Home Page Icon
Home Page
Table of Contents for
Part II: Human and Financial Issues
Close
Part II: Human and Financial Issues
by Warren Saxe, Catherine Paquet
The Business Case For Network Security: Advocacy, Governance, And Roi
About This eBook
Title Page
Copyright Page
About the Authors
About the Technical Reviewers
Dedications
Acknowledgments
Contents at a Glance
Contents
Icons Used in This Book
Introduction
Part I: Vulnerabilities and Technologies
Chapter 1. Hackers and Threats
Contending with Vulnerability
Analyzing Hacking
Threats Classification
The Future of Hacking and Security
Summary
End Notes
Chapter 2. Crucial Need for Security: Vulnerabilities and Attacks
Recognizing Vulnerabilities
Categories of Attacks
Additional Common Attacks
Wireless Intrusions
Social Engineering
Summary of Attacks
Cisco SAFE Axioms
Summary
Chapter 3. Security Technology and Related Equipment
Virus Protection
Traffic Filtering and Firewalls
Encryption
Authentication, Authorization, and Accounting: AAA
Public Key Infrastructure
From Detection to Prevention: Intrusion-Detection Systems and Intrusion-Prevention Systems
Content Filtering
Assessment and Audit
Additional Mitigation Methods
Summary
End Notes
Chapter 4. Putting It All Together: Threats and Security Equipment
Threats, Targets, and Trends
Lowering Risk Exposure
Security Topologies
Summary
Part II: Human and Financial Issues
Chapter 5. Policy, Personnel, and Equipment as Security Enablers
Securing the Organization: Equipment and Access
Managing the Availability and Integrity of Operations
Implementing New Software and Privacy Concerns
Regulating Interactivity Through Information and Equipment Control
Mobilizing the Human Element: Creating a Secure Culture
Creating Guidelines Through the Establishment of Procedural Requirements
Determining Rules and Defining Compliance
Securing the Future: Business Continuity Planning
Ensuring a Successful Security Policy Approach
Surveying IT Management
Summary
Chapter 7. Creating Demand for the Security Proposal: IT Management's Role
Delivering the Security Message to Executive Management
Recognizing the Goals of the Corporation
Outlining Methods IT Managers Can Use to Engage the Organization
Assessing Senior Business Management Security Requirements
Summary
Chapter 8. Risk Aversion and Security Topologies
Risk Aversion
Risk-Aversion Quotient
Security Modeling
Diminishing Returns
Summary
Chapter 9. Return on Prevention: Investing in Capital Assets
Examining Cost of Attacks
Budgeting for Security Equipment
Analyzing Returns on Security Capital Investments
Acknowledging Nonmathematical Security Fundamentals
Summary
End Notes
Part III: Policies and Future
Chapter 11. Security Is a Living Process
Security Wheel
Scalability
Jurisprudence
SWOT: Strengths, Weaknesses, Opportunities, and Threats
Summary
End Note
Part IV: Appendixes
Appendix A. References
Appendix B. OSI Model, Internet Protocol, and Packets
OSI Model
Internet Protocol
IP Packet
Appendix C. Quick Guides to Security Technologies
Cheat Sheet 1: Routers
Cheat Sheet 2: Hubs and Switches
Cheat Sheet 3: Perimeter Routers and Firewalls
Cheat Sheet 4: Intrusion-Detection Systems
Cheat Sheet 5: Virtual Private Networks and Authentication
Cheat Sheet 6: Comprehensive Security Topology
Appendix D. Return on Prevention Calculations Reference Sheets
Security Costs Calculations
Financial Value Calculations
Glossary
Index
Search in book...
Toggle Font Controls
Playlists
Add To
Create new playlist
Name your new playlist
Playlist description (optional)
Cancel
Create playlist
Sign In
Email address
Password
Forgot Password?
Create account
Login
or
Continue with Facebook
Continue with Google
Sign Up
Full Name
Email address
Confirm Email Address
Password
Login
Create account
or
Continue with Facebook
Continue with Google
Prev
Previous Chapter
Chapter 4. Putting It All Together: Threats and Security Equipment
Next
Next Chapter
Chapter 5. Policy, Personnel, and Equipment as Security Enablers
Part II: Human and Financial Issues
Add Highlight
No Comment
..................Content has been hidden....................
You can't read the all page of ebook, please click
here
login for view all page.
Day Mode
Cloud Mode
Night Mode
Reset