IT Security: Risking the CorporationSecurity is more about people and policies than about techie details. Linda McCarthy'sIT Security: Crimes and Misdemeanors gives you more than the title promises. It is not only a collection of enlightening case studies based on real security audits, but the author also gives a brief and to-the-point analysis of the real risks in the way systems are installed, configured, supported and managed. The book deliberately does not go into technical details, so anyone who is interested in network security will find it easy to read. Discusses and documents the importance of a security policy, the impact of organizational politics, and includes actual transcripts of break-ins and checklists of preventive security measures. It won't come as news to IT pros that cybercrime is soaring. But a new slate of stats reveals just how bad the situation really is. Research firm Computer Economics predicts computer crime will more than double this year while virus incidents are expected to increase by 22 percent. |
From inside the book
8 pages matching filtering and monitoring in this book
Where's the rest of this book?
Results 1-3 of 8
Contents
Responding to Attacks | 3 |
OutoftheBox Security | 21 |
Final Words | 33 |
Copyright | |
15 other sections not shown
Common terms and phrases
attacks auditors break-in budget company's computer crime computer room computer security configure security corporate Dan Farmer database server Dave Digital signatures directors door drwxr-xr-x Electronic commerce employees encryption executive management external connections filtering and monitoring firewall firewall administrator Fred funding Global Chips goals grep hacker hire incident-response information security ingres Internet filtering intranet intrusion jeff JFC's knew Lines logged look Mike Nathan network map Network monitoring network security never outsourcing passwd password policies and procedures protect richp rity roles and responsibilities secu security audit security breach security expert Security patches security policies security problems security risks security team security training server security setuid someone staff superuser sure system administrators Technologies TransWorld trust ttyhl unauthorized Virtual private network Virus vulnerabilities wanted wtmp