Building Security Systems, in Plain English
Buch, Englisch, 153 Seiten, Format (B × H): 155 mm x 235 mm, Gewicht: 265 g
ISBN: 978-1-4842-8627-2
Verlag: Apress
Chapters on the various technologies such as multi-factor authentication and zero-trust environments explain in plain English the values and benefits that each technology provides. Clear technical explanations are accompanied by business case explanations that explain the “why” of each technology and when each technology should be implemented. You will come away equipped to have business-driven discussions with your IT staff that allow for a productive balancing of the need for security with the need to do business and drive profits.
You Will Learn - The importance of multi-factor authentication
- The limits of what multi-factor authentication can protect
- How firewalls are used to protect your company from attackers
- What zero-trust environments are and what they mean
- Whether zero-trust networks are what is needed to secure your own environment
- The security benefits from implementing a network segmentation policy
- The best ways to access files and resources from remote locations outside the office
Who This Book Is For
Managers and executives at small to medium-size businesses who want to understand the core aspects of IT security on which their businessrelies, business leaders who want to be able to follow along with and engage in discussions with IT professionals about security features, and leaders who are tasked with making decisions on which IT security features to implement
Zielgruppe
Professional/practitioner
Autoren/Hrsg.
Fachgebiete
- Mathematik | Informatik EDV | Informatik Angewandte Informatik Wirtschaftsinformatik
- Mathematik | Informatik EDV | Informatik Technische Informatik Computersicherheit
- Wirtschaftswissenschaften Betriebswirtschaft Management Risikomanagement
- Mathematik | Informatik EDV | Informatik Programmierung | Softwareentwicklung Microsoft Programmierung
- Wirtschaftswissenschaften Betriebswirtschaft Wirtschaftsinformatik, SAP, IT-Management
- Mathematik | Informatik EDV | Informatik Computerkommunikation & -vernetzung Netzwerksicherheit
Weitere Infos & Material
Introduction.- Part I. The Infrastructure.- 1. Why IT Security Matters.- 2. Network Design.- 3. Firewalls.- 4. Distributed Denial of Service.- 5. Remote Connectivity.-.- Part II. The Computers.- 6. Operating System Security.- 7. Multi-Factor Authentication.- 8. Zero Trust Environments.- Part III. The People.- 9. Protection Against the Weakest Security Link.- 10. Employee Training.