توضیحاتی در مورد کتاب The business case for network security: advocacy, governance, and ROI
نام کتاب : The business case for network security: advocacy, governance, and ROI
عنوان ترجمه شده به فارسی : مورد تجاری برای امنیت شبکه: حمایت، حاکمیت و ROI
سری : Network business series
نویسندگان : Saxe. Warren, Paquet. Catherine
ناشر : Cisco Press
سال نشر : 2004;2005
تعداد صفحات : 408
ISBN (شابک) : 2003115153 , 9781587201219
زبان کتاب : English
فرمت کتاب : pdf
حجم کتاب : 3 مگابایت
بعد از تکمیل فرایند پرداخت لینک دانلود کتاب ارائه خواهد شد. درصورت ثبت نام و ورود به حساب کاربری خود قادر خواهید بود لیست کتاب های خریداری شده را مشاهده فرمایید.
فهرست مطالب :
Cover......Page 1
Contents......Page 11
Introduction......Page 20
Part I: Vulnerabilities and Technologies......Page 26
Chapter 1 Hackers and Threats......Page 28
Contending with Vulnerability......Page 29
Analyzing Hacking......Page 33
Threats Classification......Page 40
The Future of Hacking and Security......Page 42
End Notes......Page 43
Chapter 2 Crucial Need for Security: Vulnerabilities and Attacks......Page 46
Recognizing Vulnerabilities......Page 47
Categories of Attacks......Page 52
Additional Common Attacks......Page 65
Wireless Intrusions......Page 73
Social Engineering......Page 76
Summary of Attacks......Page 79
Cisco SAFE Axioms......Page 83
Summary......Page 88
Chapter 3 Security Technology and Related Equipment......Page 90
Virus Protection......Page 91
Traffic Filtering......Page 93
Encryption......Page 102
Authentication, Authorization, and Accounting: AAA......Page 109
Public Key Infrastructure......Page 115
From Detection to Prevention: Intrusion-Detection Systems and Intrusion-Prevention Systems......Page 118
Content Filtering......Page 126
Assessment and Audit......Page 132
Additional Mitigation Methods......Page 139
Summary......Page 144
End Notes......Page 145
Chapter 4 Putting It All Together: Threats and Security Equipment......Page 146
Threats, Targets, and Trends......Page 147
Lowering Risk Exposure......Page 148
Security Topologies......Page 151
Summary......Page 160
Part II: Human and Financial Issues......Page 162
Chapter 5 Policy, Personnel, and Equipment as Security Enablers......Page 164
Securing the Organization: Equipment and Access......Page 166
Managing the Availability and Integrity of Operations......Page 168
Implementing New Software and Privacy Concerns......Page 169
Regulating Interactivity Through Information and Equipment Control......Page 171
Mobilizing the Human Element: Creating a Secure Culture......Page 173
Creating Guidelines Through the Establishment of Procedural Requirements......Page 175
Determining Rules and Defining Compliance......Page 177
Securing the Future: Business Continuity Planning......Page 180
Ensuring a Successful Security Policy Approach......Page 181
Surveying IT Management......Page 186
Summary......Page 192
Chapter 6 A Matter of Governance: Taking Security to the Board......Page 194
Security—A Governance Issue......Page 195
Directing Security Initiatives......Page 196
Establishing a Secure Culture......Page 199
Involving the Board......Page 205
Summary......Page 208
End Notes......Page 209
Chapter 7 Creating Demand for the Security Proposal: IT Management’s Role......Page 210
Delivering the Security Message to Executive Management......Page 211
Recognizing the Goals of the Corporation......Page 212
Outlining Methods IT Managers Can Use to Engage the Organization......Page 218
Assessing Senior Business Management Security Requirements......Page 231
Summary......Page 238
Chapter 8 Risk Aversion and Security Topologies......Page 240
Risk Aversion......Page 241
Risk-Aversion Quotient......Page 245
Security Modeling......Page 248
Diminishing Returns......Page 254
Summary......Page 256
Chapter 9 Return on Prevention: Investing in Capital Assets......Page 258
Examining Cost of Attacks......Page 259
Budgeting for Security Equipment......Page 265
Analyzing Returns on Security Capital Investments......Page 271
Acknowledging Nonmathematical Security Fundamentals......Page 278
End Notes......Page 279
Part III: Policies and Future......Page 280
Chapter 10 Essential Elements of Security Policy Development......Page 282
Constructing Reliable and Sound Policies......Page 284
Using Policy Tools and Policy Implementation Considerations......Page 286
Performing Comprehensive Monitoring......Page 288
Knowing Policy Types......Page 290
Handling Incidents......Page 318
Summary......Page 319
Chapter 11 Security Is a Living Process......Page 320
Security Wheel......Page 321
Scalability......Page 330
Jurisprudence......Page 331
SWOT: Strengths, Weaknesses, Opportunities, and Threats......Page 337
Summary......Page 343
End Note......Page 344
Part IV: Appendixes......Page 346
Appendix A: References......Page 348
Appendix B: OSI Model, Internet Protocol, and Packets......Page 352
Appendix C: Quick Guides to Security Technologies......Page 354
Appendix D: Return on Prevention Calculations Reference Sheets......Page 362
Glossary......Page 366
A......Page 367
B......Page 368
C......Page 369
D......Page 371
F......Page 373
H......Page 374
I......Page 376
L......Page 378
M......Page 379
O......Page 380
P......Page 381
R......Page 382
S......Page 383
U......Page 385
W......Page 386
A......Page 388
B......Page 390
C......Page 391
D......Page 392
F......Page 393
I......Page 394
M......Page 396
N......Page 397
P......Page 398
Q–R......Page 400
S......Page 401
T......Page 404
W–Z......Page 405