The process of network security : designing and managing a safe network / Thomas A. Wadlow.
By: Wadlow, Thomas A.
Material type: BookPublisher: Reading, Mass. ; Harlow, England : Addison-Wesley, c2000Description: xv, 283 p. : ill. ; 24 cm. + pbk.ISBN: 0201433176.Subject(s): Computer networks -- Security measuresDDC classification: 005.8Item type | Current library | Call number | Copy number | Status | Date due | Barcode | Item holds |
---|---|---|---|---|---|---|---|
General Lending | MTU Bishopstown Library Lending | 005.8 (Browse shelf(Opens below)) | 1 | Available | 00075299 |
Enhanced descriptions from Syndetics:
This wide-ranging, up-to-date, conversational guide to network security focuses on the most important success factors: process and mindset . Security expert Thomas Wadlow shows exactly what it means to "be" a successful network security manager within a large business organization. KEY TOPICS: Learn how to define what an organization's security goals ought to be -- and how to implement an effective security policy quickly, without endless committee meetings or company politics. Understand who may be attacking you, and how to "think pathologically" about your network, putting yourself in the shoes of your attacker. Evaluate which information resources are most worth protecting; learn how to build an effective security team; and discover how to build security systems that protect the enterprise as a whole, not just individual devices. Learn how to fortify your network components and design; monitor and audit your network; even quantify the value of security. The book also presents five exceptionally detailed chapters on how to respond effectively to an attack -- from forensics and log analysis to damage control. MARKET: For every manager and executive concerned with network security, including sysadmins, netadmins, security managers, CIOs, CFOs, and CEOs.
Includes index.
Understanding Security -- Writing a Security Policy -- Who is attacking you? -- Security Design Process -- Building a Security Team -- Fortifying Network Components -- Personnel Security -- Physical Security -- Monitoring your Network -- Auditing Your Network -- Quantifying the value of Security -- Preparing for an Attack -- Handling an Attack -- Forensics -- Log Analysis -- Damage Control.
Table of contents provided by Syndetics
- Preface (p. xiii)
- Acknowledgments (p. xv)
- Chapter 1 Understanding Security (p. 1)
- What Are We Protecting? (p. 2)
- Thinking Like a Defender (p. 2)
- The Reader of This Book (p. 3)
- The Organization We Are Protecting (p. 3)
- The Process of Security (p. 4)
- How Do You Know That the Process Is Working? (p. 9)
- Trend Analysis (p. 10)
- Chapter 2 Writing a Security Policy (p. 11)
- Pitfalls (p. 12)
- Staging a Coup (p. 13)
- Contents of the Policy (p. 15)
- Chapter 3 Who Is Attacking You? (p. 21)
- The Nature of the Beast (p. 22)
- Security as an Evolutionary Strategy (p. 29)
- Chapter 4 Security Design Process (p. 31)
- Thinking About Security (p. 32)
- Principles of Security (p. 34)
- The Shape of Your Defenses (p. 51)
- Organizational Network (p. 51)
- Passive Outer Defenses (p. 51)
- Active Inner Defenses (p. 52)
- Passive Monitoring (p. 52)
- Active Monitoring (p. 52)
- The Shape of Your Security Organization (p. 53)
- Response Team (p. 54)
- Forensics Team (p. 54)
- Watch Team (p. 54)
- Employee Training (p. 55)
- Chapter 5 Building a Security Team (p. 57)
- Employee Characteristics (p. 57)
- Job Functions in a Security Team (p. 59)
- Training and Cross-Training (p. 62)
- Interviewing Security Candidates (p. 64)
- Background Checks (p. 65)
- Hiring (p. 66)
- Firing (p. 66)
- Chapter 6 Fortifying Network Components (p. 69)
- What Is a Network Component? (p. 70)
- Component Types (p. 71)
- Selecting Components (p. 73)
- Component Categories (p. 78)
- Fortifying Components (p. 79)
- Customizing New Components (p. 82)
- Upgrading Old Components (p. 84)
- System Fortification (p. 86)
- Configuration of the Operating System (p. 87)
- Applying Patches (p. 88)
- Removing Unnecessary Services (p. 88)
- Limiting Necessary Services (p. 89)
- Disabling and Deleting Unnecessary Software (p. 90)
- Conclusion (p. 92)
- Chapter 7 Personnel Security (p. 95)
- Management Issues (p. 96)
- Hiring Process (p. 96)
- Interview Process (p. 96)
- Probationary Period (p. 98)
- Trouble with Employees (p. 98)
- Firing Process (p. 99)
- Resignation Process (p. 100)
- Contractors (p. 100)
- Chapter 8 Physical Security (p. 101)
- What Are the Treats? (p. 101)
- Physical Security Basics (p. 103)
- Going Overboard (p. 110)
- Backups (p. 111)
- Denial of Service (p. 112)
- Electrical Power (p. 113)
- Telephones (p. 116)
- Access Control Logging and Log Analysis (p. 117)
- Chapter 9 Monitoring Your Network (p. 119)
- The Shape of the Logging System (p. 122)
- What to Log (p. 124)
- Logging Mechanisms (p. 125)
- Time (p. 131)
- Sensors (p. 132)
- Logging System Design (p. 133)
- Log Management (p. 135)
- Log Analysis (p. 138)
- Chapter 10 Auditing Your Network (p. 141)
- Why Should You Audit Your Network? (p. 142)
- Types of Audit (p. 143)
- What Should the Audit Measure? (p. 149)
- Who Should Do the Audit? (p. 151)
- Expectations (p. 154)
- What You Should Expect from the Auditor (p. 154)
- What the Auditor Should Expect from You (p. 155)
- How the Audit Should Be Conducted (p. 156)
- What You Should Do About the Audit Results (p. 156)
- Chapter 11 Quantifying the Value of Security (p. 159)
- Perception of Value (p. 162)
- Process of Explaining Security Issues (p. 167)
- Measurements (p. 169)
- Chapter 12 Preparing for an Attack (p. 171)
- Getting Started (p. 172)
- War Games (p. 173)
- Post-Mortem Analysis (p. 178)
- Developing a Response Plan (p. 179)
- Personnel (p. 185)
- Safety Equipment (p. 186)
- Survival Pack Contents (p. 187)
- Choosing Hiding Places (p. 190)
- Set Your Own Ground Rules (p. 191)
- Chapter 13 Handling an Attack (p. 193)
- Exciting, but Not Fun (p. 194)
- Thinking Pathologically (p. 195)
- About Attacks (p. 202)
- What You Can Do (p. 206)
- What You Should Not Do (p. 209)
- Response Team (p. 212)
- Priorities During an Attack (p. 214)
- Chapter 14 Forensics (p. 221)
- Getting Started (p. 222)
- The Art of Investigation (p. 229)
- The Clean Room (p. 233)
- Analyzing the Contaminated File System (p. 237)
- Analysis Tools (p. 238)
- What to Look For (p. 242)
- Chapter 15 Log Analysis (p. 247)
- Integrity Checks (p. 250)
- Log Analysis (p. 254)
- The Hunt (p. 256)
- Developing Theories (p. 256)
- Legalities (p. 258)
- Chapter 16 Damage Control (p. 261)
- Priorities (p. 261)
- Advance Preparation (p. 263)
- Post-Mortem Analysis (p. 264)
- Appendix A Glossary (p. 265)