Andress | Surviving Security | E-Book | sack.de
E-Book

E-Book, Englisch, 528 Seiten

Andress Surviving Security

How to Integrate People, Process, and Technology

E-Book, Englisch, 528 Seiten

ISBN: 978-0-203-50140-5
Verlag: Taylor & Francis
Format: PDF
Kopierschutz: Adobe DRM (»Systemvoraussetzungen)



Previous information security references do not address the gulf between general security awareness and the specific technical steps that need to be taken to protect information assets. Surviving Security: How to Integrate People, Process, and Technology, Second Edition fills this void by explaining security through a holistic approach that considers both the overall security infrastructure and the roles of each individual component. This book provides a blueprint for creating and executing sound security policy. The author examines the costs and complications involved, covering security measures such as encryption, authentication, firewalls, intrusion detection, remote access, host security, server security, and more. After reading this book, you will know how to make educated security decisions that provide airtight, reliable solutions.

About the Author
Amanda Andress, CISSP, SSCP, CPA, CISA is Founder and President of ArcSec Technologies, a firm which focuses on security product reviews and consulting. Prior to that she was Director of Security for Privada, Inc., a privacy company in San Jose, California. She built extensive security auditing and IS control experience working at Exxon and Big 5 firms Deloitte & Touche and Ernst & Young. She has been published in NetworkWorld, InfoWorld, Information Security Magazine, and others, and is a frequent presenter at industry events such as N+I and Black Hat.
Andress Surviving Security jetzt bestellen!

Zielgruppe


Information security practitioners; network and system administrators; CIO and MIS managers; students.


Autoren/Hrsg.


Weitere Infos & Material


WHY DO I NEED SECURITY?
Introduction
The Importance of an Effective Security Infrastructure
People, Process, and Technology
What Are You Protecting Against?
Types of Attacks
Types of Attackers
Security as a Competitive Advantage
Choosing a Solution
Finding Security Employees
The Layered Approach

UNDERSTANDING REQUIREMENTS AND RISK
What Is Risk?
Embracing Risk
Information Security Risk Assessment
Assessing Risk
Insurance

SECURITY POLICIES AND PROCEDURES
Internal Focus Is Key
Security Awareness and Education
Policy Life Cycle
Developing Policies
Components of a Security Policy
Sample Security Policies
Procedures

CRYPTOGRAPHY AND ENCRYPTION
A Brief History of Cryptography
Cryptography Today
Hash Algorithms
Digital Signatures
e-Signature Law
Digital Certificates
Public-Key Infrastructure (PKI)
Secure Sockets Layer (SSL)
Other Protocols and Standards
Pretty Good Privacy (PGP)
Steganography
Other Uses of Encryption

AUTHENTICATION
Multifactor Authentication
Methods of Authentication
Single Sign-On
Centralized Administration Remains Elusive

NETWORK ARCHITECTURE AND PHYSICAL SECURITY
Changing Network Architecture
Common Configurations
Anson Inc.'s Architecture
Internal Architecture
Virtual Local Area Networks
Physical Security
Choosing a Location
Policies and Procedures

FIREWALLS AND PERIMETER SECURITY
Firewall Advances
Firewall Technologies
Firewall Features
The Best Firewall for You
Hardware Appliance vs. Software
In-House vs. Outsource
Firewall Architectures
Which Architecture Will Work for You?
Configuring Your Firewall
Firewall Rules
Content Filtering
Logging
A Good Start

NETWORK MANAGEMENT AND DEVICE SECURITY
Networks, Networks Everywhere
Denial of Service
Reflected Attacks
Defending Your Network
Identifying Compromised Systems
SNMP
SNMP Security
Identifying New Devices on the Network
Secure Device Configuration
General Steps for All Network Devices

WIRELESS NETWORK SECURITY
Standards
Security Issues
Authentication Solutions
Auditing Wireless LANs

INTRUSION DETECTION
What Are Intrusion-Detection Systems?
Categories of Intrusion Analysis
Characteristics of a Good IDS
Errors
Categories of Intrusion Detection
Separating the Truth from the Hype
Network Architecture with Intrusion Detection
Managed Services
Problems with Intrusion Detection
Technologies Under Development

REMOTE ACCESS
Remote-Access Users
Remote-Access Requirements
Issues with Remote Access
Policies
Technologies
Deploying and Supporting Remote Access
End-User Security

HOST SECURITY
Implementing Host Security
Understanding System Functions
Operating System Hardening
Security-Monitoring Programs
System Auditing

SERVER SECURITY
Hardening vs. Server Security
Firewalls
Web Servers
E-Mail Servers
Databases
DNS Servers
DNSSEC
Domain Controllers and Active Directory
Appliances
E-Mail Security
Policy Management
Policy Control

CLIENT SECURITY
Locking Down Systems
Protecting against Viruses
Protecting against Malware
Microsoft Applications
Instant Messaging

APPLICATION DEVELOPMENT
Identifying Threats
Web-Application Security
Prevention 334
Technology Tools and Solutions

SECURITY MAINTENANCE AND MONITORING
Security Is an Ongoing Process
Patches
Monitor Mailing Lists
Review Logs
Periodically Review Configurations
Managed Security Services

VULNERABILITY TESTING
How Does the Assessment Work?
When Are Vulnerability Assessments Needed?
Why Assess Vulnerability?
Performing Assessments
Password Cracking
Common Attacks

SECURITY AUDITS
Audit Overview
The Audit
Types of Audits
Analysis of an Audit
Surviving an Audit
The Cost of an Audit
Sample Audit Checklist

INCIDENT RESPONSE
Understanding Incident Management
The Importance of CSIR Teams
Justifying a Response Team
Cost of an Incident
Assessing Your Needs
How to Use Your Assessment
Building an Incident Response Plan of Attack
When an Incident Occurs
The SANS Institute's Incident-Response Plan
Analyzing an Attack

INTEGRATING PEOPLE, PROCESS, AND TECHNOLOGY
Your Security Infrastructure
Maintaining a Successful Security Infrastructure
Security-Awareness Training
Who Are We?
What Are Our Responsibilities?
What are Your (the employee's) Responsibilities?
Security ROI
Security Infrastructure Components
Interoperability and Management
Security Infrastructure Myths

TRENDS TO WATCH
PDAs
Peer-to-Peer Networks
Honeypots
Storage-Area Networks
The Rewards Are Yours


Ihre Fragen, Wünsche oder Anmerkungen
Vorname*
Nachname*
Ihre E-Mail-Adresse*
Kundennr.
Ihre Nachricht*
Lediglich mit * gekennzeichnete Felder sind Pflichtfelder.
Wenn Sie die im Kontaktformular eingegebenen Daten durch Klick auf den nachfolgenden Button übersenden, erklären Sie sich damit einverstanden, dass wir Ihr Angaben für die Beantwortung Ihrer Anfrage verwenden. Selbstverständlich werden Ihre Daten vertraulich behandelt und nicht an Dritte weitergegeben. Sie können der Verwendung Ihrer Daten jederzeit widersprechen. Das Datenhandling bei Sack Fachmedien erklären wir Ihnen in unserer Datenschutzerklärung.