Cybersecurity Operations Handbook

Sprednja platnica
Digital Press, 2. okt. 2003 - 1287 strani
Cybersecurity Operations Handbook is the first book for daily operations teams who install, operate and maintain a range of security technologies to protect corporate infrastructure. Written by experts in security operations, this book provides extensive guidance on almost all aspects of daily operational security, asset protection, integrity management, availability methodology, incident response and other issues that operational teams need to know to properly run security products and services in a live environment.

Provides a master document on Mandatory FCC Best Practices and complete coverage of all critical operational procedures for meeting Homeland Security requirements.

· First book written for daily operations teams
· Guidance on almost all aspects of daily operational security, asset protection, integrity management
· Critical information for compliance with Homeland Security
 

Vsebina

Chapter 1 Why Worry about Security? I
1
Chapter 2 Network Security Management Basics
25
Chapter 3 Security Foundations
63
Chapter 4 Firewalls and Perimeters
115
Chapter 5 VPNs and Remote Access
155
Chapter 6 Intrusion Detection in Depth
191
Chapter 7 Securing Communications
231
Chapter 8 Keys Signatures Certificates and PKI
269
Chapter 17 Security Service Level Agreements
581
Chapter 18 Future Trends in Security
601
Chapter 19 Sample Policy Documents
631
Glossary of Security Terms
711
A Audit Program for Networks
733
B Network Architectures and Security
809
C Useful URLs
829
D NonDisclosure Agreement
835

Chapter 9 Hacker Exploits
293
Chapter 10 Incident Handling Basics
323
Chapter 11 Forensics Investigation and Response
365
Chapter 12 Security Diligence
427
Chapter 13 BusinessContinuity Planning
441
Chapter 14 Auditing Fundamentals
457
Chapter 15 SecurityManagement Issues
493
Chapter 16 Outsourcing and Security
525
E Professional Services Agreement
841
F Physical Security Guidelines
851
G NRIC Preventative Best Practices for Cybersecurity
855
H NRIC Cybersecurity Recovery Best Practices
925
I NRIC Physical Security Best Practices
963
Addendum
i
Index
257
Avtorske pravice

Druge izdaje - Prikaži vse

Pogosti izrazi in povedi

Priljubljeni odlomki

Stran 16 - Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism Act of 2001 (USA Patriot Act) was enacted on October 26, 2001.
Stran 13 - If two or more persons conspire either to commit any offense against the United States or to defraud the United States, or any agency thereof in any manner or for any purpose, and one or more of such persons do any act to effect the object of the conspiracy, each shall be fined not more than $10,000 or imprisoned not more than five years, or both.

Navedki za to knjigo

O avtorju (2003)

John has over 25 years experience in the IT and security sector. He is an often sought management consultant for large enterprise and is currently a member of the Federal Communication Commission's Homeland Security Network Reliabiltiy and Interoperability Council Focus Group on Cybersecurity, working in the Voice over Internet Protocol workgroup.

William M. Hancock, PhD, CISSP, CISM, is VP of Security and Chief Security Officer of Cable & Wireless, one of the largest telecom and hosting companies in the world. He has over 30 years of experience in networking, security and related technologies and is the author of many books and articles on security, networking and technology strategy.

Bibliografski podatki