Wetter | Curing the Patch Management Headache | E-Book | sack.de
E-Book

E-Book, Englisch, 288 Seiten

Wetter Curing the Patch Management Headache


Erscheinungsjahr 2010
ISBN: 978-1-4200-3129-4
Verlag: Taylor & Francis
Format: PDF
Kopierschutz: Adobe DRM (»Systemvoraussetzungen)

E-Book, Englisch, 288 Seiten

ISBN: 978-1-4200-3129-4
Verlag: Taylor & Francis
Format: PDF
Kopierschutz: Adobe DRM (»Systemvoraussetzungen)



A comprehensive security patch management process is one of the fundamental security requirements for any IT-dependent organization. Fully defining this process ensures that patches are deployed in an organized, staged manner, resulting in little or no slowdowns or downtime to network infrastructure. Until now, there were no technical books for companies to use as a starting point for deploying the process. Curing the Patch Management Headache responds to this demand by tying together all aspects of the subject into one easy-to-understand format that is applicable regardless of the operating system, network device, or patch deployment tool.

This volume provides CISOs, CIROs, and IT directors and managers with the support and guidance that they need to integrate an effective patch management process into their environments. It emphasizes the importance of patch management and explains why having organizational support for the process drives successful implementation. The book details how patches should be implemented on devices and systems within an infrastructure, and how to distribute them in a timely manner.

Wetter Curing the Patch Management Headache jetzt bestellen!

Zielgruppe


Network administrators, systems administrators, IT security professionals, and CISO/CIOs


Autoren/Hrsg.


Weitere Infos & Material


INTRODUCTION
How to Use This Book
Background
Getting Started
Types of Patches
Product Vendors Responsibility

VULNERABILITY TO PATCH TO EXPLOIT
Who Exploits, When, Why and How
Tracking New Patch Releases

WHAT TO PATCH
Desktops
Remote Users
Servers
Network Devices

NETWORK AND SYSTEMS MANAGEMENT: ITIL
Network and Systems Management
Starting with Process
ITIL
Assessing and Implementing IT Operations

SECURITY MANAGEMENT
Overview
Preparing for Security Operations
Establishing Security Operations
Implementing Security Operations
Next Steps

VULNERABILITY MANAGEMENT
What is Vulnerability Management?
Vulnerability Management Process
Establishing Vulnerability Management
Next Steps

TOOLS
Process versus Tools
Where to Use Them
How to Determine Which One is Best
Tools Evaluated

TESTING
Common Issues with Testing
The Testing Process
Patch Ratings and How They Affect Testing
Prioritizing the Test Process
The Test Lab
Virtual Machines
Wrapping It Up

PROCESS LIFE CYCLE
Roles and Responsibilities
Analysis
Remediation
Update Operational Environment
Tracking

PUTTING THE PROCESS IN PLACE
Plan
Design
Implement
Operate
Maintain
Patch Management Policy

ZERO-DAY ATTACK
The scenario
The solution
Post Mortem

CONCLUSION
Challenges
Next Steps



Ihre Fragen, Wünsche oder Anmerkungen
Vorname*
Nachname*
Ihre E-Mail-Adresse*
Kundennr.
Ihre Nachricht*
Lediglich mit * gekennzeichnete Felder sind Pflichtfelder.
Wenn Sie die im Kontaktformular eingegebenen Daten durch Klick auf den nachfolgenden Button übersenden, erklären Sie sich damit einverstanden, dass wir Ihr Angaben für die Beantwortung Ihrer Anfrage verwenden. Selbstverständlich werden Ihre Daten vertraulich behandelt und nicht an Dritte weitergegeben. Sie können der Verwendung Ihrer Daten jederzeit widersprechen. Das Datenhandling bei Sack Fachmedien erklären wir Ihnen in unserer Datenschutzerklärung.