The NCSA Guide to Enterprise Security: Protecting Information Assets
All too often, managers and technicians responsible for protecting their company's computer systems from viruses, vandals, and other calamities find themselves reacting after catastrophe strikes. With the help of this pragmatic guide, co-sponsored by the National Computer Security Association, you'll learn how to shield your enterprisewide system from loss or damage before it happens. Concise, accessible, and up-to-date, The NCSA Guide to Enterprise Security focuses on real-world issues encompassing all types of businesses. Dozens of case studies help you put into context the dangers that await inadequately protected systems. You'll learn how to identify key threats and vulnerabilities; devise effective countermeasures for each type of computer crime; develop cooperative efforts to protect against threats from employees, ex-employees, and software vendors; improve physical security at your facility; apply appropriate encryption techniques to improve security; convene a high-level task force for disaster prevention, mitigation, and recovery; plus, you'll find a wealth of references to current technical literature.
What people are saying - Write a review
We haven't found any reviews in the usual places.
Computer Crime Techniques and Countermeasures
Personnel and Legal Issues
14 other sections not shown
access control algorithm allow Anonymous antivirus attacks audit authentication authorized AVPDs AVPs backup BBSs bombs calls changes cipher ciphertext cleartext Clipper Chip communications CompuServe computer crime computer room Computer Security computer systems copy corporate cost CPSR credit card criminal hackers cryptographic cyberspace damage database decryption devices Digital digital signature diskettes documents door e-mail electronic employees encryption equipment example files functions hacking hard disk infected information security information systems information warfare installed Internet issues key escrow logon MacWEEK mainframe monitor NCSA operating system organization password percent phreaks plaintext prevent problem protect public key risk SATAN security policies server signature someone specific staff standard stolen switches system managers Systems Security tapes theft tion toll fraud Trojan unauthorized UNIX viral code virus viruses vulnerabilities workstation