey when you can say, "Now I'm secure." This book will be your road map.

<%TOC%> Foreword.
Acknowledgments.
Introduction: How to Read This Book.

I. INTRODUCTION TO SECURITY.

1. Introduction to Security.
Objectives of Computer Security. Confidentiality. Integrity. Availability. Nonrepudiation. Who is responsible for security? Why me? Relative security. Organizing security: Roles and responsibilities. What do You need to know? The role of the business manager. The need for policy. Enforcement technology. Operations technology. Security services. Summary.

2. Threat Briefing.
Csi/Fbi StudY. Threats. Misuse Examples. Insider Threats. Hacker Threats. Social Engineering. Network Vulnerabilities. Loss of Brand Equity. Graffiti (Web Site Defacing). Denial of Service. Security and Return on Investment. Quantifying Risk. Summary.

3. Security Policies.
Nontechnology-related Security Topics. Business Policy. Why are policies important? How can one policy work for everyone? Policy Guidance. Secure Communications Policy. Isolation Infrastructure Policy. Identity Infrastructure Policy. Permission Infrastructure Policy. Configuration Management Policy. User Management Policy. Threat Management and Monitoring Policy. Conformance Monitoring Policy. Application Architecture Policy. What does a security policy look like? How are policies applied and enforced? Who is responsible for security policies? Summary.

4. Authentication, Authorization, Access Control.
The AAA Disciplines. Access Control. Authentication/Identification. Who Are You Really? Authorization. Assembling the Pieces. The Ultimate Solution. The Real World for the Next Few Years. Summary.

II. SECURITY TECHNOLOGIES.


5. Firewalls.
What is a firewall? Uses for Firewalls. Types of Firewalls and How They Operate. Network Layer Firewalls. Application Layer Firewalls. Hybrid Firewalls. Working with Firewalls. Access Rules. Architecting a Firewall Solution. Internet Firewalls. Extranets. The DMZ. Firewalls and Dial-Ups. High Availability. Managing Firewalls. Firewalls and Operating Systems. Firewall Logging and Reporting. Business Application. Summary.

6. Vulnerability Scanners.
Your computers are NOT configured securely. Proper Configuration Is Difficult. Consistency Is Hard in Large Enterprises. Enterprises Are Living, Breathing, and Changing Things. Vendors Delivered Insecure Software to You. Keeping Up on Patches and Updates Is Very Difficult. Poor Administrators Change Things Unintentionally. Hackers and Insiders Change Things Intentionally. Vulnerability Scanners. Network-Based Scanners. Host-Based Scanners. Port Scanners. Commercial Scanner Products. Free Vulnerability Scanners. Winfingerprint. SAINT. Cerberus Information Scanner. Vulnerability Databases. Security Process and Procedures for Scanners. Summary.

7. Virus Detection and Content Filters.
Viruses. The Virus Threat. The Wild List. How Viruses Work. How Viruses Spread. The Virus Calendar. Virus Mutation. Common Virus Types. Virus Detection. Tips to Protect Against Viruses. Enterprise Virus Protection. Content Filters. How Content Filtering Works. Email Content Tracking. Malicious Code Filters. URL Filters. Incident Response for Content Filtering. Summary.

8. Intrusion Detection.
The Case for Intrusion Detection. What is Intrusion Detection? The Most Common Intrusion Detection. Network versus Host-Based Intrusion Detection. Anatomy of an Intrusion Detection System. Command Console. Network Sensor. Alert Notification. Response Subsystem. Database. Target Agents. Anatomy of an Intrusion Detection Process. Intrusion Detection Myths. Myth #1: The Network Intrusion Detection Myth. Myth #2: The False-Positive Myth. Myth #3: The Automated Anomaly Detection Myth. Myth #4: The Real-Time Requirement Myth. Myth #5: The Automated Response Myth. Myth #6: The Artificial Intelligence Myth. Summary.

9. Public Key Infrastructure and Encryption.
Encryption Basics. Secret Key Encryption. Public Key Encryption. Key Lengths and Security Strength. Public Keys as Infrastructure. The Benefits of PKI. The Problems of PKI. Summary.

10. Encrypted Communications.
What is a Virtual Private Network? A Brief History of VPNs. VPN Technology in Business. VPN Technology. Point-to-Point VPNs. Client-to-Server VPNs. Application-Level VPNs. Secure Sockets Layer. SSL Example. Secure Shell. SSH Example. Summary.

11. Mobile Workers and Wireless LANs.
Mobile Users and Security. Physical Security Issues in Mobile Computing. Wireless Networks. Wireless over Long Distances (Miles). Wireless LANs (in the Same Building). Personal LANs (Within 10 Meters). Security in the Wireless World. Security in Radiospace. Securing Your WLAN. Security and Bluetooth. Cellular Security. Wireless and Mobile Computing in the Future. Summary.

12. Single Signon.
What is SSO? Why SSO Fails. Too Many Account Names. Too Many Passwords. Frequent Re-Entry. Password Resets. User Account Management. Should Your Organization Address SSO? Summary.

13. Digital Signatures and Electronic Commerce.
E-Commerce. Electronic Signatures. E-SIGN. Transactional Security. Identrus: A Transactional Security Infrastructure. Smart Cards in Electronic Commerce. Visa Compliance Standards. Summary.

III. IMPLEMENTATION.


14. Establishing a Security Program.
Step One: Define Responsible Personnel. Step Two: Establish Core Processes. The Risk Assessment/Data Classification Process. The User Administration Process. The Policy Definition Process. Technical Implementation, Planning, and Design. Step Three: Define Requirements. Step Four: Communicate! The Awareness Program. The Executive Communication Program. Step Five: Audit and Monitor. Configuration Control and Audit. Intrusion Monitoring and Vulnerability Scanning. Intrusion Response and Forensics. Security Performance Reporting. Summary.

15. Security Assessments.
What is Assessment? Penetration Testing. Vulnerability Assessment. Security Posture Review. Security Audit. Risk Assessment. Problems with Quantitative Risk Assessment. Summary.

16. Managed Security Services.
What Is MSS? The Business Case for Outsourcing. How Much Should You Outsource? Security Elements You Can Outsource. Perimeter Protection. Firewalls. Client-Side Firewalls. Virus Detection. VPNs. Vulnerability Assessments/Penetration Testing. Web Filtering. Intrusion Detection/Monitoring. Incident Response. Selecting a Managed Security Service Provider. Service Offerings. Service Level Agreements. SOCs. History. The Growing Market. Summary.

17. Response and Recovery.
Incident Response. Escalation Procedures. Incident Triage. Business Continuity. Elements of Business Continuity. CERT. National Coordination CERTs. The CERT Inside Your Company. Summary.

18. Implementing Web and Internet Security.
Establishing the Policy Base. Appropriate Use. Privacy. Data Location and Protection. Application Design. Authentication Requirements. Authorization and Scalability. Secure Code. Infrastructure Design. The DMZ of the Firewall. Server Connectivity. Operating System Configuration. Security Operations. Virus Scanners and Content Filters. Vulnerability Scanners. Intrusion Detection Tools. Change Control Process. Operating System Maintenance. More Than the Sum of its Parts. Summary.

IV. ODDS AND ENDS.


19. Legal Issues.
Introduction. Computer Crime Laws. Law Enforcement/Criminal Prosecutions. Tort Litigation. Negligence Litigation. Better Technology. Corporate Reluctance to Prosecute. Attacking Back. Liability When Your Network is Used to Attack Others. Standard of Due Care. Responsibilities. Evidentiary Issues. Rules of Evidence. Accuracy. Chain of Custody. Transparency. Case Study. Organizations. National White Collar Crime Center. National Cybercrime Training Partnership. High-Technology Crime Investigators Association. Government Regulation of Information Security. European Data Privacy Initiatives and U.S. Department of Commerce Safe Harbor. The Gramm-Leach-Bliley and Health Insurance Portability and Accountability Acts. Government Information Services Reform Act. Going Forward. Summary. Resources.

20. Putting It All Together.
Communication (again). Understand Your Company's Business. Advice on Politics. Protect Yourself. A Final Word.

Glossary.
Index.
<%END%>
Read More Show Less

Customer Reviews

Be the first to write a review
( 0 )
Rating Distribution

5 Star

(0)

4 Star

(0)

3 Star

(0)

2 Star

(0)

1 Star

(0)

Your Rating:

Your Name: Create a Pen Name or

Barnes & Noble.com Review Rules

Our reader reviews allow you to share your comments on titles you liked, or didn't, with others. By submitting an online review, you are representing to Barnes & Noble.com that all information contained in your review is original and accurate in all respects, and that the submission of such content by you and the posting of such content by Barnes & Noble.com does not and will not violate the rights of any third party. Please follow the rules below to help ensure that your review can be posted.

Reviews by Our Customers Under the Age of 13

We highly value and respect everyone's opinion concerning the titles we offer. However, we cannot allow persons under the age of 13 to have accounts at BN.com or to post customer reviews. Please see our Terms of Use for more details.

What to exclude from your review:

Please do not write about reviews, commentary, or information posted on the product page. If you see any errors in the information on the product page, please send us an email.

Reviews should not contain any of the following:

  • - HTML tags, profanity, obscenities, vulgarities, or comments that defame anyone
  • - Time-sensitive information such as tour dates, signings, lectures, etc.
  • - Single-word reviews. Other people will read your review to discover why you liked or didn't like the title. Be descriptive.
  • - Comments focusing on the author or that may ruin the ending for others
  • - Phone numbers, addresses, URLs
  • - Pricing and availability information or alternative ordering information
  • - Advertisements or commercial solicitation

Reminder:

  • - By submitting a review, you grant to Barnes & Noble.com and its sublicensees the royalty-free, perpetual, irrevocable right and license to use the review in accordance with the Barnes & Noble.com Terms of Use.
  • - Barnes & Noble.com reserves the right not to post any review -- particularly those that do not follow the terms and conditions of these Rules. Barnes & Noble.com also reserves the right to remove any review at any time without notice.
  • - See Terms of Use for other conditions and disclaimers.
Search for Products You'd Like to Recommend

Recommend other products that relate to your review. Just search for them below and share!

Create a Pen Name

Your Pen Name is your unique identity on BN.com. It will appear on the reviews you write and other website activities. Your Pen Name cannot be edited, changed or deleted once submitted.

 
Your Pen Name can be any combination of alphanumeric characters (plus - and _), and must be at least two characters long.

Continue Anonymously

    If you find inappropriate content, please report it to Barnes & Noble
    Why is this product inappropriate?
    Comments (optional)