Cybersecurity Operations HandbookDigital Press, 2. okt. 2003 - 1287 strani Cybersecurity Operations Handbook is the first book for daily operations teams who install, operate and maintain a range of security technologies to protect corporate infrastructure. Written by experts in security operations, this book provides extensive guidance on almost all aspects of daily operational security, asset protection, integrity management, availability methodology, incident response and other issues that operational teams need to know to properly run security products and services in a live environment. Provides a master document on Mandatory FCC Best Practices and complete coverage of all critical operational procedures for meeting Homeland Security requirements. · First book written for daily operations teams · Guidance on almost all aspects of daily operational security, asset protection, integrity management · Critical information for compliance with Homeland Security |
Vsebina
1 | |
25 | |
63 | |
Chapter 4 Firewalls and Perimeters | 115 |
Chapter 5 VPNs and Remote Access | 155 |
Chapter 6 Intrusion Detection in Depth | 191 |
Chapter 7 Securing Communications | 231 |
Chapter 8 Keys Signatures Certificates and PKI | 269 |
Chapter 17 Security Service Level Agreements | 581 |
Chapter 18 Future Trends in Security | 601 |
Chapter 19 Sample Policy Documents | 631 |
Glossary of Security Terms | 711 |
A Audit Program for Networks | 733 |
B Network Architectures and Security | 809 |
C Useful URLs | 829 |
D NonDisclosure Agreement | 835 |
Chapter 9 Hacker Exploits | 293 |
Chapter 10 Incident Handling Basics | 323 |
Chapter 11 Forensics Investigation and Response | 365 |
Chapter 12 Security Diligence | 427 |
Chapter 13 BusinessContinuity Planning | 441 |
Chapter 14 Auditing Fundamentals | 457 |
Chapter 15 SecurityManagement Issues | 493 |
Chapter 16 Outsourcing and Security | 525 |
E Professional Services Agreement | 841 |
F Physical Security Guidelines | 851 |
G NRIC Preventative Best Practices for Cybersecurity | 855 |
H NRIC Cybersecurity Recovery Best Practices | 925 |
I NRIC Physical Security Best Practices | 963 |
Addendum | i |
257 | |
Druge izdaje - Prikaži vse
Pogosti izrazi in povedi
access control activities administrators algorithm allow application attack audit authentication Best Practice certificate changes cipher client communications confidential configuration connection corporate cryptographic database DECnet decryption Dependency Implementor detection devices digital signature document e-mail employees encryption ensure Equipment Suppliers evidence filter firewall forensic hacker hardware header host identify IETF implementation incident InfoSec infrastructure Internet intrusion investigation IP address IPSec ISAKMP issues JNR Advanced Technologies JNR Advanced Technologies's L2TP logs ment monitoring Network Operators Nmap node NRIC OAM&P OpenPGP operating system Operators and Equipment organization packet packet filter party password performance personnel port procedures protect protocol public-key public-key cryptography remote response risk router security policy server Service Providers SP Number specific standards Steganography TCP Wrappers TCP/IP Tcpdump tion traffic tunnel unauthorized vendor VendorCo vulnerabilities
Priljubljeni odlomki
Stran 16 - Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism Act of 2001 (USA Patriot Act) was enacted on October 26, 2001.
Stran 13 - If two or more persons conspire either to commit any offense against the United States or to defraud the United States, or any agency thereof in any manner or for any purpose, and one or more of such persons do any act to effect the object of the conspiracy, each shall be fined not more than $10,000 or imprisoned not more than five years, or both.