+612 9045 4394
 
CHECKOUT
Internet Security Guidebook : From Planning to Deployment - Tim Speed

Internet Security Guidebook

From Planning to Deployment

By: Tim Speed

Paperback Published: 1st January 2001
ISBN: 9780122374715
Number Of Pages: 320

Share This Book:

Paperback

$171.75
or 4 easy payments of $42.94 with Learn more
Ships in 7 to 10 business days

The Internet Security Guidebook provides a complete analysis of an enterprise's Internet security. Strategies, steps, and procedures for conducting business securely on the Internet are discussed and reviewed. Very few organizations take the needed precautions to protect their Internet enterprise. Protection is not simply a firewall or technology; it is a strategy that encompasses risk, trust, business goals, security processes, and technology. The holistic approach offered in this book evaluates security needs in relation to business goals and the current attacks on the global Internet. The goal of The Internet Security Guidebook is to protect the business-computing environment by keeping our online enterprises functioning correctly and securely.

Unlike other books available, this book contains a complete guide to Internet security that is accessible to both novices and computer professionals. The specific steps discussed and illustrated show the reader how to implement security from the individual process to the complete corporate enterprise. The reader will also learn about resources that can help such as the Computer Emergency Response Team (CERT), the Federal Bureau of Investigation (FBI), and even their own software vendors.

"A practical guide with well presented explanations of both the technical and human sides of a particular aspect of computer security."
--Book News, No. 7, 2001

..".a significant contribution to the body of literature in the field of information security..."
--Information Security Bulletin, June 2001

Forewordp. xi
Prefacep. xv
Acknowledgmentsp. xvii
Copyright Notices and Statementsp. xix
Introduction: Who is Knocking at the Door?p. 1
Let's Do Businessp. 7
Security Componentsp. 8
Do You Have a Process?p. 11
The Cost of Securityp. 15
Security Reviewp. 19
Review the Businessp. 19
What Is a Trusted Network?p. 23
Initial Risk Analysisp. 27
The Policyp. 30
Implementation and Feedbackp. 37
Cryptographyp. 43
Historyp. 43
Key Typesp. 46
RSA--Public and Private Keyp. 49
PKI and Business Solutionsp. 50
Secure Networksp. 65
TCP/IP and OSIp. 65
Port of Call (Let's Go on a Cruise)p. 77
Denial-of-Service Attacksp. 79
Virtual Private Networksp. 82
Secure Sockets Layer (SSL)p. 85
Protecting Your Intranet from the Extranet and Internetp. 95
So Many Choices! I'll Get One of Each!p. 95
Firewall Product Functional Summariesp. 106
Firewall Buyer's Assessment Formp. 112
Firewall Vendors: Picking the Products That Are Right for Youp. 119
Authenticationp. 121
The Basicsp. 121
Authenticationp. 123
Authorizationp. 129
Smart Cardsp. 137
E-Commerce--Public Key Infrastructure (PKI)p. 139
PKI and Youp. 139
X.509p. 141
Certificate Authorityp. 146
Certification Practice Statementp. 152
Certificate Revocation Listp. 156
Key Recoveryp. 157
Lightweight Directory Access Protocol (LDAP)p. 158
Public Key Cryptography Standardsp. 161
Public Key Infrastructure (X.509) Standardsp. 163
Messaging Securityp. 165
Safe Communication--Messagingp. 165
Getting Killed with Junk Mailp. 172
Keep It Runningp. 179
What Are We Doing Here?p. 199
Risk Analysisp. 199
Where Are the Threats?p. 201
Technology Security Reviewp. 204
Control Directory and Environmental Risk Tablep. 208
Competitive Assetp. 210
Let's Make the Plansp. 219
Security Plans, Policies, Proceduresp. 219
The Corporate Security Policy Documentp. 221
Physical Security Policyp. 231
Network Security Policyp. 235
Acceptable Use Policyp. 241
We Have Been Hacked! Oh, the Humanity!p. 245
Incident Handlingp. 245
The Total Package Specific Stepsp. 255
Putting It All Togetherp. 255
The Planp. 256
Sample Plan to Roll Out PKIp. 261
Security Toolsp. 269
Toolsp. 269
Other Tool URLsp. 274
The CERT Reportp. 277
CERT Coordination Center Incident Reporting Guidelinesp. 278
CERT/CC Contact Informationp. 290
CERT Coordination Center Windows NT Intruder Detection Checklistp. 291
CERT/CC Contact Informationp. 303
Glossaryp. 305
Referencesp. 313
LDAP Standards RFCsp. 314
New Standard Adoption RFCsp. 314
PKIX Standards RFCsp. 315
Privacy Enhanced Mail and Cryptography (PEM) RFCsp. 316
Indexp. 317
Table of Contents provided by Syndetics. All Rights Reserved.

ISBN: 9780122374715
ISBN-10: 0122374711
Series: E-Commerce Technical Books
Audience: General
Format: Paperback
Language: English
Number Of Pages: 320
Published: 1st January 2001
Publisher: ACADEMIC PR INC
Country of Publication: US
Dimensions (cm): 23.5 x 19.1  x 1.83
Weight (kg): 0.6