IT Security: Risking the Corporation
Security is more about people and policies than about techie details. Linda McCarthy'sIT Security: Crimes and Misdemeanors gives you more than the title promises. It is not only a collection of enlightening case studies based on real security audits, but the author also gives a brief and to-the-point analysis of the real risks in the way systems are installed, configured, supported and managed. The book deliberately does not go into technical details, so anyone who is interested in network security will find it easy to read. Discusses and documents the importance of a security policy, the impact of organizational politics, and includes actual transcripts of break-ins and checklists of preventive security measures. It won't come as news to IT pros that cybercrime is soaring. But a new slate of stats reveals just how bad the situation really is. Research firm Computer Economics predicts computer crime will more than double this year while virus incidents are expected to increase by 22 percent.
11 pages matching Network monitoring in this book
Results 1-3 of 11
What people are saying - Write a review
We haven't found any reviews in the usual places.
Responding to Attacks
13 other sections not shown
a.out attacks auditors break-in budget company's computer crime computer room computer security configure security corporate CSIRT database server Dave Digital signatures directors door drwxr drwxr-xr-x Electronic commerce employees encryption executive management external connections extranet filtering and monitoring firewall firewall administrator Fred funding Global Chips goals grep hacker hire incident-response information security ingres Internet filtering intranet intrusion Intrusion/misuse detection Network jeff JFC's knew Lines logged look Mike Nathan network map Network monitoring network security never outsourcing passwd password policies and procedures protect richp rity roles and responsibilities secu security audit security expert Security patches security policies security problems security risks security team security training server security someone staff superuser sure system administrators Technologies TransWorld trust ttyhl unauthorized Virtual private network vulnerabilities wanted wtmp