Surviving Security: How to Integrate People, Process, and Technology, Second Edition

Previous information security references do not address the gulf between general security awareness and the specific technical steps that need to be taken to protect information assets. Surviving Security: How to Integrate People, Process, and Technology, Second Edition fills this void by explaining...

Mô tả đầy đủ

Đã lưu trong:
Chi tiết về thư mục
Tác giả chính: Andress, Amanda
Định dạng: Sách
Ngôn ngữ:English
Được phát hành: CRC Press 2009
Truy cập trực tuyến:http://scholar.dlu.edu.vn/thuvienso/handle/DLU123456789/1329
Các nhãn: Thêm thẻ
Không có thẻ, Là người đầu tiên thẻ bản ghi này!
Thư viện lưu trữ: Thư viện Trường Đại học Đà Lạt
id oai:scholar.dlu.edu.vn:DLU123456789-1329
record_format dspace
institution Thư viện Trường Đại học Đà Lạt
collection Thư viện số
language English
description Previous information security references do not address the gulf between general security awareness and the specific technical steps that need to be taken to protect information assets. Surviving Security: How to Integrate People, Process, and Technology, Second Edition fills this void by explaining security through a holistic approach that considers both the overall security infrastructure and the roles of each individual component. This book provides a blueprint for creating and executing sound security policy. The author examines the costs and complications involved, covering security measures such as encryption, authentication, firewalls, intrusion detection, remote access, host security, server security, and more. After reading this book, you will know how to make educated security decisions that provide airtight, reliable solutions. About the Author Amanda Andress, CISSP, SSCP, CPA, CISA is Founder and President of ArcSec Technologies, a firm which focuses on security product reviews and consulting. Prior to that she was Director of Security for Privada, Inc., a privacy company in San Jose, California. She built extensive security auditing and IS control experience working at Exxon and Big 5 firms Deloitte & Touche and Ernst & Young. She has been published in NetworkWorld, InfoWorld, Information Security Magazine, and others, and is a frequent presenter at industry events such as N+I and Black Hat.
format Book
author Andress, Amanda
spellingShingle Andress, Amanda
Surviving Security: How to Integrate People, Process, and Technology, Second Edition
author_facet Andress, Amanda
author_sort Andress, Amanda
title Surviving Security: How to Integrate People, Process, and Technology, Second Edition
title_short Surviving Security: How to Integrate People, Process, and Technology, Second Edition
title_full Surviving Security: How to Integrate People, Process, and Technology, Second Edition
title_fullStr Surviving Security: How to Integrate People, Process, and Technology, Second Edition
title_full_unstemmed Surviving Security: How to Integrate People, Process, and Technology, Second Edition
title_sort surviving security: how to integrate people, process, and technology, second edition
publisher CRC Press
publishDate 2009
url http://scholar.dlu.edu.vn/thuvienso/handle/DLU123456789/1329
_version_ 1757660006093684736
spelling oai:scholar.dlu.edu.vn:DLU123456789-13292009-11-27T08:22:20Z Surviving Security: How to Integrate People, Process, and Technology, Second Edition Andress, Amanda Previous information security references do not address the gulf between general security awareness and the specific technical steps that need to be taken to protect information assets. Surviving Security: How to Integrate People, Process, and Technology, Second Edition fills this void by explaining security through a holistic approach that considers both the overall security infrastructure and the roles of each individual component. This book provides a blueprint for creating and executing sound security policy. The author examines the costs and complications involved, covering security measures such as encryption, authentication, firewalls, intrusion detection, remote access, host security, server security, and more. After reading this book, you will know how to make educated security decisions that provide airtight, reliable solutions. About the Author Amanda Andress, CISSP, SSCP, CPA, CISA is Founder and President of ArcSec Technologies, a firm which focuses on security product reviews and consulting. Prior to that she was Director of Security for Privada, Inc., a privacy company in San Jose, California. She built extensive security auditing and IS control experience working at Exxon and Big 5 firms Deloitte & Touche and Ernst & Young. She has been published in NetworkWorld, InfoWorld, Information Security Magazine, and others, and is a frequent presenter at industry events such as N+I and Black Hat. WHY DO I NEED SECURITY? * Introduction * The Importance of an Effective Security Infrastructure * People, Process, and Technology * What Are You Protecting Against? * Types of Attacks * Types of Attackers * Security as a Competitive Advantage * Choosing a Solution * Finding Security Employees * The Layered Approach UNDERSTANDING REQUIREMENTS AND RISK * What Is Risk? * Embracing Risk * Information Security Risk Assessment * Assessing Risk * Insurance SECURITY POLICIES AND PROCEDURES * Internal Focus Is Key * Security Awareness and Education * Policy Life Cycle * Developing Policies * Components of a Security Policy * Sample Security Policies * Procedures CRYPTOGRAPHY AND ENCRYPTION * A Brief History of Cryptography * Cryptography Today * Hash Algorithms * Digital Signatures * e-Signature Law * Digital Certificates * Public-Key Infrastructure (PKI) * Secure Sockets Layer (SSL) * Other Protocols and Standards * Pretty Good Privacy (PGP) * Steganography * Other Uses of Encryption AUTHENTICATION * Multifactor Authentication * Methods of Authentication * Single Sign-On * Centralized Administration Remains Elusive NETWORK ARCHITECTURE AND PHYSICAL SECURITY * Changing Network Architecture * Common Configurations * Anson Inc.'s Architecture * Internal Architecture * Virtual Local Area Networks * Physical Security * Choosing a Location * Policies and Procedures FIREWALLS AND PERIMETER SECURITY * Firewall Advances * Firewall Technologies * Firewall Features * The Best Firewall for You * Hardware Appliance vs. Software * In-House vs. Outsource * Firewall Architectures * Which Architecture Will Work for You? * Configuring Your Firewall * Firewall Rules * Content Filtering * Logging * A Good Start NETWORK MANAGEMENT AND DEVICE SECURITY * Networks, Networks Everywhere * Denial of Service * Reflected Attacks * Defending Your Network * Identifying Compromised Systems * SNMP * SNMP Security * Identifying New Devices on the Network * Secure Device Configuration * General Steps for All Network Devices WIRELESS NETWORK SECURITY * Standards * Security Issues * Authentication Solutions * Auditing Wireless LANs INTRUSION DETECTION * What Are Intrusion-Detection Systems? * Categories of Intrusion Analysis * Characteristics of a Good IDS * Errors * Categories of Intrusion Detection * Separating the Truth from the Hype * Network Architecture with Intrusion Detection * Managed Services * Problems with Intrusion Detection * Technologies Under Development REMOTE ACCESS * Remote-Access Users * Remote-Access Requirements * Issues with Remote Access * Policies * Technologies * Deploying and Supporting Remote Access * End-User Security HOST SECURITY * Implementing Host Security * Understanding System Functions * Operating System Hardening * Security-Monitoring Programs * System Auditing SERVER SECURITY * Hardening vs. Server Security * Firewalls * Web Servers * E-Mail Servers * Databases * DNS Servers * DNSSEC * Domain Controllers and Active Directory * Appliances * E-Mail Security * Policy Management * Policy Control CLIENT SECURITY * Locking Down Systems * Protecting against Viruses * Protecting against Malware * Microsoft Applications * Instant Messaging APPLICATION DEVELOPMENT * Identifying Threats * Web-Application Security * Prevention 334 * Technology Tools and Solutions SECURITY MAINTENANCE AND MONITORING * Security Is an Ongoing Process * Patches * Monitor Mailing Lists * Review Logs * Periodically Review Configurations * Managed Security Services VULNERABILITY TESTING * How Does the Assessment Work? * When Are Vulnerability Assessments Needed? * Why Assess Vulnerability? * Performing Assessments * Password Cracking * Common Attacks SECURITY AUDITS * Audit Overview * The Audit * Types of Audits * Analysis of an Audit * Surviving an Audit * The Cost of an Audit * Sample Audit Checklist INCIDENT RESPONSE * Understanding Incident Management * The Importance of CSIR Teams * Justifying a Response Team * Cost of an Incident * Assessing Your Needs * How to Use Your Assessment * Building an Incident Response Plan of Attack * When an Incident Occurs * The SANS Institute's Incident-Response Plan * Analyzing an Attack INTEGRATING PEOPLE, PROCESS, AND TECHNOLOGY * Your Security Infrastructure * Maintaining a Successful Security Infrastructure * Security-Awareness Training * Who Are We? * What Are Our Responsibilities? * What are Your (the employee's) Responsibilities? * Security ROI * Security Infrastructure Components * Interoperability and Management * Security Infrastructure Myths TRENDS TO WATCH * PDAs * Peer-to-Peer Networks * Honeypots * Storage-Area Networks * The Rewards Are Yours 2009-11-27T08:22:20Z 2009-11-27T08:22:20Z 2003 Book http://scholar.dlu.edu.vn/thuvienso/handle/DLU123456789/1329 en application/octet-stream CRC Press