Skip to content

Process of Network Security Designing and Managing a Safe Network

Best in textbook rentals since 2012!

ISBN-10: 0201433176

ISBN-13: 9780201433173

Edition: 2000

Authors: Thomas A. Wadlow

List price: $39.99
Blue ribbon 30 day, 100% satisfaction guarantee!
what's this?
Rush Rewards U
Members Receive:
Carrot Coin icon
XP icon
You have reached 400 XP and carrot coins. That is the daily max!

This wide-ranging, up-to-date, conversational guide to network security focuses on the most important success factors: process and mindset. Security expert Thomas Wadlow shows exactly what it means to "be" a successful network security manager within a large business organization. Learn how to define what an organization's security goals ought to be -- and how to implement an effective security policy quickly, without endless committee meetings or company politics. Understand who may be attacking you, and how to "think pathologically" about your network, putting yourself in the shoes of your attacker. Evaluate which information resources are most worth protecting; learn how to build an…    
Customers also bought

Book details

List price: $39.99
Copyright year: 2000
Publisher: Addison Wesley Professional
Publication date: 3/2/2000
Binding: Paperback
Pages: 304
Size: 7.50" wide x 9.50" long x 0.75" tall
Weight: 1.342
Language: English

Preface
Acknowledgments
Understanding Security
What Are We Protecting?
Thinking Like a Defender
The Reader of This Book
The Organization We Are Protecting
The Process of Security
How Do You Know That the Process Is Working?
Trend Analysis
Writing a Security Policy
Pitfalls
Staging a Coup
Contents of the Policy
Who Is Attacking You?
The Nature of the Beast
Security as an Evolutionary Strategy
Security Design Process
Thinking About Security
Principles of Security
The Shape of Your Defenses
Organizational Network
Passive Outer Defenses
Active Inner Defenses
Passive Monitoring
Active Monitoring
The Shape of Your Security Organization
Response Team
Forensics Team
Watch Team
Employee Training
Building a Security Team
Employee Characteristics
Job Functions in a Security Team
Training and Cross-Training
Interviewing Security Candidates
Background Checks
Hiring
Firing
Fortifying Network Components
What Is a Network Component?
Component Types
Selecting Components
Component Categories
Fortifying Components
Customizing New Components
Upgrading Old Components
System Fortification
Configuration of the Operating System
Applying Patches
Removing Unnecessary Services
Limiting Necessary Services
Disabling and Deleting Unnecessary Software
Conclusion
Personnel Security
Management Issues
Hiring Process
Interview Process
Probationary Period
Trouble with Employees
Firing Process
Resignation Process
Contractors
Physical Security
What Are the Treats?
Physical Security Basics
Going Overboard
Backups
Denial of Service
Electrical Power
Telephones
Access Control Logging and Log Analysis
Monitoring Your Network
The Shape of the Logging System
What to Log
Logging Mechanisms
Time
Sensors
Logging System Design
Log Management
Log Analysis
Auditing Your Network
Why Should You Audit Your Network?
Types of Audit
What Should the Audit Measure?
Who Should Do the Audit?
Expectations
What You Should Expect from the Auditor
What the Auditor Should Expect from You
How the Audit Should Be Conducted
What You Should Do About the Audit Results
Quantifying the Value of Security
Perception of Value
Process of Explaining Security Issues
Measurements
Preparing for an Attack
Getting Started
War Games
Post-Mortem Analysis
Developing a Response Plan
Personnel
Safety Equipment
Survival Pack Contents
Choosing Hiding Places
Set Your Own Ground Rules
Handling an Attack
Exciting, but Not Fun
Thinking Pathologically
About Attacks
What You Can Do
What You Should Not Do
Response Team
Priorities During an Attack
Forensics
Getting Started
The Art of Investigation
The Clean Room
Analyzing the Contaminated File System
Analysis Tools
What to Look For
Log Analysis
Integrity Checks
Log Analysis
The Hunt
Developing Theories
Legalities
Damage Control
Priorities
Advance Preparation
Post-Mortem Analysis
Glossary